Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Alleged theft of Disney movie was a fake
- New carding shop under Trump logo
- US law enforcement traces BTC transactions
- Qatar state news agency hacked
- Story of a man who helped WikiLeaks
- More drugs sold online
- US intelligence trouble in China
- KickAssTorrents founder story
For the more technical
- Emotet v4 analysis
- Malware persistence via extension handlers
- Fraudster trolling
- Windows bluescreen via NTFS
- Very detailed technical description of WannaCry
- Details linking Lazarus to WannaCry
- Linguistic analysis of WannaCry messages
- Comment on WannaCry attribution
- Cyber capabilities of North Korea
- UN experts working on North Korea hacked
- Detailed analysis of a large malwertising campaign
- Cloning fingerprints
- Great analysis of a Russian disinformation campaign
- Remote code execution in Samba – exploit code
- Uncertainty in malware attribution
- Malicious ISO attachments
- UAC bypass part 1, 2 and 3
- Trolling researchers with YARA rules
- Exploiting a V8 OOB write
- Java deserialization scanner
- RCE in some Netgear routers
- Peacemakers security analysis
- Movie subtitles attacks
- Attacks using Zyklon bot
- Hacking Galaxy S8 with a fake eye
- Android encryption analysis
- Tweeting as other users
- New ideas for Java deserialization
- New password strength measurement solution
- QUANTUM INSERT attack example
- Who controls the internet
- Spora ransomware analysis
- How to learn to break cyphers
- Yahoo server memory leaks
- Latest Android patches
- Q1 threats review plus part two
- Hacking SMS messages in Verizon
- Someone published Crysis ransomware keys
- [PDF] DDoS attacks report
- 1Password protecting data at the border
- Huge report on ransomware
- Analysis of attacks with scripts hosted on Pastebin
- Analysis of a Linux server compromise
- Analysis of an attack using multiple NSA tools
- Popular Android apps clicked on ads
- [PDF] Analysis of attacks on hidden services in Tor
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
1 thought on “IT Security Weekend Catch Up – May 27, 2017”