IT Security Weekend Catch Up – May 7, 2017

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Macron email leak
  2. Notes on Macron leak
  3. War to replace El Chapo
  4. Drone restriction bypassing with tinfoil

For the more technical

  1. Tor Browser attacks
  2. Analysis of attacks against a Tor server
  3. Intel AMT vulnerability analysis
  4. Intel AMT vulnerability explained
  5. OAuth phishing
  6. Another billion email addresses in Troy Hunts leak database
  7. FIN7 campaign analysis
  8. Konni RAT analysis
  9. Detection of fake updates malware campaign
  10. Snake / Turla on OS X
  11. Analysis of a spy tool Kazuar
  12. [PDF] Ultrasound beacons used to track Android users
  13. [PDF] Report on Switzerland’s security (cyber included)
  14. SuperCMD RAT analysis
  15. Greenbug’s new communication channel
  16. Asus router sends browsing history to Trend Micro
  17. Why mail() is dangerous in PHP
  18. Hacking industrial robots
  19. Unexpected botnet shutdown
  20. Carbanak campaign analysis
  21. Analysis of 3 years of UDP DDoS attacks
  22. Protecting PDF files
  23. RawPOS stealing ID data
  24. Signal user guide
  25. CVE-2017-2636 analysis (Linux kernel)
  26. CVE-2016-7288 analysis (MS Edge)
  27. [PDF] Fraud in telephony networks
  28. How is Google handling access managament
  29. MiTM on OVH servers
  30. Hajime, the good IoT botnet
  31. Bricker bot destroying IoT devices
  32. [PDF] Ad fraud campaign analysis
  33. Botnet controller moving to the cloud
  34. IBM shipped infected USB drives to customers
  35. Spam and phishing in Q1 2017
  36. Analysis of a Chinese APT campaign
  37. New Cerber version analysis
  38. Attacks on Clash of Clans players
  39. Dridex and Locky campaign analysis
  40. Google phishing attack described 6 years ago
  41. Netrepser – targeted JS RAT
  42. Jenkins RCE
  43. Xen guest-to-host escape
  44. Monero mining botnet on Windows servers

Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *