IT Security Weekend Catch Up – May 27, 2017

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Alleged theft of Disney movie was a fake
  2. New carding shop under Trump logo
  3. US law enforcement traces BTC transactions
  4. Qatar state news agency hacked
  5. Story of a man who helped WikiLeaks
  6. More drugs sold online
  7. US intelligence trouble in China
  8. KickAssTorrents founder story

For the more technical

  1. Emotet v4 analysis
  2. Malware persistence via extension handlers
  3. Fraudster trolling
  4. Windows bluescreen via NTFS
  5. Very detailed technical description of WannaCry
  6. Details linking Lazarus to WannaCry
  7. Linguistic analysis of WannaCry messages
  8. Comment on WannaCry attribution
  9. Cyber capabilities of North Korea
  10. UN experts working on North Korea hacked
  11. Detailed analysis of a large malwertising campaign
  12. Cloning fingerprints
  13. Great analysis of a Russian disinformation campaign
  14. Remote code execution in Samba – exploit code
  15. Uncertainty in malware attribution
  16. Malicious ISO attachments
  17. UAC bypass part 1, 2 and 3
  18. Trolling researchers with YARA rules
  19. Exploiting a V8 OOB write
  20. Java deserialization scanner
  21. RCE in some Netgear routers
  22. Peacemakers security analysis
  23. Movie subtitles attacks
  24. Attacks using Zyklon bot
  25. Hacking Galaxy S8 with a fake eye
  26. Android encryption analysis
  27. Tweeting as other users
  28. New ideas for Java deserialization
  29. New password strength measurement solution
  30. QUANTUM INSERT attack example
  31. Who controls the internet
  32. Spora ransomware analysis
  33. How to learn to break cyphers
  34. Yahoo server memory leaks
  35. Latest Android patches
  36. Q1 threats review plus part two
  37. Hacking SMS messages in Verizon
  38. Someone published Crysis ransomware keys
  39. [PDF] DDoS attacks report
  40. 1Password protecting data at the border
  41. Huge report on ransomware
  42. Analysis of attacks with scripts hosted on Pastebin
  43. Analysis of a Linux server compromise
  44. Analysis of an attack using multiple NSA tools
  45. Popular Android apps clicked on ads
  46. [PDF] Analysis of attacks on hidden services in Tor

Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *