IT Security Weekend Catch Up – June 30, 2019

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Trump officials weigh encryption crackdown
  2. How a big U.S. chip maker gave China the ‘keys to the kingdom’
  3. US launches cyber-attack aimed at Iranian rocket and missile systems
  4. Iran says power grid hit by cryptocurrency-mining surge
  5. Israel hit by mysteriously recurring GPS disruptions in its airspace
  6. Western intelligence hacked ‘Russia’s Google’ Yandex to spy on accounts
  7. Lord of the Flies: An open-source investigation into Saud Al-Qahtani
  8. Skripal poisoning: Third Russian suspect ‘commanded attack’
  9. Spanish women arrested after reporting to police that their hitman had ripped them off
  10. The hotel hackers are hiding in the remote control curtains
  11. Sting catches another ransomware firm — Red Mosquito — negotiating with “hackers”
  12. Second Florida city pays giant ransom to ransomware gang in a week
  13. German police raid OmniRAT developer and seize digital assets
  14. Police arrest 6 in $28 million cryptocurrency fraud probe
  15. Hackers steal millions from cryptocurrency exchange Bitrue + more information
  16. Firefox will give you a fake browsing history to fool advertisers
  17. When Myspace was king, employees abused a tool called ‘Overlord’ to spy on users
  18. The Pentagon has a laser that can identify people from a distance – by their heartbeat
  19. This horrifying app undresses a photo of any woman with a single click

For the more technical

  1. EA Origin vulnerability could have risked 300 million users (PDF)
  2. OpenSSH now encrypts secret keys in memory against side-channel attacks
  3. How I hacked the Microsoft Outlook Android app and found CVE-2019-1105
  4. Multiple vulnerabilities in Advantech WebAccess/SCADA
  5. Vulnerabilities in Siemens industrial products
  6. Critical vulnerability in SICK MSC800 PLC
  7. Some Medtronic insulin pumps vulnerable to hacker attacks
  8. New Silex malware is bricking IoT devices, has scary plans
  9. ATM shimmers supplanting skimmers
  10. Golang-based spreader used in a cryptocurrency-mining malware campaign
  11. Tracing the supply chain attack on Android
  12. How Verizon and a BGP Optimizer knocked large parts of the Internet offline today
  13. SKS keyserver network under attack
  14. When document.domain is not equal to document.domain
  15. Iranian threat actor amasses large cyber operations infrastructure network to target Saudi organizations
  16. Premature cyber escalation
  17. Hackers are stealing years of call records from hacked cell networks
  18. Global telecom carriers attacked by suspected Chinese hackers
  19. A worldwide campaign against telecommunications providers
  20. Inside the West’s failed fight against China’s ‘Cloud Hopper’ hackers
  21. Wipro wasn’t a one-off: Same hacking crew targeted scores of firms, big and small
  22. Trend Micro wraps up investigation into Fxmsp hack: Code was “artifacts used for debugging purposes”
  23. Fancy Bear’s new faces
  24. Suspected Russian intelligence operation
  25. ViceLeaker operation: mobile espionage targeting Middle East
  26. ShadowGate returns to worldwide operations with evolved Greenflash Sundown exploit kit
  27. Welcome Spelevo: New exploit kit full of old tricks
  28. I was 7 words away from being spear-phished
  29. Phish Insight – free phishing simulation tool
  30. Verifying running processes against VirusTotal – domain-wide
  31. Apple Watch forensics: Analysis
  32. The not so ultra lock
  33. Microsoft announces OneDrive Personal Vault for sensitive files
  34. Microsoft to require multi-factor authentication for cloud solution providers
  35. Google’s new reCAPTCHA has a dark side
  36. How Google adopted BeyondCorp
  37. A reflection on the history of cellular security research and the security outlook of 5G

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *