IT Security Weekend Catch Up – November 19, 2017

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Eliminating Amazon competitors
  2. On 2FA
  3. Alleged Polish hackers made in Russia
  4. Most effective phishing phrases
  5. Australian minister blames hackers for a porn like
  6. Con artists in Finland
  7. Online harassment story
  8. Inside the fake Facebook profile industry
  9. Story of a hacker hunting paedophiles
  10. Why huge leaks land in a German newspaper
  11. Shadow Brokers leak impact analysis

For the more technical

  1. CCS2017 papers
  2. RuxCon slides
  3. IT threat evolution in Q3
  4. APT trends in Q3
  5. Middle East attacks
  6. BIG-IP server vulnerability
  7. Oracle PeopleSoft vulnerabilities
  8. Pentagon data leak
  9. Lateral movement with Outlook
  10. Serious DJI vulnerabilities
  11. PureVPN tools analysis
  12. Detailed report about “NSA incident” from Kaspersky
  13. Third party scripts risks
  14. Successful ChromeOS attack description
  15. RCE in CouchDB
  16. KRACK attack tools
  17. Analysis of a phishing attack
  18. 17 years old MS Office vulnerability
  19. 79 vulnerabilities in USB drivers
  20. RDP ransomware attacks analysis
  21. OpenSSH vulnerability
  22. Huddle secure platform vulnerability
  23. Multiple vulnerabilities in Foscam cameras
  24. Automated cybercrime market analysis
  25. Shodan but for Tor
  26. Analysis of a small hardware implant
  27. OVH post mortem analysis
  28. IMSI Catcher detector apps analysed
  29. History of AOL warez
  30. Sex toy surveillance
  31. Mining crypto on smartphones
  32. z/OS privilege escalation
  33. iTunes backup security issue in iOS11
  34. Android malware analysis
  35. Creating a backdoor in iMessages
  36. Private authentication – Privacy Pass
  37. Subdomain enumeration guide
  38. RunPE – hiding your code
  39. Shed – dynamic .NET malware analysis tool
  40. Interesting Android attack
  41. How are stolen Apple phones activated
  42. Java deserialization
  43. Interesting Active Directory issue
  44. CVE-2017-16379 analysis (Adobe Acrobat)
  45. Fuzzing the unfuzzable
  46. Malware campaign analysis

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *