Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Bitcoin creator Satoshi Nakamoto could be unmasked at Florida trial
- Evil Corp: ‘My hunt for the world’s most wanted hackers’
- 1st person to crack Bitfinex, multiple hacking scams: Karnataka hacker’s tell-all statement to police
- US detains crypto-exchange exec for helping Ryuk ransomware gang launder profits
- 7 million Robinhood user email addresses for sale on hacker forum
- Six Palestinian human rights defenders hacked with NSO Group’s Pegasus Spyware
- The software that studies your Facebook friends to predict who may commit a crime
For the more technical
- Linux has a serious security problem that once again enables DNS cache poisoning (PDF)
- Blacksmith – a new kind of Rowhammer attack
- GitHub’s commitment to npm ecosystem security
- Europe’s top 10 pharma manufacturers all have vulnerable web applications
- Practical HTTP header smuggling: Sneaking past reverse proxies to attack AWS and beyond
- Design issues of modern EDRs: bypassing ETW-based solutions
- An APT group exploiting a 0-day in FatPipe WARP, MPVPN, and IPVPN software
- An investigation into SS7 Exploitation Services on the Dark Web
- Cloudflare blocks an almost 2 Tbps multi-vector DDoS attack
- Fake ransomware infection spooks website owners
- Exchange exploit leads to domain wide ransomware
- Vulnerability intelligence: What’s the word in dark web forums?
- RAMP ransomware’s apparent overture to Chinese threat actors
- Conti ransomware group in-depth analysis (PDF)
- New ransomware actor uses password-protected archives to bypass encryption protection
- SharkBot: a new generation of Android trojans is targeting banks in Europe
- Emotet botnet returns after law enforcement mass-uninstall operation
- Guess who’s back
- UNC1151 assessed with high confidence to have links to Belarus, Ghostwriter campaign aligned with Belarusian government interests
- Uncovering MosesStaff techniques: Ideology over money
- Who are latest targets of cyber group Lyceum?
- Iranian targeting of IT sector on the rise
- RedCurl: The awakening (PDF)
- Israeli firm’s spyware linked to attacks on websites in UK and Middle East
- Hunter becomes hunted: Zebra2104 hides a herd of malware
- LAPD: Hidden spy camera detection using smartphone time-of-flight sensors (PDF)
- How do I protect an iOS app from reverse engineering?
- iPhone apps can tell many things about you through the accelerometer
- iPhone acquisition methods compared
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.