Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
Less technical content
- Lithuania confirms finding russian spyware on gov computers
- Suspected cyberattack on ukrainian power grid (plus second article)
- History of Citizen Lab
- Declassified report alleges Snowden keeps ties with Russian intel
- Who killed a Hamas engineer in Tunisia
- France creates cyber command
- Trading in phone cracking technology
- Stealing cars with data from service centers
- Accountants and spies: The secret history of Deloitte’s espionage practice
- LeakedSource history
- Facebook moderation rules
- A perspective on the new Dutch intelligence law
- A fake charity spying on activists
More technical content
- Traces of KillDisk attack on an ukrainian GOV website
- [PDF] Cross-origin bypass-attack on Facebook Messenger
- Evading antivirus without being a wizard
- Making a rootkit
- Tool to obfuscate exfiltrated data
- Hacking in-flight entertainment systems and Panasonic’s comment
- Russians infecting ukrainian artillery units:
- Free antiransomware app
- [PDF] Nuclear Threat Initiative cybersecurity report
- Tofsee spambot analysis
- Hacking C&C botnet panels
- Bugs in Cisco CloudCenter Orchestrator
- Noriben – Portable, Simple, Malware Analysis Sandbox
- EMEA malware trends
- Cerber ransomware campaign analysis
- Firefox closer to sandboxing
- Disclosing email address for each Facebook user
- TrickBot analysis and history
- New ATM malware analysis
- GnuPG ElGamal signature private key disclosure
- Skype’s trouble with malicious account blocking
- Hacking users via phone number takeover
- Analysis of Linux Rakos botnet
- Conclusions from a year of security incident response
- Challenges of hacking complex systems
- Extracting data from iOS devices in real time
- Fighting with webshells
- Huge false video ads views campaign
- Trouble with 2FA
- Cheap and efficient honeytraps
- Why using Tor is risky
- Nuclear bot analysis
- Easy testing of cryptographic libraries
- Detecting rapid spam campaigns
- Bruteforcing eluding volumetric detection
- Microsoft’s 2FA analysis
- Google’s 2FA analysis
- Android banker trojan also encrypting files
- Alleged Paypal 2FA bypass
- [PDF] SS7 attacks
- Analysis of Tordov campaign
- Building a small Raspberry Pi honeypot
- Fareit campaign analysis
- Shadow Brokers return analysis and another one and third one
- Big analysis of Shadow Brokers: part 1, 2 and 3
- [PDF] Using GPOs for persistence and lateral movement
- Bypassing Exploit protection of NORTON Security
- Bayrob botnet analysis
- Polymorphic encryption algorythms
- RCE in Oracle’s Hotel Management Platform
- Webshell incident analysis
- Spearphishing on industrial companies
- Hardening iOS against jailbreaks and malware
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
1 thought on “IT Security Weekend Catch Up Holiday Edition – December 25, 2016”