Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Ad tech surveillance on the public sector web (PDF)
- Facebook stored hundreds of millions of user passwords in plain text for years
- Facebook ruins woman’s attempt to pin crime on her sister
- Facebook-Google scammer pleads guilty in $121 million theft
- Man arrested for selling one million Netflix, Spotify, Hulu passwords
- Flood of 4K James Bond leaks further point to iTunes breach
- Why phone numbers stink as identity proof
- Nokia firmware blunder sent some user data to China + more information
- This spyware data leak is so bad we can’t even tell you about it
- Here’s what it’s like to accidentally expose the data of 230M people
- Education and science giant Elsevier left users’ passwords exposed online
- Buy one device, get data free: Private information remains on donated tech
- Hated and hunted – the perilous life of the computer virus cracker
- Alleged child porn lord faces US extradition
- DDoS-for-hire crackdown leads to 85% drop in attack sizes
- How hackers pulled off a $20 million Mexican bank heist
- UK code breakers drop Bombe, Enigma and Typex simulators onto the web for all to try
- Russia blocks encrypted email provider ProtonMail
- Former Chinese naval officer recounts how he procured aircraft technology for regime
- 1,600 hotel guests secretly live streamed to 4,000+ subscribers
- Leaker, liar, hacker, hoaxer: The Russian contractor who infiltrated Anonymous
- Russian hackers are targeting European governments ahead of May election
For the more technical
- Test of software for online banking protection
- Pwn2Own Vancouver 2019: Day one results
- Pwn2Own Vancouver 2019: Day two results
- Pwn2Own Vancouver 2019: Wrapping up and rolling out
- Google, Microsoft work together for a year to figure out new type of Windows flaw
- CVE-2019-0604: Details of a Microsoft SharePoint RCE vulnerability
- CVE-2019-5786: Analysis & exploitation of the recently patched Chrome vulnerability
- RCE on Steam Client via buffer overflow in Server Info
- PuTTY releases important software update to patch 8 high-severity flaws
- Many vulnerabilities discovered in Moxa industrial switches
- IPv6 unmasking via UPnP
- Over 100,000 GitHub repos have leaked API or cryptographic keys
- Now-patched Google Photos vulnerability let hackers track your friends and location history
- Discovering a zero day and getting code execution on Mozilla’s AWS Network
- Metallurgical giant Norsk Hydro attacked by encrypting malware
- Ransomware or wiper? LockerGoga straddles the line
- What you need to know about the LockerGoga ransomware
- Ransomware forces two chemical companies to order ‘hundreds of new computers’
- Triton is the world’s most murderous malware, and it’s spreading
- AZORult++: Rewriting history
- GlitchPOS: New PoS malware for sale
- New Ursnif variant targets Japan packed with new features
- Shlayer purveyor VeryMal renounces steganography in favor of Google Firebase
- From fileless techniques to using steganography: Examining Powload’s evolution
- Dissecting a NETWIRE phishing campaign’s usage of process hollowing
- A study of RATs: Third timeline iteration
- FIN7 revisited: Inside Astra panel and SQLRat malware
- Clustering and associating attacker activity at scale
- PewDiePie fans keep making junk ransomware + Decrypter for PewCrypt
- A free decrypter for BigBobRoss ransomware
- Mimicking native iOS behavior in Facebook phishing campaign
- Spam warns about Boeing 737 Max crashes while pushing malware
- This giant ad fraud scheme drained users’ data by running hidden video ads in Android apps
- New Mirai variant targets enterprise wireless presentation & display systems
- Some Android VPN apps request access to sensitive permissions they don’t need
- Breaking the bank: Weakness in financial AI applications
- Keep data secure with Gmail confidential mode (beta)
- Practical advice for earning higher Microsoft bounty awards
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.