Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
Less technical content
- Lithuania confirms finding russian spyware on gov computers
- Suspected cyberattack on ukrainian power grid (plus second article)
- History of Citizen Lab
- Declassified report alleges Snowden keeps ties with Russian intel
- Who killed a Hamas engineer in Tunisia
- France creates cyber command
- Trading in phone cracking technology
- Stealing cars with data from service centers
- Accountants and spies: The secret history of Deloitte’s espionage practice
- LeakedSource history
- Facebook moderation rules
- A perspective on the new Dutch intelligence law
- A fake charity spying on activists
More technical content
- Traces of KillDisk attack on an ukrainian GOV website
- [PDF] Cross-origin bypass-attack on Facebook Messenger
- Evading antivirus without being a wizard
- Making a rootkit
- Tool to obfuscate exfiltrated data
- Hacking in-flight entertainment systems and Panasonic’s comment
- Russians infecting ukrainian artillery units:
- Free antiransomware app
- [PDF] Nuclear Threat Initiative cybersecurity report
- Tofsee spambot analysis
- Hacking C&C botnet panels
- Bugs in Cisco CloudCenter Orchestrator
- Noriben – Portable, Simple, Malware Analysis Sandbox
- EMEA malware trends
- Cerber ransomware campaign analysis
- Firefox closer to sandboxing
- Disclosing email address for each Facebook user
- TrickBot analysis and history
- New ATM malware analysis
- GnuPG ElGamal signature private key disclosure
- Skype’s trouble with malicious account blocking
- Hacking users via phone number takeover
- Analysis of Linux Rakos botnet
- Conclusions from a year of security incident response
- Challenges of hacking complex systems
- Extracting data from iOS devices in real time
- Fighting with webshells
- Huge false video ads views campaign
- Trouble with 2FA
- Cheap and efficient honeytraps
- Why using Tor is risky
- Nuclear bot analysis
- Easy testing of cryptographic libraries
- Detecting rapid spam campaigns
- Bruteforcing eluding volumetric detection
- Microsoft’s 2FA analysis
- Google’s 2FA analysis
- Android banker trojan also encrypting files
- Alleged Paypal 2FA bypass
- [PDF] SS7 attacks
- Analysis of Tordov campaign
- Building a small Raspberry Pi honeypot
- Fareit campaign analysis
- Shadow Brokers return analysis and another one and third one
- Big analysis of Shadow Brokers: part 1, 2 and 3
- [PDF] Using GPOs for persistence and lateral movement
- Bypassing Exploit protection of NORTON Security
- Bayrob botnet analysis
- Polymorphic encryption algorythms
- RCE in Oracle’s Hotel Management Platform
- Webshell incident analysis
- Spearphishing on industrial companies
- Hardening iOS against jailbreaks and malware
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
One thought on “IT Security Weekend Catch Up Holiday Edition – December 25, 2016”