IT Security Weekend Catch Up – June 20, 2021

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Russian national convicted of charges relating to Kelihos botnet
  2. Ukrainian police arrest Clop ransomware members, seize server infrastructure
  3. Ten-year hacktivist fugitive Commander X arrested in Mexico
  4. NATO classified cloud platform compromised
  5. NFT creators tricked into installing malware in highly targeted attack
  6. REvil ransomware hits US nuclear weapons contractor
  7. Norway says Chinese group APT31 is behind catastrophic 2018 government hack
  8. Saudi assassins picked up illicit drugs in Cairo to kill Khashoggi

For the more technical

  1. This is how I was able to see Private, Archived Posts/Stories of users on Instagram without following them
  2. Apple issues urgent patches for 2 zero-day flaws exploited in the wild
  3. iPhone bug breaks WiFi when you join hotspot with unusual name
  4. Bombshell report finds phone network encryption was deliberately weakened (PDF)
  5. Deploying secure unified communications/voice and videoover IP systems (PDF)
  6. The top 20 secure PLC coding practices project
  7. What you need to know about Process Ghosting, a new executable image tampering attack
  8. Introducing SLSA, an end-to-end framework for supply chain integrity
  9. LockBit RaaS in-depth analysis (PDF)
  10. Smoking out a DARKSIDE affiliate’s supply chain software compromise
  11. Andariel evolves to target South Korea with ransomware
  12. Hades ransomware operators use distinctive tactics and infrastructure
  13. Paradise ransomware source code released on a hacking forum
  14. Vigilante malware rats out software pirates while blocking ThePirateBay
  15. Ferocious Kitten: 6 years of covert surveillance in Iran
  16. Fake DarkSide campaign targets energy and food sectors
  17. Criminals are mailing altered Ledger devices to steal cryptocurrency
  18. Attackers take advantage of new Google Docs exploit

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *