Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- How US election can change the fate of a Russian hacker
- How Secret Service unlocks phones
- The story of arrest of one of the top Russin spies
- Sinaloa cartel continues to operate withou El Chapo
- Radio stations hacked, Trump song played
- Jihadist admitted to Israeli drone hacking
- Pacemaker data used to indict an arsonist
- Fake accounts in Grindr used to harrass a man
For the more technical
- Extremly detailed Nymaim analysis
- Some space attacks
- AlphaBay drug bazaar troubles
- How Google defended Krebs from DDoS attacks
- Hacking a Thomson TWG870 modem
- Stolen tools to brake mobile phone protections dumped
- Chineese attacks on Rusisian-speaking countries
- Locky campaign analysis
- How Facebook links people and accounts together
- An interesing and dangerous WordPress bug
- Large phishing campaign against Egyptian activists
- Extracting WhatsApp conversations from Android
- D-Link’s unsuccefull attempt at backdoor patching
- Kelihos campaign analysis
- Analysis of a Quasar RAT state-sponsored campaign
- [PDF] Attacks using insiders
- Using WMV files to unmask Tor users (link to similar attack)
- Analysis of Necurs botnet operation
- Analysis of boot process in Petya ransomware
- Backdooring Joomla
- Stylometric attribution based on source code
- Locky Bart ransomware analysis
- Analysis of a long malvertising campaign
- A very interesting DNS misconfiguration analysis
- Interesting issue with file managers in Linux
- Linking browsing history with social media profiles
- Tools for Utimaco Firmware RE
- Making money out of thin air
- Bypassing authentication in Netgear routers
- How Facebook is trying to solve the forgotten password issue
- Google VRP summary for 2016
- Huge EItest campaign analysis
- Fighting ransomware with Windows Defender APT
- Twitter metadata analyser
- Twitter activist security guidance
- RCE in Java Springboot
- EyePyramid comment
- How EyePyramid avoided detection
- [PDF] Malwarebytes 2016 report
- Unauthorised printouts
- DDoS attacks in Q4 2016
- New Turla payload
- Hunting exploit kits
- Cisco Prime Home flaw
- Sage 2.0 ransomware analysis
- Tallinn Manual 2.0 issued
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
One thought on “IT Security Weekend Catch Up – February 4, 2017”