Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Russian election hacking playbook
- Russian strategy analysis
- How does Russia use its hackers
- EU wants to grab data from US companies
- Apple employees sold customer data in China
- Scamming the scammers
- Many mistakes committed by the NSA leaker
- Opinion on the NSA leak
- Russia plan banning VPNs
- Qatar news agency hacked
- Qatar incident analysis
- Russia suspected in Qatar incident
- Russian crime syndicate members arrested in the US
- Japanese intelligence operations in China
- British intelligence failures
- FitBit data as an alibi
- Stories from sea smugglers
For the more technical
- Windows Kernel Exploitation – part 2
- Security Fest conference recordings
- Threat report for Western Europe
- How are the Dutch spying on cybercriminals
- Very detailed CIA malware analysis
- [PDF] VoLTE network attacks
- Description of the new PPSX file attack
- LatentBot analysis
- Math formula error caused overcharging
- Pulling info on Facebook ad campaigns from other accounts
- Trojan horse blocks AV via certificates
- Android malware with code injection
- WiMAX routers default passwords
- [PDF] Foscam cameras vulnerabilities
- Malware analysis lab configuration
- A very unusual malware communication mechanism
- Car hacking – introduction
- Malicious drive-by Android attacks
- Hacking Mazda via USB
- NGFW test results
- NSA leak analysis
- Scannerl – large scale fingerprinting
- APT19 campaign analysis
- Loki campaign analysis
- Malware downloading command from Britney Spears’ Instagram
- Hacking a Yahoo acquisition
- AppStore fraud examples
- RCE in Symantec Messaging Gateway
- French police seizes Tor servers
- Analysis of vulnerability disclosure delay
- Taking over Twitter accounts
- [PDF] Ultrasonic privacy threats
- Building a Twitter botnet
- Huge Rig Exploit Kit takedown
- CVE-2015-6086 analysis (IE)
- Hacking a Subaru
- Microsoft Word Intruder adding CVE-2017-0199
- From XSS to RCE
- Simple RCE on a Yahoo server
- Taking over domain extensions
- Tor honeypot history
- SecureLogin – new authentication protocol
- Analysis of a simple targeted attack
- Malware authors fails
- Capture The Flag with Google
- QR codes used in attacks in China
- IBM Tivoli Storage Manager vulnerability
- Spam bot failure results
- Detecting Stingrays
- New Android Security program awards
- How Nagra is fighting with pirate streaming
- CVE-2017-0199 analysis (Word)
- Pwnies nominations are open
- Following the money in a DDoS for hire service
- [PDF] ETERNALBLUE analysis
- [PDF] Data transfer via router lights
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
1 thought on “IT Security Weekend Catch Up – June 11, 2017”