Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- NotPetya cost for Merck: $310 million
- Kaspersky admits downloading non-executable files
- Great data analysis of Russian hacking operations
- North Korea stole warship designs from South Korea
- Story of a perfect Russian Twitter troll
- US ship collision caused by UI confusion
- Academic approach to darknet drug market analysis
- Why Twitter is best for disinformation
- How North Korea bought US helicopters
- Paradise Papers – huge tax heaven leak
- Brokerage accounts hacked for profit
- Huge phishing kits analysis
- Comodo sold SSL business
- Russian GPS jamming
- Facebook CSO on revenge porn
- Great research on real sources of credential leaks
- Mimikatz author story
- Story of the man who hunted Russian hackers
- Estonia arrested Russian hacker
- Thumb unlocking causes unplanned plane landing
- Sleeping Twitter accounts activated on the day of US elections
- Weapons trading on Telegram
- Hostile surveillance
- MtGox owner can earn a lot during bankruptcy
- Art galleries victims of cybercrime
For the more technical
- MySpace and its role in huge ad fraud
- Online malware analysis
- Configuring simple malware analysis environment
- Cleartext passwords stolen from Hetzner South Africa
- TorBrowser data leak vulnerability
- Typosquatting in email domains
- Chinese APT campaign analysis
- Posting GIFs as other users on Facebook
- WordPress SQLi – description and explanation
- Oracle Identity Manager default password
- On unlocking iPhones
- Analysis of an interesting security incident
- Losing and retrieving a few BTC
- ROCA attack details
- Getting access to Google’s vulnerabilities database
- Interesting web app vulnerability
- Activity of Iranian APT Greenbug
- Analysis of the Morris worm
- Strange attacks on darknet drug markets
- Reaper botnet analysis
- Shop with stolen RDP credentials
- Facebook reading suspicious links
- MailChimp new policy
- Huge phishing kits analysis
- APT 29 observations
- What to do with a locked iPhone
- BadRabbit attack was supposed to hide another campaign
- Limiting DDE attacks
- Huge BGP incident analysis
- Exploiting CVE-2017-5123 (Linux)
- Interesting AV vulnerability
- Detecting phishing attacks
- ChessMaster campaign analysis
- Instagram account takeover
- Vietnamese APT analysis
- 6 Android kernel vulnerabilities
- Cyber operations tracker
- Q3 spam and phishing
- Q3 DDoS attacks
- Windigo botnet operator arrested but botnet still grows
- Distributed password cracking tool
- Palestine APT analysis
- Attacks on database-backed applications
- Analysis of DDE attacks
- Deobfuscating a PHP script
- Mobile Pwn2Own results
- How much does a cyberattack cost
- New WordPress security guide
- Sowbug APT analysis
- APT28 attack analysis
- Data exfiltration via pixels
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.
Nice post!