Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- How Assange turned an embassy into a command post for election meddling
- Hackers reported that they have broken the Bulgarian databases with information about millions of citizens + more information
- Slack resets passwords for 1% of its users because of 2015 hack
- QuickBooks cloud hosting firm iNSYNQ hit in ransomware attack
- Hackers breach FSB contractor, expose Tor deanonymization project and more
- Ukrainian hacker arrested after allegedly providing bulletproof hosting to Russian security
- Meet the world’s biggest ‘bulletproof’ hoster
- Alleged KickassTorrents founder continues to fight US extradition
- Ex-Microsoft dev used test account to swipe $10m in tech giant’s own store credits
- Police thought they beat the Darknet drug markets – they didn’t
- Was Bitcoin created by this international drug dealer? Maybe!
- Party like a Russian, carder’s edition
- The one company I gave my address to won’t delete it
- This app lets your Instagram followers track your location
- Health insurers make it easy for scammers to steal millions. Who pays? You
- Stream-rippers successfully counter YouTube’s blocking efforts
- New cyberthreats require new ways to protect democracy
- Office 365 declared illegal in German schools due to privacy risks
- MITM on all HTTPS traffic in Kazakhstan
- Crashed UAE military spy satellite raises possibility of enemy cyberattack
- Galileo is back – still little info from GSA
For the more technical
- Oracle Critical Patch Update Advisory – July 2019
- Reading ASP secrets for $17,000
- Vulnerable firmware in the supply chain of enterprise servers
- Industry response to the BlueKeep vulnerability
- RCE exploit for ZTE H368N/H369A modems
- Dangerous vulnerability in the IGSS system
- Dangerous vulnerabilities in Siemens TIA Administrator, SIMATIC WinCC and PCS7
- Attacking SSL VPN: PreAuth RCE on Palo Alto GlobalProtect, with Uber as case study
- Cracking my windshield and earning $10,000 on the Tesla Bug Bounty Program
- New anesthesia machine vulnerability disclosure tells a bigger story
- A GPS safety tracker is spectacularly unsafe + more information
- Drupal patches critical bug that lets hackers take over sites
- Airline check-in bug may have exposed all y’all boarding passes to spies
- Account takeover on Airbnb acquisition
- How I could have hacked any Instagram account
- Hacking into Tinder’s premium model
- Academics steal data from air-gapped systems via a keyboard’s LEDs
- Facebook is embedding tracking data inside the photos you download
- Attackers can manipulate your WhatsApp and Telegram media files
- Malicious ‘MobonoGram 2019’ app found infecting users in Iran, Russian and the US
- Ursnif – a polymorphic delivery mechanism explained
- Metamorfo banking malware hides by abusing Avast executable
- Hong Kong based malvertiser brokers traffic to fake antivirus scams
- Turla renews its arsenal with Topinambour
- BitPaymer ransomware leveraging new custom packer framework against targets across the U.S.
- BitPaymer source code fork: Meet DoppelPaymer ransomware and Dridex 2.0
- FBI releases master decryption keys for GandCrab ransomware
- Is ‘REvil’ the new GandCrab ransomware?
- Old tools for new money: URL spreading Shellbot and XMRig using 17-year old XHide
- Declining APT34’s invite to join their professional network
- SWEED: Exposing years of Agent Tesla campaigns
- Ke3chang group targets diplomatic missions
- This phishing attacker takes American Express—and victims’ credentials
- MyDashWallet compromised for two months, wallet keys taken
- How Google legally profits from massive fraud on its platform (and what you can do about it)
- My browser, the spy: How extensions slurped up browsing histories from 4M users
- Investigating sources of PII used in Facebook’stargeted advertising (PDF)
- Tracking anonymized Bluetooth devices (PDF)
- An analysis of WeChat’s realtime image filtering in chats
- Auxiliary Loss Optimization for Hypothesis Augmentation for DGA domain detection
- More on trust records, macros and security
- Google: Bigger rewards for security bugs
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.