Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Interesting analysis of belgian terror network
- The intersection of cyber and nuclear war
- The forgotten prisoner of a spyware deal gone wrong
- Clever casino player must return winnings
- New leads in DB Cooper case
- Cyber cold war
For the more technical
- JavaScript ransomware analysis
- Are there any Android webinjects?
- List of IoT hacks
- Where are the large Locky campaigns gone
- Threat intelligence resource list
- Emoticons that can crash iPhones
- Some ancient malware discovered on OS X
- Detailed analysis of EyePyramid attacks
- A very detailed analysis of a Java RAT campaign
- Huawei IP TV hacking
- Automated backdooring of hacked webservers
- Carbanak using Google services for C&C
- Redis hacking
- Backdoor collection in vBulletin database
- Botnet C&C locations in 2016
- Clever malware uses Microsoft tool
- Government access requests comparison
- Malicious websites with real HTTPS certificates – analysis
- Developer added backdoors to websites he built
- Default accounts in Meraki equipment
- Luminosity RAT C&C infrastructure analysis
- Hacking Samsung smartcams
- Multiple vulnerabilities in ZyXEL home routers
- Trust and security in browsers
- Neutrino campaign analysis
- [PDF] DMARC whitepaper from CERT-EU
- Malicious Andrid app downloaded a million times
- LastPass does not encrypt everything?
- A very detailed Android ransomware analysis
- CVSSv3 comment
- WeChat censorship
- [PDF] Dovecot audit report (excellent result)
- Android malware analysis
- Car location monitoring via various service providers
- Secrets hidden inside Android apps
- Stealing passwords from McDonald’s users
- New IoT honeypot
- Injecting JavaScript into PDF files
- 2016 cyberattacks statistics
- Analysis of a phishing campaign
- New version of Ragebot
- Locky / Kovter campaign analysis
- Android debugging via KGDB
- Video pirates using Google servers
- Confirmation of cyberattack on power distribution network in Ukraine
- Clever detection of malicious Android apps
- Bypassing CFG in Windows 10
- Large Carbanak campaign analysis and detailed report
- Keylogger author tracking
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
Great summary – thanks – really like BadCyber 🙂