Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- GRU attacks USA, France, Ukraine from servers linked to Bulgaria
- What is the Hainan Xiandun Technology Development Company?
- Weleakinfo.com: Site hosting stolen credentials taken down after international operation
- A billion medical images are exposed online, as doctors ignore warnings
- New study: The advertising industry is systematically breaking the law
- Man hijacks Portland airport monitor to play video games, until PDX officials declare ‘game over’
- Kim Dotcom wins back k.im domain after dispute & $100k sell-back offer
For the more technical
- Oracle Critical Patch Update Advisory – January 2020
- January Patch Tuesday: Update list includes fixes for Internet Explorer, Remote Desktop, cryptographic bugs
- CVE-2020-0601: the ChainOfFools/CurveBall attack explained with PoC
- Microsoft guidance on scripting engine memory corruption vulnerability
- Dutch govt suggests turning off Citrix ADC devices, mitigations may fail
- Rough patch: I promise it’ll be 200 OK (Citrix ADC CVE-2019-19781)
- Adobe releases their January 2020 security updates
- Busting Cisco’s beans: Hardcoding your way to hell
- IPAS: Security Advisories for January 2020
- Applying a Stuxnet type attack to a Schneider Modicon PLC
- Exploit that gives remote access affects ~200 million cable modems (PDF)
- More than 600 million users installed Android ‘fleeceware’ apps from the Play Store
- Seventeen Android nasties spotted in Google Play, total over 550k downloads
- Critical auth bypass vulnerability in InfiniteWP Client and WP Time Capsule
- Let’s reverse engineer Discord
- United Nations targeted with Emotet malware phishing attack
- Stolen emails reflect Emotet’s organic growth
- Australia bushfire donors affected by credit card skimming attack
- North American electric cyber threat perspective (PDF)
- Phishing Burisma Holdings (PDF)
- Conversation hijacking
- Threats making WAVs – Incident response to a cryptomining attack
- Ryuk ransomware uses Wake-on-Lan to encrypt offline devices
- Nemty ransomware to start leaking non-paying victim’s data
- How to make a Raspberry Pi VPN server
- Apple vs. law enforcement: Cloud forensics
- Announcing the Kubernetes bug bounty program
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.