IT Security Weekend Catch Up – June 2, 2017

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Photos and patient data leaked from plastic surgery clinic
  2. Possible PhishLabs leak
  3. Booz Allen data leak
  4. OneLogin data breach
  5. Ross Ulbricht loses his appeal
  6. Ross Ulbricht almost ended in jail in 2011
  7. Dropbox and LinkedIn hacker closer to the extradition
  8. Malta accuses Russia of hacking gov systems
  9. Story of a brilliant art forger

For the more technical

  1. Mole ransomware analysis
  2. Windows kernel exploitation course – part 1
  3. New Evilginx phishing tool version
  4. [VIDEO] AppSec EU recordings
  5. WannaCry authors made many mistakes with file deletion procedures
  6. Stats and attack analysis for WannaCry
  7. Phone number takeover leading to cryptocurrency theft
  8. Deleted email worth 400 000 USD
  9. AWS Elastic Block Store snapshot security
  10. Skipping SHA-3
  11. EsteemAudit exploit analysis (RDP)
  12. Jeeps stolen via database access
  13. Security issues in Blackboard education system
  14. IoT malware droppers
  15. Forensic analysis of Ford Sync system
  16. Authentication bypass in FreeRADIUS
  17. TheShadowBrokers’ new offer
  18. Hacking a Samsung camera without hacking
  19. From SSRF to RCE
  20. Escaping restricted environments
  21. Gozi trojan horse genealogy
  22. SMB honeypot experience
  23. CFP list for security conferences
  24. Huge malware campaign in Google Play
  25. RCE for TerraMaster F2-420 NAS
  26. Tools for auditing the security of an AWS account
  27. RFID hacking with Proxmark 3
  28. How FBI deanonymized a suspect
  29. Analysis of an interesting phishing attack
  30. Analysis of a Moldavian attacker
  31. Necurs returns
  32. sudo vulnerability leads to privilege escalation
  33. Google will delay business email delivery to better fight phishing
  34. [PDF] Security Analysis of wireless mouse and keyboards
  35. New Wireshark version
  36. [PDF] Ethereum Ponzi schemes

Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *