Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- EFCSN disappointed by end to Meta’s Third Party Fact-Checking Program in the US; Condemns statements linking fact-checking to censorship
- Britain to make sexually explicit ‘deepfakes’ a crime
- Is 10,000 steps a day worth your personal data? How 80% of fitness apps are selling your privacy
- UN aviation agency ICAO confirms its recruitment database was hacked
- A day in the life of a prolific voice phishing crew
- Russian nationals arrested by US, accused of running crypto mixers Blender and Sinbad
- Inside Russian spy’s Norfolk guesthouse
For the more technical
- [VIDEO] How Russian cyber-spies attack Ukraine
- Ivanti Connect Secure VPN targeted in new zero-day exploitation
- SonicWall urges admins to patch exploitable SSLVPN bug immediately
- Genetic engineering meets reverse engineering: DNA sequencer’s vulnerable BIOS
- Vulnerable Moxa devices expose industrial networks to attacks
- ThievingFox – remotely retrieving credentials from password managers and Windows utilities
- Backdooring your backdoors – another $20 domain, more governments
- Malicious npm campaign targets Ethereum developers with fake Hardhat packages
- Critical vulnerabilities found in Fancy Product Designer plugin
- Intelligence Insights: December 2024
- Recent cases of watering hole attacks, part 2
- Inside FireScam : An information stealer with spyware capabilities
- Banshee: The stealer that “stole code” from MacOS XProtect
- Information stealer masquerades as LDAPNightmare (CVE-2024-49113) PoC exploit
- CryptBot: Hunting for initial access vector
- PeakLight: Illuminating the shadows
- FunkSec – alleged top ransomware group powered by AI
- Transaction simulation spoofing: A new threat in Web3
- Chinese state-sponsored RedDelta targeted Taiwan, Mongolia, and Southeast Asia with adapted PlugX infection chain
- Blurring the lines: How nation-states and organized cybercriminals are becoming alike
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.