IT Security Weekend Catch Up – June 24, 2022

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Pegasus used by at least 5 EU countries, NSO Group tells lawmakers
  2. UK to kill ‘irritating’ cookie pop-ups in Brexit data plan
  3. Windows 10 and Windows 11 downloads blocked in Russia
  4. Phishing gang behind several million euros worth of losses busted in Belgium and the Netherlands
  5. New ‘BidenCash’ site sells your stolen credit card for just 15 cents
  6. Lithuania warns of rise in DDoS attacks against government sites
  7. Former Seattle tech worker convicted of wire fraud and computer intrusions
  8. Meet the administrators of the RSOCKS proxy botnet

For the more technical

  1. An autopsy on a zombie in-the-wild 0-day
  2. Securing network management systems: Siemens SINEC NMS
  3. The legacy of “insecure by design” and its implications for certifications and risk management (PDF)
  4. Critical vulnerability in Citrix ADM (PDF)
  5. CISA: Log4Shell exploits still being used to hack VMware servers
  6. The curious tale of a fake Carrier.app
  7. Does Acrobat Reader unload injection of security products?
  8. Quantum Software: LNK file-based builders growing in popularity
  9. JavaScript Hoisting in XSS Scenarios
  10. Awesome RCE techniques
  11. Conti ransomware hacking spree breaches over 40 orgs in a month
  12. The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs
  13. RIG Exploit Kit swaps dead Raccoon with Dridex
  14. BRATA is evolving into an Advanced Persistent Threat
  15. Client-side Magecart attacks still around, but more covert
  16. Matanbuchus: Malware-as-a-service with demonic intentions
  17. APT ToddyCat
  18. Russia’s APT28 uses fear of nuclear war to spread Follina docs in Ukraine
  19. Defending Ukraine: Early lessons from the cyber war (PDF)
  20. Chinese actor takes aim, armed with Nim Language and Bizarro AES
  21. Bronze Starlight ransomware operations use HUI Loader

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *