IT Security Weekend Catch Up – March 20, 2022

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Sanctions halt rewards for bug hunters in Belarus, Russia
  2. Fears of Russian spying prompts Germany to ditch Kaspersky
  3. Ukraine has started using Clearview AI’s facial recognition during war
  4. Powered by artificial intelligence, ‘autonomous’ border towers test Democrats’ support for surveillance technology
  5. Israeli government sites crash in cyberattack
  6. Russian defense firm Rostec shuts down website after DDoS attack
  7. Automotive giant DENSO hit by new Pandora ransomware gang

For the more technical

  1. CVE-2022-0847 aka Dirty Pipe vulnerability in Linux kernel
  2. About the security content of iOS 15.4 and iPadOS 15.4
  3. Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware
  4. Analyzing a PJL directory traversal vulnerability – exploiting the Lexmark MC3224i printer
  5. Android trojan persists on the Google Play Store since January
  6. AbereBot returns as Escobar
  7. Android malware Escobar steals your Google Authenticator MFA codes
  8. Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure
  9. Have your cake and eat it too? An overview of UNC2891
  10. Analysis of CaddyWiper – wiper targeting Ukraine
  11. CaddyWiper: New wiper malware discovered in Ukraine
  12. Leaks of Conti ransomware group paint picture of a surprisingly normal tech start-up… sort of
  13. Exposing initial access broker with ties to Conti
  14. SecurityScorecard discovers new botnet, ‘Zhadnost,’ responsible for Ukraine DDoS attacks
  15. Cyclops Blink sets sights on Asus routers
  16. B1txor20, a Linux backdoor using DNS tunnel
  17. Famous npm package deletes files to protest Ukraine war
  18. Threat actor UAC-0056 targeting Ukraine with fake translation software
  19. Government agencies in Ukraine targeted in cyber-attacks deploying MicroBackdoor malware
  20. Fake antivirus updates used to deploy Cobalt Strike in Ukraine
  21. Russian state-sponsored cyber actors gain network access by exploiting “PrintNightmare” vulnerability
  22. Increase in malware sightings on GoDaddy managed hosting
  23. CoverDrop: Securing initial contact for whistleblowers (PDF)

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *