Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- FBI gains access to Sci-Hub founder’s Google account data
- Cybercriminals who breached Nvidia issue one of the most unusual demands ever
- Toyota suspends domestic factory operations after suspected cyber attack
- Russia or Ukraine: Hacking groups take sides
- Conti ransomware group diaries, part I: Evasion
- Conti ransomware group diaries, part II: The office
- Conti ransomware group diaries, part III: Weaponry
For the more technical
- UNC1151/GhostWriter phishing attacks target Ukrainian soldiers
- New Linux vulnerability CVE-2022-0492 affecting cgroups: Can containers escape?
- Can you get pwned with CSS?
- Log4Shell: No mass abuse, but no respite, what happened?
- Seeing is living? Rethinking the security of Facial Liveness Verification in the deepfake era (PDF)
- Shedding light on Samsung’s TrustZone keymaster design (PDF)
- Know your infusion pump vulnerabilities and secure your healthcare organization
- TCP middlebox reflection: Coming to a DDoS near you
- How a simple security bug became a university campus ‘master key’
- JFrog discloses 5 memory corruption vulnerabilities in PJSIP – a popular multimedia library
- CERT-EU: Hardening Signal (PDF)
- Orbot: open-source Tor-powered VPN for iOS
- SMS PVA part 1: Underground service for cybercriminals
- SMS PVA part 2: Underground service for cybercriminals
- SMS PVA part 3: Countries most impacted by service
- TeaBot is now spreading across the globe
- Daxin: Stealthy backdoor designed for attacks against hardened networks
- Cyber threat activity in Ukraine: analysis and resources
- DanaBot launches DDoS attack against the Ukrainian Ministry of Defense
- IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine
- HermeticWiper: A detailed analysis of the destructive malware that targeted Ukraine
- Elections GoRansom – a smoke screen for the HermeticWiper attack
- Free decryptor for HermeticRansom ransomware
- Telegram malware spotted in latest Iranian cyber espionage activity
- RuRAT used in spear-phishing attacks against media organisations in United States
- Conti ransomware source code leaked by Ukrainian researcher
- Threat landscape for industrial automation systems. Statistics for H2 2021
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.