Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- China adopts law on cryptography
- 6 new MSPs and/or cloud-based service providers compromised by ransomware
- Cyber-attack hits Utah wind and solar energy provider
- Largest cyber-attack in Georgia’s history linked to hacked web hosting provider
- The Pirate Bay was recently down for over a week due to a DDoS attack
- I accidentally uncovered a nationwide scam on Airbnb
- 60 e-commerce fraudsters busted during international operation
- Biggest single card database ever on sale on dark net marketplace
- UniCredit reveals data breach exposing 3 million customer records
- Teens find circumventing Apple’s parental controls is child’s play
For the more technical
- Pwn2Own Miami – bringing ICS into the Pwn2Own world
- RouterOS: Chain to root
- On Halloween night, Google discloses Chrome zero-day exploited in the wild
- Vulnerability in EU cross-border authentication software (eIDAS Node)
- Unpatched Linux bug may open devices to serious attacks over Wi-Fi
- Bypassing authentication on SSH bastion hosts
- Security researcher gets access to all FurryTail pet feeders around the world
- A tale of exploitation in spreadsheet file conversions
- Stealing private keys from a secure file sharing service
- De-anonymization via clickjacking in 2019
- CertUtil Qualms: They came to drop FOMBs
- Steam-powered scammers
- Xhelper: Persistent Android dropper app infects 45K devices in past 6 months
- Dozens of apps still dodging Google’s vetting system
- The commoditization of mobile espionage software
- QSnatch – malware designed for QNAP NAS devices
- [VIDEO] WannaCry: The Marcus Hutchins story
- MESSAGETAP: Who’s reading your text messages?
- Russian hackers are still targeting the Olympics, three years on
- New cyberattacks targeting sporting and anti-doping organizations
- Russia-linked group likely used Iranian hacking tools, NSA says
- North Korean malware found on Indian nuclear plant’s network
- Calypso APT: new group attacking state institutions
- Microsoft announces Secured-core PCs to counter firmware attacks
- Microsoft Office encryption evolution: from Office 97 to Office 2019
- Analysis of Qualcomm secure boot chains
- KTRW: The journey to build a debuggable iPhone
- Test your YARA rules against a collection of goodware before releasing them in production
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.