Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- How US election can change the fate of a Russian hacker
- How Secret Service unlocks phones
- The story of arrest of one of the top Russin spies
- Sinaloa cartel continues to operate withou El Chapo
- Radio stations hacked, Trump song played
- Jihadist admitted to Israeli drone hacking
- Pacemaker data used to indict an arsonist
- Fake accounts in Grindr used to harrass a man
For the more technical
- Extremly detailed Nymaim analysis
- Some space attacks
- AlphaBay drug bazaar troubles
- How Google defended Krebs from DDoS attacks
- Hacking a Thomson TWG870 modem
- Stolen tools to brake mobile phone protections dumped
- Chineese attacks on Rusisian-speaking countries
- Locky campaign analysis
- How Facebook links people and accounts together
- An interesing and dangerous WordPress bug
- Large phishing campaign against Egyptian activists
- Extracting WhatsApp conversations from Android
- D-Link’s unsuccefull attempt at backdoor patching
- Kelihos campaign analysis
- Analysis of a Quasar RAT state-sponsored campaign
- [PDF] Attacks using insiders
- Using WMV files to unmask Tor users (link to similar attack)
- Analysis of Necurs botnet operation
- Analysis of boot process in Petya ransomware
- Backdooring Joomla
- Stylometric attribution based on source code
- Locky Bart ransomware analysis
- Analysis of a long malvertising campaign
- A very interesting DNS misconfiguration analysis
- Interesting issue with file managers in Linux
- Linking browsing history with social media profiles
- Tools for Utimaco Firmware RE
- Making money out of thin air
- Bypassing authentication in Netgear routers
- How Facebook is trying to solve the forgotten password issue
- Google VRP summary for 2016
- Huge EItest campaign analysis
- Fighting ransomware with Windows Defender APT
- Twitter metadata analyser
- Twitter activist security guidance
- RCE in Java Springboot
- EyePyramid comment
- How EyePyramid avoided detection
- [PDF] Malwarebytes 2016 report
- Unauthorised printouts
- DDoS attacks in Q4 2016
- New Turla payload
- Hunting exploit kits
- Cisco Prime Home flaw
- Sage 2.0 ransomware analysis
- Tallinn Manual 2.0 issued
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
1 thought on “IT Security Weekend Catch Up – February 4, 2017”