Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Jessikka Aro echoes the Smolensk conspiracy. How did she get upon this false lead?
- ‘It’s mindblowing’: US meteorologists face death threats as hurricane conspiracies surge
- Using ChatGPT to make fake social media posts backfires on bad actors
- How to stop advertisers from tracking your teen across the Internet
- These car brands are collecting and sharing your data with third parties
- Chinese researchers break RSA encryption with a quantum computer
- Startup can identify deepfake video in real time
- Matt Mullenweg’s crusade undermines open source
- Hackers breach Pokémon game developer, source code and personal information leaks online
- Two Sudanese nationals indicted for alleged role in Anonymous Sudan cyberattacks
- Web of crime exposed: 5,100 arrests in illegal football gambling crackdown
- Sweden, Finland partner to take down Sipulitie criminal marketplace
- Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach
For the more technical
- How low can you go? An analysis of 2023 time-to-exploit trends
- Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass
- How to install Windows 11 on supported and unsupported PCs, 24H2 edition
- Unpatched Veeam and VPNs leveraged in recent ransomware attacks
- Should we chat, too? Security analysis of WeChat’s MMTLS encryption protocol
- Fake LockBit, real damage: Ransomware samples abuse AWS S3 to steal data
- ClickFix deception: A social engineering tactic to deploy malware
- Technical analysis of a novel IMEEX framework
- Silent threat: Red Team tool EDRSilencer disrupting endpoint security solutions
- Exfiltration over Telegram Bots: Skidding infostealer logs
- FASTCash for Linux
- Water Makara uses obfuscated JavaScript in spear phishing campaign, targets Brazil with Astaroth malware
- Expanding the investigation: Deep dive into latest TrickMo samples
- Malware by the (Bit)Bucket: Unveiling AsyncRAT
- HORUS Protector: The new malware distribution service [part 1] [part 2]
- Iranian cyber actors access critical infrastructure networks
- IcePeony with the ‘996’ work culture
- UAT-5647 targets Ukrainian and Polish entities with RomCom malware variants
- Fraudulent North Korean IT worker schemes: From insider threats to extortion
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.