Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Macron email leak
- Notes on Macron leak
- War to replace El Chapo
- Drone restriction bypassing with tinfoil
For the more technical
- Tor Browser attacks
- Analysis of attacks against a Tor server
- Intel AMT vulnerability analysis
- Intel AMT vulnerability explained
- OAuth phishing
- Another billion email addresses in Troy Hunts leak database
- FIN7 campaign analysis
- Konni RAT analysis
- Detection of fake updates malware campaign
- Snake / Turla on OS X
- Analysis of a spy tool Kazuar
- [PDF] Ultrasound beacons used to track Android users
- [PDF] Report on Switzerland’s security (cyber included)
- SuperCMD RAT analysis
- Greenbug’s new communication channel
- Asus router sends browsing history to Trend Micro
- Why mail() is dangerous in PHP
- Hacking industrial robots
- Unexpected botnet shutdown
- Carbanak campaign analysis
- Analysis of 3 years of UDP DDoS attacks
- Protecting PDF files
- RawPOS stealing ID data
- Signal user guide
- CVE-2017-2636 analysis (Linux kernel)
- CVE-2016-7288 analysis (MS Edge)
- [PDF] Fraud in telephony networks
- How is Google handling access managament
- MiTM on OVH servers
- Hajime, the good IoT botnet
- Bricker bot destroying IoT devices
- [PDF] Ad fraud campaign analysis
- Botnet controller moving to the cloud
- IBM shipped infected USB drives to customers
- Spam and phishing in Q1 2017
- Analysis of a Chinese APT campaign
- New Cerber version analysis
- Attacks on Clash of Clans players
- Dridex and Locky campaign analysis
- Google phishing attack described 6 years ago
- Netrepser – targeted JS RAT
- Jenkins RCE
- Xen guest-to-host escape
- Monero mining botnet on Windows servers
Did you enjoy this list? You can retweet it and subscribe to one of our feeds on Twitter, Facebook or RSS.
1 thought on “IT Security Weekend Catch Up – May 7, 2017”