Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- The history of antivirus software company Malwarebytes
- Facebook’s ex-security chief details his ‘observatory’ for Internet abuse
- Senate intel committee unveils election security report in wake of Mueller hearings
- Amazon’s Rekognition failed in Orlando
- Facebook design flaw let thousands of kids join chats with unauthorized users
- Louisiana declares state of emergency in response to ransomware attack
- Neo-Nazi SWATters target dozens of journalists
- Man accused of hacking Bulgaria’s tax agency is released and given lesser charges
- Irish man who helped operate the “Silk Road” website sentenced to over six years in prison
- Siemens contractor pleads guilty to planting logic bomb in company spreadsheets
- The world’s best bounty hunter is 4’11”. Here’s how she hunts
- Banksy’s art authentication system displays top-notch cryptographic nous
For the more technical
- ProFTPD vulnerability lets users copy files without permission
- With FaceApp in the spotlight, new scams emerge
- Analysis of CVE-2019–11229 — from Git config to RCE
- Just opening a document in LibreOffice can hack your computer
- COModo: From Sandbox to SYSTEM (CVE-2019–3969)
- FortiOS: Improper check for certificate revocation vulnerability
- HackerOne breaks down the top 10 cybersecurity vulnerabilities
- How to steal a million (of your data)
- Citrix concludes investigation of unauthorized internal network access
- How account takeover botnets outsmart traditional security controls
- Multistage attack delivers BillGates/Setag backdoor, can turn Elasticsearch aatabases into DDoS botnet ‘zombies’
- Imperva blocks our largest DDoS L7/brute force attack ever (peaking at 292,000 RPS)
- Airbus A350 software bug forces airlines to turn planes off and on every 149 hours
- A deep dive into Phobos ransomware
- A deep dive into IcedID malware – part I, II & III
- A deep dive into Guildma malware
- GandCrab Doppelgänged his shell?
- Bestsellers in the underground economy: Measuring malware popularity by forum
- Phishing attackers are abusing WeTransfer to evade email gateways
- Hackers exploit Jira, Exim Linux servers to “keep the Internet safe”
- Cybercrime gang adds new tactics to credit card data-stealing campaign
- Resurgent Iron Liberty targeting energy sector
- Advanced mobile surveillanceware, made in Russia, found in the wild (PDF)
- LKRG 0.7 available for download
- Recent container escape and LKRG
- Rapid7 Report: Under the Hoodie 2019
- iOS 13 (Beta) forensics
- Breaking and securing Apple iCloud accounts
- Accessing iCloud with and without a password in 2019
- Finding evil in Windows 10 compressed memory: Volatility and Rekall tools
- Election security through an adversary’s eyes
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.