Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Trump officials weigh encryption crackdown
- How a big U.S. chip maker gave China the ‘keys to the kingdom’
- US launches cyber-attack aimed at Iranian rocket and missile systems
- Iran says power grid hit by cryptocurrency-mining surge
- Israel hit by mysteriously recurring GPS disruptions in its airspace
- Western intelligence hacked ‘Russia’s Google’ Yandex to spy on accounts
- Lord of the Flies: An open-source investigation into Saud Al-Qahtani
- Skripal poisoning: Third Russian suspect ‘commanded attack’
- Spanish women arrested after reporting to police that their hitman had ripped them off
- The hotel hackers are hiding in the remote control curtains
- Sting catches another ransomware firm — Red Mosquito — negotiating with “hackers”
- Second Florida city pays giant ransom to ransomware gang in a week
- German police raid OmniRAT developer and seize digital assets
- Police arrest 6 in $28 million cryptocurrency fraud probe
- Hackers steal millions from cryptocurrency exchange Bitrue + more information
- Firefox will give you a fake browsing history to fool advertisers
- When Myspace was king, employees abused a tool called ‘Overlord’ to spy on users
- The Pentagon has a laser that can identify people from a distance – by their heartbeat
- This horrifying app undresses a photo of any woman with a single click
For the more technical
- EA Origin vulnerability could have risked 300 million users (PDF)
- OpenSSH now encrypts secret keys in memory against side-channel attacks
- How I hacked the Microsoft Outlook Android app and found CVE-2019-1105
- Multiple vulnerabilities in Advantech WebAccess/SCADA
- Vulnerabilities in Siemens industrial products
- Critical vulnerability in SICK MSC800 PLC
- Some Medtronic insulin pumps vulnerable to hacker attacks
- New Silex malware is bricking IoT devices, has scary plans
- ATM shimmers supplanting skimmers
- Golang-based spreader used in a cryptocurrency-mining malware campaign
- Tracing the supply chain attack on Android
- How Verizon and a BGP Optimizer knocked large parts of the Internet offline today
- SKS keyserver network under attack
- When document.domain is not equal to document.domain
- Iranian threat actor amasses large cyber operations infrastructure network to target Saudi organizations
- Premature cyber escalation
- Hackers are stealing years of call records from hacked cell networks
- Global telecom carriers attacked by suspected Chinese hackers
- A worldwide campaign against telecommunications providers
- Inside the West’s failed fight against China’s ‘Cloud Hopper’ hackers
- Wipro wasn’t a one-off: Same hacking crew targeted scores of firms, big and small
- Trend Micro wraps up investigation into Fxmsp hack: Code was “artifacts used for debugging purposes”
- Fancy Bear’s new faces
- Suspected Russian intelligence operation
- ViceLeaker operation: mobile espionage targeting Middle East
- ShadowGate returns to worldwide operations with evolved Greenflash Sundown exploit kit
- Welcome Spelevo: New exploit kit full of old tricks
- I was 7 words away from being spear-phished
- Phish Insight – free phishing simulation tool
- Verifying running processes against VirusTotal – domain-wide
- Apple Watch forensics: Analysis
- The not so ultra lock
- Microsoft announces OneDrive Personal Vault for sensitive files
- Microsoft to require multi-factor authentication for cloud solution providers
- Google’s new reCAPTCHA has a dark side
- How Google adopted BeyondCorp
- A reflection on the history of cellular security research and the security outlook of 5G
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.