IT Security Weekend Catch Up – June 30, 2018

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Successfully countering Russian electoral interference
  2. In Mexico, fake news creators up their game ahead of election
  3. In Eastern Europe, U.S. military girds against Russian might and manipulation
  4. The NSA’s hidden spy hubs in eight U.S. cities
  5. Voices of millions of UK taxpayers stored by HMRC
  6. The $5 million surveillance car that hacks iPhones from 500 meters
  7. China takes surveillance to new heights with flock of robotic doves
  8. FireEye refutes claims that it hacked back a Chinese APT
  9. Feds pose as cryptocurrency money launderer to bust alleged dark web dealersmore information
  10. El Chapo’s lawyers say there’s evidence he was just a cartel middle manager
  11. How tech companies use dark patterns to discourage us from exercising our rights to privacy
  12. Paid jailbreak for Nintendo Switches includes anti-piracy code

For the more technical

  1. [WIDEO] Sandbox evasion techniques
  2. Breaking LTE on layer two
  3. Diameter vulnerabilities exposure report
  4. Practical mitigation of DMA-based Rowhammer attacks on ARM (PDF)
  5. Meet TLBleed: a crypto-key-leaking CPU attack that Intel reckons we shouldn’t worry about
  6. The state of industrial cybersecurity 2018
  7. Sophos privilege escalation vulnerabilities
  8. Cisco ASA flaw exploited in the wild
  9. HPE Integrated Lights-Out remote or local code execution
  10. VMWare Workstation DoS vulnerability
  11. WordPress file delete to code execution
  12. PoC||GTFO 18 is out (PDF)
  13. Inference attacks by malicious batteries on mobile devices (PDF)
  14. Gentoo GitHub mirror hacked and considered compromised
  15. Stealing passwords from McDonald’s users
  16. Marketing firm Exactis leaked a personal info database with 340 million records
  17. This popular Facebook app publicly exposed your data for years
  18. Hundreds of hotels affected by data breach at hotel booking software provider
  19. Swann home security camera sends video to wrong user
  20. Freenode targeted by reused password attack
  21. ProtonMail DDoS attacks are a case study of what happens when you mock attackers + additional information
  22. SSDP diffraction abused for DDoS amplification
  23. Tracking dog owners
  24. Attackers use a bag of tricks to target Greek banking customers
  25. Zeus Panda advanced banking trojan gets creative to scam affluent victims in Italy
  26. Tick group weaponized secure USB drives to target air-gapped critical systems
  27. MyloBot – new highly sophisticated botnet
  28. Noteworthy changes to Necurs’ behaviors
  29. Rancor: targeted attacks using PlainTee and DDKong malware families
  30. SamSam ransomware chooses its targets carefully (PDF)
  31. Talos releases ThanatosDecryptor
  32. Analyzing XPS files
  33. An empirical analysis of anonymity in Zcash
  34. VPN comparative test (PDF)
  35. Researchers release app that masks printers’ tracking dots
  36. Exposing the secret Office 365 forensics tool
  37. ‘Have I Been Pwned’ now built into Firefox, 1Password
  38. n6 (Network Security Incident eXchange) by CERT Polska
  39. Announcing STARTTLS Everywhere: securing hop-to-hop email delivery
  40. Wi-Fi Alliance introduces Wi-Fi CERTIFIED WPA3 security

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *