Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Russian election hacking playbook
- Russian strategy analysis
- How does Russia use its hackers
- EU wants to grab data from US companies
- Apple employees sold customer data in China
- Scamming the scammers
- Many mistakes committed by the NSA leaker
- Opinion on the NSA leak
- Russia plan banning VPNs
- Qatar news agency hacked
- Qatar incident analysis
- Russia suspected in Qatar incident
- Russian crime syndicate members arrested in the US
- Japanese intelligence operations in China
- British intelligence failures
- FitBit data as an alibi
- Stories from sea smugglers
For the more technical
- Windows Kernel Exploitation – part 2
- Security Fest conference recordings
- Threat report for Western Europe
- How are the Dutch spying on cybercriminals
- Very detailed CIA malware analysis
- [PDF] VoLTE network attacks
- Description of the new PPSX file attack
- LatentBot analysis
- Math formula error caused overcharging
- Pulling info on Facebook ad campaigns from other accounts
- Trojan horse blocks AV via certificates
- Android malware with code injection
- WiMAX routers default passwords
- [PDF] Foscam cameras vulnerabilities
- Malware analysis lab configuration
- A very unusual malware communication mechanism
- Car hacking – introduction
- Malicious drive-by Android attacks
- Hacking Mazda via USB
- NGFW test results
- NSA leak analysis
- Scannerl – large scale fingerprinting
- APT19 campaign analysis
- Loki campaign analysis
- Malware downloading command from Britney Spears’ Instagram
- Hacking a Yahoo acquisition
- AppStore fraud examples
- RCE in Symantec Messaging Gateway
- French police seizes Tor servers
- Analysis of vulnerability disclosure delay
- Taking over Twitter accounts
- [PDF] Ultrasonic privacy threats
- Building a Twitter botnet
- Huge Rig Exploit Kit takedown
- CVE-2015-6086 analysis (IE)
- Hacking a Subaru
- Microsoft Word Intruder adding CVE-2017-0199
- From XSS to RCE
- Simple RCE on a Yahoo server
- Taking over domain extensions
- Tor honeypot history
- SecureLogin – new authentication protocol
- Analysis of a simple targeted attack
- Malware authors fails
- Capture The Flag with Google
- QR codes used in attacks in China
- IBM Tivoli Storage Manager vulnerability
- Spam bot failure results
- Detecting Stingrays
- New Android Security program awards
- How Nagra is fighting with pirate streaming
- CVE-2017-0199 analysis (Word)
- Pwnies nominations are open
- Following the money in a DDoS for hire service
- [PDF] ETERNALBLUE analysis
- [PDF] Data transfer via router lights
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
One thought on “IT Security Weekend Catch Up – June 11, 2017”