IT Security Weekend Catch Up – March 4, 2017

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. How Uber avoids rides for law enforcement and competition
  2. Drug bazaar pays ransom to avoid doxing of employees
  3. Excellent OPSEC advice from Teen Vogue
  4. Finland is winning the information war
  5. Social enginnering to the Oscars
  6. Future cyberwars

For the more technical

  1. Recovering ancient magnetic tapes with precious content
  2. Lazarus group attacks analysis by Trend Micro
  3. Ransomware as a service
  4. Hashcat 3.40 is out
  5. Analysis of Nebula exploit kit
  6. Analysis of a tech suppot scam
  7. Nymaim analysis tool
  8. Analysis of interesting malware sample (PowerShell + DNS)
  9. Hacking TGI Fridays orders
  10. VoIP gateway backdoor
  11. How Google patched a serious vulnerability in thousands of apps
  12. Old WHOIS server takeover
  13. Extracting notification history from iOS backups
  14. Extracting internal Google DNS information
  15. 32 million Yahoo mailboxes had their cookies forged
  16. [PDF] Report on hackers themselves
  17. DDoS attacks in Luxembourg
  18. Gootkit implements own proxy
  19. AWS S3 outage analysis
  20. Hacking Samsung Bootloader
  21. Attack on reCAPTCHA
  22. Attacking Memcache
  23. New code injection method identified in Dridex
  24. SQLi in NextGEN WordPress plugin
  25. Google and e2e encryption
  26. 26 vulnerabilities in password managers
  27. PHP and OPCache problems
  28. A dark vision of the future of ransomware
  29. Analysis of Gamaredon campaign
  30. Smart toys data leak
  31. RCE in ESET for macOS
  32. Analysis of CVE-2016-3353 (IE)
  33. Firefox RCE
  34. History of hash function attacks
  35. How are security products tested
  36. Analysis of Microsoft vulnerabilities
  37. Windows Kernel Local Denial-of-Service
  38. Step by step analysis of a malicious document
  39. Mobile malware evolution
  40. Strange requests that can reach an AWS server
  41. Quantyfying the impact of Cloudbleed
  42. OpenBSD WiFi MiTM attack
  43. Time-based RCE data exfiltration

Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *