Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Macron email leak
- Notes on Macron leak
- War to replace El Chapo
- Drone restriction bypassing with tinfoil
For the more technical
- Tor Browser attacks
- Analysis of attacks against a Tor server
- Intel AMT vulnerability analysis
- Intel AMT vulnerability explained
- OAuth phishing
- Another billion email addresses in Troy Hunts leak database
- FIN7 campaign analysis
- Konni RAT analysis
- Detection of fake updates malware campaign
- Snake / Turla on OS X
- Analysis of a spy tool Kazuar
- [PDF] Ultrasound beacons used to track Android users
- [PDF] Report on Switzerland’s security (cyber included)
- SuperCMD RAT analysis
- Greenbug’s new communication channel
- Asus router sends browsing history to Trend Micro
- Why mail() is dangerous in PHP
- Hacking industrial robots
- Unexpected botnet shutdown
- Carbanak campaign analysis
- Analysis of 3 years of UDP DDoS attacks
- Protecting PDF files
- RawPOS stealing ID data
- Signal user guide
- CVE-2017-2636 analysis (Linux kernel)
- CVE-2016-7288 analysis (MS Edge)
- [PDF] Fraud in telephony networks
- How is Google handling access managament
- MiTM on OVH servers
- Hajime, the good IoT botnet
- Bricker bot destroying IoT devices
- [PDF] Ad fraud campaign analysis
- Botnet controller moving to the cloud
- IBM shipped infected USB drives to customers
- Spam and phishing in Q1 2017
- Analysis of a Chinese APT campaign
- New Cerber version analysis
- Attacks on Clash of Clans players
- Dridex and Locky campaign analysis
- Google phishing attack described 6 years ago
- Netrepser – targeted JS RAT
- Jenkins RCE
- Xen guest-to-host escape
- Monero mining botnet on Windows servers
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
One thought on “IT Security Weekend Catch Up – May 7, 2017”