Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Alleged theft of Disney movie was a fake
- New carding shop under Trump logo
- US law enforcement traces BTC transactions
- Qatar state news agency hacked
- Story of a man who helped WikiLeaks
- More drugs sold online
- US intelligence trouble in China
- KickAssTorrents founder story
For the more technical
- Emotet v4 analysis
- Malware persistence via extension handlers
- Fraudster trolling
- Windows bluescreen via NTFS
- Very detailed technical description of WannaCry
- Details linking Lazarus to WannaCry
- Linguistic analysis of WannaCry messages
- Comment on WannaCry attribution
- Cyber capabilities of North Korea
- UN experts working on North Korea hacked
- Detailed analysis of a large malwertising campaign
- Cloning fingerprints
- Great analysis of a Russian disinformation campaign
- Remote code execution in Samba – exploit code
- Uncertainty in malware attribution
- Malicious ISO attachments
- UAC bypass part 1, 2 and 3
- Trolling researchers with YARA rules
- Exploiting a V8 OOB write
- Java deserialization scanner
- RCE in some Netgear routers
- Peacemakers security analysis
- Movie subtitles attacks
- Attacks using Zyklon bot
- Hacking Galaxy S8 with a fake eye
- Android encryption analysis
- Tweeting as other users
- New ideas for Java deserialization
- New password strength measurement solution
- QUANTUM INSERT attack example
- Who controls the internet
- Spora ransomware analysis
- How to learn to break cyphers
- Yahoo server memory leaks
- Latest Android patches
- Q1 threats review plus part two
- Hacking SMS messages in Verizon
- Someone published Crysis ransomware keys
- [PDF] DDoS attacks report
- 1Password protecting data at the border
- Huge report on ransomware
- Analysis of attacks with scripts hosted on Pastebin
- Analysis of a Linux server compromise
- Analysis of an attack using multiple NSA tools
- Popular Android apps clicked on ads
- [PDF] Analysis of attacks on hidden services in Tor
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
One thought on “IT Security Weekend Catch Up – May 27, 2017”