Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- “10% error rate is okay“ – Leaked EU Commission document regarding Chat Control, the law that requires the mass surveillance of messages and photos
- Italy Data Protection Authority warns websites against use of Google Analytics
- New Firefox privacy feature strips URLs of tracking parameters
- LockBit 3.0 introduces the first ransomware bug bounty program
- Automotive fabric supplier TB Kawashima announces cyberattack
- AMD investigates RansomHouse hack claims, theft of 450GB data
- Cyberattack forces Iran steel company to halt production
- Russian hacking group takes credit for wide-ranging cyberattack on Lithuania
- How mercenary hackers sway litigation battles
- Countering hack-for-hire groups
For the more technical
- 2022 CWE top 25 most dangerous software weaknesses
- The open cloud vulnerability & security issue database
- Dozens of cryptography libraries vulnerable to private key theft
- Notes on OpenSSL remote memory corruption
- Attacking with WebView2 applications
- Cybercriminals use Azure Front Door in phishing attacks
- Log4Shell vulnerability in VMware leads to data exfiltration and ransomware
- Python packages upload your AWS keys, env vars, secrets to the web
- Messenger chatbots now used to steal Facebook accounts
- Organizations at risk of data breaches via misconfigured Kubernetes
- Automated secure configuration guidance from the macOS Security Compliance Project (PDF)
- Tesla Android Project
- Attacks on industrial control systems using ShadowPad
- The SessionManager IIS backdoor
- YTStealer malware: “YouTube cookies! Om nom nom nom”
- Raccoon Stealer v2 – The return of the dead
- ZuoRAT hijacks SOHO routers to silently stalk networks
- Spyware vendor targets users in Italy and Kazakhstan
- Flubot: the evolution of a notorious Android banking malware
- Revive: from spyware to Android banking trojan
- Toll fraud malware: How an Android application can drain your wallet
- Conti vs. LockBit: A comparative analysis of ransomware groups
- Black Basta ransomware
- Smash-and-grab: AstraLocker 2.0 pushes ransomware direct from Office docs
- De-anonymizing ransomware domains on the dark web
- Return of the Evilnum APT with updated TTPs and new targets
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.