IT Security Weekend Catch Up – June 8, 2018

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. OUCH! Security Awareness Newsletter: Stop that malware (PDF)
  2. Russia’s active measures architecture: task and purpose
  3. Concerns about election bots, trolls and fakes in Mexico
  4. Hackers post protest messages on Iranian airport monitors
  5. Australian webcams hacked to make secret recordings, posted to YouTube, in online scam
  6. Facebook gave device makers deep access to data on users and friends
  7. Private Internet Access’ “no-logging” claims proven true again in court
  8. IPVanish “no-logging” VPN led Homeland Security to Comcast user
  9. To catch a credit card thief

For the more technical

  1. Nominations open for the Pwnie Awards 2018
  2. Your encrypted photos revealed in macOS cache
  3. F-Secure Anti-Virus: Remote Code Execution via RAR unpacking
  4. Adobe Flash zero-day leveraged for targeted attack in Middle East
  5. Zip Slip vulnerability
  6. Are your cookies telling your fortune?
  7. Reading your emails with a Read&Write Chrome extension same origin policy bypass
  8. A MitM extension for Chrome
  9. Major vulnerabilities in Foscam cameras
  10. Cisco ASA web services denial of service vulnerability
  11. Researcher successfully hacked in-flight airplanes
  12. Ransomware: Unlocking the lucrative criminal business model
  13. RedEye ransomware analysis
  14. VPNFilter exploits endpoints, targets new devices
  15. A totally tubular treatise on Triton and TriStation
  16. Post-tax season spam campaign delivers Ursnif to North American taxpayers
  17. BabaYaga – the self healing WordPress malware (PDF)
  18. Uncovering a sprawling crime ring
  19. IoT botnet C&C server accessible via default credentials
  20. Iron cybercrime group under the scope
  21. Operation Prowli: Monetizing 40,000 victim machines
  22. Aussie firm loses $6.6m to backdoored cryptocurrency
  23. Extracting and analysing Significant Locations
  24. Analyzing TAR files with Elcomsoft Phone Viewer
  25. MyHeritage statement about a cybersecurity incident
  26. A large number of companies are publishing credentials via public Trello boards

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *