IT Security Weekend Catch Up – January 7, 2017

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. How the belgian police failed to identify ISIS terrorists
  2. IT technicians performing illegal customer computer searches for FBI
  3. The spy with no name

For the more technical

  1. 33C3 recordings
  2. Technical analysis of CryptoMix/CryptFile2 ransomware
  3. Reverse engineering Toshiba R100 BIOS
  4. Stolen passwords fuel cardless ATM fraud in US
  5. The FBI hack that wasn’t
  6. Analysis of a driver disabling AV
  7. Iranian APT campaign analysis
  8. Analysis of DragonOK APT campaign
  9. Overview of SS7 security flaws
  10. Bruteforcing local WordPress websites
  11. Phishing with fake PDF login
  12. New hashcat 3.30 released
  13. Government’s first report on Russia and DNC is woefully inadequate
  14. How the JAR report did more harm than good
  15. About the indicators in JAR report
  16. Analysis of a related incident
  17. Analysis of CVE-100033 (PHPMailer)
  18. Technical details on the Fancy Bear Android malware (poprd30.apk)
  19. The GRU-Ukraine artillery hack that may never have happened
  20. RCE in Western Digital MyCloud NAS
  21. Box.com data leak
  22. Exploiting MS16-098
  23. Kaspersky: SSL interception differentiates certificates with a 32bit hash
  24. Ultrasound tracking to deanonymize Tor users
  25. KeepKey’s CEO hacked
  26. [PDF] Classification of smartphone users using internet traffic
  27. Exploiting blind SQL injections with Burp Collaborator
  28. Explore hidden networks with double pivoting
  29. List of EU security conferences in 2017
  30. OS X malware in 2016
  31. QNAP NAS heap overflow
  32. How and why the leap second affected Cloudflare DNS
  33. Cache-timing attacks on OpenSSL
  34. Format string vulnerabilities in Python
  35. Crashing iPhones with a single text
  36. JTAG explained
  37. Attacking Nexus 6 and 6P custom boot modes
  38. Introduction to IoT hardware hacking
  39. Lateral movement using the MMC20 application COM object
  40. Tool for finding secrets on GitHub
  41. Buffer overflow explained

Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *