Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Announcing HackerOne’s FedRAMP authorization
- Hacker leaks 40 million user records from popular Wishbone app
- Chinese hackers suspected of stealing details of 9 million EasyJet customers
- Japan suspects missile data leak in Mitsubishi cyberattack
- Israel behind cyberattack that caused ‘total disarray’ at Iran port
- Xbox and Windows NT 3.5 source code leaks online
- EU Parliament says sensitive data of 1,200 officials left exposed on web
- Dutch spies helped Britain’s GCHQ break Argentine crypto during Falklands War
- Espionage or journalism? After the Snowden NSA leaks
- Introducing BotSight: A new tool to detect bots on Twitter in real-time
- Hackers preparing to launch ransomware attacks against hospitals arrested in Romania
For the more technical
- More intuitive privacy and security controls in Chrome
- The best antiviruses 2020 for business and home to protect Windows 10
- QNAP pre-auth root RCE affecting ~312K devices on the Internet
- 15 years later: Remote Code Execution in qmail (CVE-2005-1513)
- Abusing WebRTC to reveal coarse location data in Signal
- BIAS: Bluetooth Impersonation AttackS
- NXNSAttack: Recursive DNS inefficiencies and vulnerabilities (PDF)
- GhostDNS source code leaked
- Researchers divulge details on five Windows zero days
- Microsoft removes malicious extensions from Edge Add-ons Store
- WolfRAT – a new Android malware based on a leak of the DenDroid malware family
- In depth analysis of Lazarus validator
- Asnarök attackers twice modified attack midstream
- Ragnar Locker ransomware deploys virtual machine to dodge security
- ATT&CKing ProLock Ransomware
- IT threat evolution Q1 2020 + statistics
- Academic data centers abused for crypto currency mining
- Counter Threat Unit researchers publish threat group definitions
- Iranian Chafer APT targeted air transportation and government in Kuwait and Saudi Arabia
- RATicate: an attacker’s waves of information-stealing malware
- No “Game over” for the Winnti group
- Vigilante hackers target ‘scammers’ with ransomware, DDoS attacks
- The unattributable “db8151dd” data breach
- Epic Games ignored epic subdomain takeover on their authentication domain, promoted $1 million bounty to address user complaints
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.