Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- OUCH! Newsletter: Disposing of your mobile device (PDF)
- Thousands face incorrect benefit cuts from automated fraud detector
- Hackers sell access to bait-and-switch empire
- Marriott data breach has cost the hotel chain only $3 million so far, after insurance
- 800+ million emails leaked online by email verification service
- Facebook suit reveals Ukrainian hackers used quizzes to take data from 60,000 users
- Alphabet’s Chronicle security firm launches Backstory telemetry platform
- The prototype iPhones that hackers use to research Apple’s most sensitive code
- As phones get harder to hack, zero day vendors hunt for router exploits
- WikiLeaks veteran: I ‘cooperated’ with feds ‘in exchange for immunity’
- What happened when the FBI took over the Instagram and Kik of a child porn dealer
- US tech firms fear China could be spying on them using power cords
- How the Cincinnati FBI cracked the Chinese spy case at GE Aviation
- As Trump and Kim Met, North Korean hackers hit over 100 targets in U.S. and ally nations
- Google employees uncover ongoing work on censored China search
For the more technical
- Cisco RV130 – It’s 2019, but yet: strcpy + additional information
- Google Chrome web browser vulnerability
- Disclosing vulnerabilities to protect users across platforms
- SirepRAT – RCE as SYSTEM on Windows IoT Core
- Windows Exploit Suggester – Next Generation
- Updated analysis of PatchGuard on Microsoft Windows 10 RS4
- Zerodium offering big bucks for cloud zero-days
- The return of the Equation Editor Exploit – DIFAT overflow
- Finding a vulnerability in Windows Servers deployment services
- The worst of both worlds: Combining NTLM Relaying and Kerberos delegation
- Stopping Drupal’s SA-CORE-2019-003 vulnerability
- Facebook exploit – Confirm website visitor identities
- Facebook Messenger server random memory exposure through corrupted GIF image
- Facebook Messenger bug revealed who you had conversations with
- Finding and exploiting CVE-2018–7445 (unauthenticated RCE in MikroTik’s RouterOS SMB)
- Horizontal Privilege Escalation on Quora which can compromise all users on Quora
- Playing with CloudGoat: hacking AWS with Pacu
- MarioNet: Abusing web browsersfor persistent and stealthy computation (PDF)
- Hundreds of vulnerable Docker hosts exploited by cryptocurrency miners
- Android TV bug gave users access to strangers’ Google Photos
- Reversing, analyzing, and attacking Google’s ‘nearby connections’ on Android
- Android messaging: A few bugs short of a chain
- Gaining domain admin due to a typo
- SPOILER: Speculative load hazards boost Rowhammer and cache attacks (PDF)
- Google reveals “high severity” flaw in macOS kernel
- Google reveals BuggyCow, a rare macOS zero-day vulnerability
- MacOS Malware Pedia
- The supreme backdoor factory
- New SLUB backdoor uses GitHub, communicates via Slack
- Financial cyberthreats in 2018
- Fileless banking trojan targeting Brazilian banks downloads possible botnet capability
- Analysing a massive Office 365 phishing campaign
- State of the Bronze Union: A brief snapshot
- APT40: Examining a China-nexus espionage actor
- Iranian-backed hackers stole data from major U.S. government contractor
- Citrix investigating unauthorized access to internal network
- Rare look inside command and control of nation-state cyber espionage campaign
- Triton: The inside story of the world’s most dangerous malware
- ExSpectre: Hiding malware in speculative execution (PDF)
- How Pirate Matryoshka, the torrent malware from Pirate Bay, works
- Mobile malware evolution 2018
- How to find active VPN connection in the memory dump
- Hacking ski helmet audio
- From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic
- Don’t worry about being locked with Loccess
- Gone in six seconds? Exploiting car alarms
- Firefox to add Tor Browser anti-fingerprinting technique called letterboxing
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.
One thought on “IT Security Weekend Catch Up – March 11, 2019”