Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Private messages from 81,000 hacked Facebook accounts for sale
- ‘Stalkerware’ website let anyone intercept texts of tens of thousands of people
- Hackers steal data of over 60,000 Tomorrowland attendees
- Google tackles new ad fraud scheme
- Two hackers behind 2016 Uber data breach have been indicted for another hack
- Stop using Microsoft Edge to download Chrome – unless you want malware
- Porn-watching employee infected government networks with Russian malware
- Mirai co-author gets 6 months confinement, $8.6M in fines for Rutgers attacks
- China has started ranking citizens with a creepy ‘social credit’ system
- China state-owned company charged with Micron secrets theft
- The Justice Department unsealed charges against 10 Chinese intelligence officers (PDF)
- North Korea is using cryptocurrency scams to bypass UN sanctions and fund its regime
- How ‘Mr. Hashtag’ helped Saudi Arabia spy on dissidents
- Phishing attack targeting Italian naval and defense industry
- Bank Islami comes under biggest cyber attack of Pakistan’s history
- How the alleged bomber was caught
- Nobody’s cellphone is really that secure
- Morphisec U.S. citizen threat index of a state-sponsored cyber attack study
- CIA Vault7 leaker to be charged for leaking more classified data while in prison
- The time bandits of Southern California
- Exposing the Invisible: Guides
- Some notes for journalists about cybersecurity
For the more technical
- Bleeding Bit: Exposes enterprise access points and unmanaged devices to undetectable chip level attack
- More information about critical vulnerabilities in BLE chips + Cisco advisory
- Cisco zero-day exploited in the wild to crash and reload devices + more information
- Intel CPUs fall to new hyperthreading exploit that pilfers crypto keys + proof-of-concept exploit
- Buggy software in popular connected storage drives can let hackers read private data
- A nasty DHCPv6 packet can pwn a vulnerable Linux box
- Multiple vulnerabilities in Yi Technology home camera
- Multiple vulnerabilities in Advantech WebAccess
- Google Home (in)security
- Sophos patched two vulnerabilities in HitmanPro.Alert
- Twelve malicious Python libraries found and removed from PyPI
- LIVE555 media streaming library hit by remote code execution flaw
- Telegram Desktop saves conversations locally in plain text
- New critical vulnerability in multiple high-privileged Android services
- Kernel RCE caused by buffer overflow in Apple’s ICMP packet-handling code
- Six critical vulnerabilities affecting Macs, iPhones, and iPads
- [VIDEO] iOS 12.1 allows bypass the passcode to see all contacts private information
- iPhones are allergic to helium + more information
- Logical bug in Microsoft Office Suite – Word embedded video code execution
- Important information about the new capability of broadFileSystemAccess in UWP apps
- Emotet awakens with new campaign of mass email exfiltration
- Trickbot shows off new trick: Password grabber module
- GPlayed’s younger brother is a banker – and it’s after Russian banks
- H-Worm and jRAT Malware: Two RATs are better than one
- New file types emerge in malware spam attachments
- Millions of League of Legends gamers targeted by phishing scam
- Anatomy of a sextortion scam
- Threat actors seek your credentials before you even reach the URL
- Malicious Powershell using a decoy picture
- Diving into malicious AutoIT code
- Detecting compressed RTF
- Dissecting malicious Office documents with Linux
- New DemonBot discovered
- Reverse engineering of the Anubis malware
- Mac cryptocurrency ticker app installs backdoors
- Israel silent as Iran hit by computer virus more violent than Stuxnet
- Honeywell industrial USB threat report (PDF)
- ICS tactical security trends: Analysis of the most frequent security risks observed in the field
- Disrupting the flow: Exposed and vulnerable water and energy infrastructures
- The hidden threat of cyberattacks in the energy and utilities industry (PDF)
- GandCrab: The most popular multi-million dollar ransomware of the year
- Shifting patterns in Internet use reveal adaptable and innovative North Korean ruling elite
- Arik Air – grounded by an Amazon S3 leak
- DNS over HTTPS poses possible risks to enterprises
- Facebook Business takeover
- Getting all the CD keys of any game
- Joseph Mifsud: Rush for the EXIF
- VPN extensions are not for privacy
- Everything about iOS DFU and Recovery Modes
- Apple’s new T2 security chip will prevent hackers from eavesdropping on your microphone
- Introducing reCAPTCHA v3: the new way to stop bots
- Announcing some security treats to protect you from attackers’ tricks
- Windows Defender Antivirus can now run in a sandbox
- Take steps to secure your business and users with our security business assessment
- Human-competitive patches in automatic program repair with Repairnator
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.
One thought on “IT Security Weekend Catch Up – November 3, 2018”