Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- This new tool lets you analyse TikTok hashtags
- CSAM Scanning: EU Commission’s lies uncovered – Surveillance will not save the children
- Children’s rights violations by governments that endorsed online learning during the Covid-19 pandemic
- DuckDuckGo browser allows Microsoft trackers due to search agreement
- A face search engine anyone can use is alarmingly accurate
- Israeli private detective used Indian hackers in job for Russian oligarchs, court filing says
- Russian hackers are linked to new Brexit leak website, Google says
- Hackers took control of famous NFT artist Beeple’s Twitter account
- Elon Musk deep fakes promote new BitVex cryptocurrency scam
- US car giant General Motors hit by cyber-attack exposing car owners’ personal info
- Hacker steals database of hundreds of Verizon employees
- Over 8 GB database exposing millions of hotel guests dumped (for free) on Telegram
- Ransomware attack exposes data of 500,000 Chicago students
- SpiceJet airline passengers stranded after ransomware attack
- Darknet market Versus shuts down after hacker leaks security flaw
- Suspected head of cybercrime gang arrested in Nigeria
For the more technical
- Popular Python and PHP libraries hijacked to steal AWS keys
- Hacker says hijacking libraries, stealing AWS keys was ethical research
- ISaPWN – research on the security of ISaGRAF Runtime
- PS4 Aux Hax 5: Flawed instructions get optimized
- Pre-hijacking attacks on web user accounts (PDF)
- Zyxel security advisory for multiple vulnerabilities of firewalls, AP controllers, and APs
- VMware authentication bypass vulnerability (CVE-2022-22972) technical deep dive
- Cisco Adaptive Security Appliance software Clientless SSL VPN heap overflow vulnerability
- Quanta servers (still) vulnerable to pantsdown
- Fake Windows exploits target infosec community with Cobalt Strike
- Photos of abused victims used in new ID verification scam
- Zoom: Remote code execution with XMPP Stanza Smuggling
- Detecting and preventing privilege escalation attacks leveraging Kerberos relaying (KrbRelayUp)
- What’s wrong with automotive mobile apps?
- Android apps with millions of downloads exposed to high-severity vulnerabilities
- PDF malware is not yet dead
- ChromeLoader: a pushy malvertiser
- GoodWill ransomware forces victims to donate to the poor and provides financial assistance to patients in need
- Yashma ransomware, tracing the Chaos family tree
- New Nokoyawa variant catching up to peers with Blatant code reuse
- New Linux-based ransomware Cheerscrypt targets ESXi devices
- REvil resurgence? Or a copycat?
- IT threat evolution in Q1 2022. Mobile & non-mobile statistics
- Beneath the surface: Uncovering the shift in web skimming
- Sandworm uses a new version of ArguePatch to attack targets in Ukraine
- Twisted Panda: Chinese APT espionage operation against Russian’s state-owned defense institutes
- Unknown APT group has targeted Russia repeatedly since Ukraine invasion
- Hunting a global telecommunications threat: DecisiveArchitect and Its custom implant JustForFun
- Threat group naming schemes in cyber threat intelligence
- Fronton: A botnet for creation, command, and control of coordinated inauthentic behavior
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.