IT Security Weekend Catch Up – June 15, 2019

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Former owners of T-Mobile retail store arrested on federal charges alleging $25 million scheme to illicitly unlock cell phones
  2. Man gets 51 months in prison for $10M BEC fraud, romance scam
  3. Authorities arrest three suspected admins of France’s biggest darkweb market
  4. U.S. Customs and Border Protection says photos of travelers were taken in a data breach
  5. Photos of travelers coming in and out of the US have been hacked and stolen
  6. Team of American hackers and Emirati spies discussed attacking The Intercept
  7. Spy used AI-generated face to connect with targets
  8. How cybercriminals recruited young Romanian woman
  9. Alphabet-owned Jigsaw bought a Russian troll campaign as an experiment
  10. Google promises to play nice with ad blockers (again)
  11. WhatsApp is finally going after outside firms that are abusing its platform
  12. Radiohead bypasses hackers to publish its ‘OK Computer’ demos + more information
  13. How a retired couple found lottery odds in their favor

For the more technical

  1. Microsoft releases June 2019 security updates to patch 88 vulnerabilities
  2. Critical vulnerabilities in NTLM allow remote code execution and cloud resources compromise + more information
  3. CVE-2019-2725 exploited and certificate files used for obfuscation to deliver Monero miner
  4. Vulnerabilities in Thunderbird email client allow code execution
  5. RAMBleed: Reading bits in memory without accessing them
  6. Oracle about RAMBleed DRAM vulnerabilities
  7. Critical vulnerability discovered in Evernote’s Chrome extension
  8. MITM proxy: New search hijack method on Mojave
  9. MyBB: From stored XSS to RCE
  10. Critical vulnerability exposes oil tank monitoring devices to attacks
  11. Dangerous vulnerability fixed in Cisco Industrial Network Director
  12. Hunting COM Objects – part I & II
  13. Using Anomaly Detection to find malicious domains
  14. Large european routing leak sends traffic through China Telecom
  15. FIN8 is back in business, targeting the hospitality industry
  16. Outlaw hacking group’s botnet observed spreading miner, Perl-based backdoor
  17. Xenotime now targeting electric sector, in addition to oil and gas
  18. The highly dangerous ‘Triton’ hackers have probed the US Grid
  19. State of industrial control systems in Poland and Switzerland
  20. GoldBrute botnet brute forcing 1.5 million RDP servers
  21. AESDDoS botnet malware infiltrates containers via exposed Docker APIs
  22. Analysis of banking trojan Trickbot
  23. Advanced targeted attack tools found being used to distribute cryptocurrency miners
  24. Ransomware halts production for days at major airplane parts manufacturer + more information
  25. A multidisciplinary assessment of the stalkerware application industry (PDF)
  26. Forensic implications of iOS jailbreaking
  27. Use your Android phone’s built-in security key to verify sign-in on iOS devices
  28. Yubico to replace vulnerable YubiKey FIPS security keys

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *