Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Commission sends preliminary findings to Meta over its “Pay or Consent” model for breach of the Digital Markets Act
- A Bugatti car, a first lady and the fake stories aimed at Americans
- Introducing Docs in Proton Drive – collaborative document editing that’s actually private
- OpenAI’s ChatGPT Mac app was storing conversations in plain text
- Twilio says hackers identified cell phone numbers of two-factor app Authy users
- Europol coordinates global action against criminal abuse of Cobalt Strike
- Man charged over creation of ‘evil twin’ free WiFi networks to access personal data
- Hackers leak alleged Taylor Swift tickets, amp up Ticketmaster extortion
- LockBit claims cyberattack on Croatia’s largest hospital
For the more technical
- Android Security Bulletin – July 2024
- Pixel Update Bulletin – July 2024
- Polyfill.io supply chain attack – Digging into the web of compromised domains
- Vulnerabilities in CocoaPods open the door to supply chain attacks against thousands of iOS and MacOS applications
- regreSSHion: Remote unauthenticated code execution vulnerability in OpenSSH server
- RegreSSHion bug raises alarms but experts question chances of widespread exploitation
- Indirector: High-precision branch target injection attacks exploiting the Indirect Branch Predictor (PDF)
- Cisco NX-OS software CLI command injection vulnerability
- Perma-vuln: D-Link DIR-859, CVE-2024-0769
- Vulnerabilities in PanelView Plus devices could lead to remote code execution
- Juniper releases out-of-cycle fix for max severity auth bypass flaw
- GrimResource – Microsoft Management Console for initial access and evasion
- The rise of packet rate attacks: When core routers turn evil
- CapraTube remix: Transparent Tribe’s Android spyware targeting gamers, weapons enthusiasts
- Exposing FakeBat loader: distribution methods and adversary infrastructure
- Eldorado ransomware: The new golden empire of cybercrime?
- New ransomware operator Volcano Demon serving up LukaLocker
- Mekotio banking trojan threatens financial systems in Latin America
- Building Casper’s Shadow
- New InnoSetup malware created upon each download attempt
- How to detect the modular RAT Csharp-Streamer
- Unfurling Hemlock: New threat group uses cluster bomb campaign to distribute malware
- Caught in the net: Using infostealer logs to unmask CSAM consumers
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.