IT Security Weekend Catch Up – June 2, 2019

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. NATO group catfished soldiers to prove a point about privacy
  2. Potential human costs of cyber operations—Key ICRC takeaways from discussion with tech experts
  3. Silk Road 2.0 admin may only be prosecuted for tax crimes after cooperating with feds
  4. CEO who sold encrypted phones to the Sinaloa cartel sentenced to nine years
  5. I2P network proposed as the next hiding spot for criminal operations
  6. Hackers attack New Zealand’s treasury
  7. New Zealand budget: ‘Hacking’ was actually website blunder
  8. What I learned trying to secure Congressional campaigns

For the more technical

  1. OPCDE 2019 videos are now online
  2. Analysis of CVE-2019-0708 (BlueKeep)
  3. Almost one million vulnerable to BlueKeep vuln
  4. How analyzing one critical DHCP vulnerability in Windows 10 led to discovery of two more
  5. Google researcher finds code execution vulnerability in Notepad
  6. Docker bug allows root access to host file system
  7. Convert Plus plugin flaw lets attackers become a WordPress admin
  8. Permanent URL hijack through 301 HTTP redirect cache poisoning
  9. Disclosing Tor users’ real IP address through 301 HTTP redirect cache poisoning
  10. Exam surveillance – the return. (ExamCookie)
  11. MacOS X GateKeeper bypass
  12. Android users being spammed using fake missed call alerts
  13. Malware against the C monoculture
  14. Hidden Bee: Let’s go down the rabbit hole
  15. The Emotet-ion game
  16. HiddenWasp malware stings targeted Linux systems
  17. 10 years of virtual dynamite: A high-level retrospective of ATM malware
  18. HawkEye malware operators renew attacks on business users
  19. GandCrab ransomware operation says it’s shutting down
  20. A dive into Turla PowerShell usage
  21. Unpacking ASIC firmware: AntMiner exploited
  22. LeakLooker v2 — find more open servers and source code leaks
  23. Web architecture 101
  24. A new (and easy) way to hide content accessibly

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *