Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Dutch police took over encryoted messaging servers
- Surveillance of journalists
- Russian hacker Kris Kaspersky died in an accident
For the more technical
- Enigma conference recordings
- RCE via MiTM in F-Secure software updater
- Tracking smartphones, defeating MAC randomization: article, paper
- Attacking Nexus 9 with malicious headphones
- Apache Struts vulnerability
- Struts exploit cought in the wild
- Attacks on Struts
- 68% of Java apps using Struts running on vulnerable version
- Targeted attacks on dissidents in Azerbaijan
- Court support system issues wrong decisions
- About password rules
- Analysis of offensive PowerShell usage
- [PDF] Analysis of PowerShell used in attacks
- Analysis of PowerShell attack
- XSS in Google Maps
- Instagram credentials stealer in Google Play store
- Vulnerabilties in WIFICAM cameras
- Pre-auth vulnerability in Drupal services
- Huge research on 0day vulnerabilities lifecycle plus an article and some comments
- Analysis of 87 Java exploits
- Seven vulnerabilities in a web application
- A series of vulnerabilities in airbnb
- New Torrentlocker tricks
- Ransomware used for political purposes
- Targeted attacks by FIN7 group
- Verifone investigating network breach
- Local Windows kernel DoS
- Analysing obfuscated scripts with text editor
- Two files with the same hashes
- Necurs adds DDoS features
- Quantum issues
- Zcoin error analysis
- Poachers try to hack GPS trackers
- Future of SCADA ransomware
- A detailed description of a penetration test: part 1, part 2
- Game cheating
- Critical vulnerability in Hikvision / Dahue equipment
- Smartfones with preinstalled malware
- Rooting with W3 Total Cache and Nginx
- CIA tools leak
- Comment on the leak
- Analysis of one of the accidentally leaked tools
- Risks linked to Uber app
- Spora ransomware analysis
- Stonedrill and Shamoon 2 attacks
- Fancy Bear Android malware analysis
- Spammers leak data via unsecured backup
- Encoding, encryption, hashing, obfuscation
- [PDF] Trend Micro yearly report
- Logging into locked Twitter accounts
- Monitoring local Tor network traffic
- NSS Labs on CrowdStrike product testing
- WD MyCloud NAS hacking
- Macro attacks on OpenOffice
- Excel files increasingly used to spread malware
- Finding Linux systems in Windows registry
- [PDF] Thermal imaging used to attack smartfone logins
- EFI rootkit detection
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
Nice list , thanks for sharing