Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Former NSA chief Keith Alexander has joined Amazon’s board of directors
- Inside Amazon’s secret program to spy on workers’ private Facebook groups
- OVPN wins court battle after Pirate Bay data demands rejected
- Chilean bank shuts down all branches following ransomware attack
- Netwalker ransomware hits Pakistan’s largest private power utility
- Israel’s Tower Semi halts some operations after cyber attack
- Slovak cryptocurrency exchange Eterbase discloses $5.4 million hack
- Thousands of Razer customers order and shipping details exposed on the web without password
- Secure your Zoom account with Two-Factor Authentication
For the more technical
- Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)
- Raccoon attack allows hackers to break TLS encryption ‘under certain conditions’
- Critical Intel Active Management Technology flaw allows privilege escalation
- Devices supporting Bluetooth BR/EDR and LE using CTKD are vulnerable to key overwrite
- Microsoft September 2020 Patch Tuesday
- Windows 10 themes can be abused to steal Windows passwords
- Microsoft confirms why Windows Defender can’t be disabled via registry
- Windows 10 Sandbox activation enables zero-day vulnerability
- Vulnerabilities in PAN-OS could threaten internal networks security
- How I hacked Facebook again! Unauthenticated RCE on MobileIron MDM
- License to lill: Leveraging license management to attack ICS networks (PDF)
- Kids’ smartwatches are a security nightmare despite years of warnings
- A detailed analysis of spyware masquerading as TikTok
- France, Japan, New Zealand warn of sudden spike in Emotet attacks
- XSS->Fix->Bypass: 10000$ bounty in Google Maps
- Attackers fight for control of sites targeted in File Manager vulnerability
- Who is calling? CDRThief targets Linux VoIP softswitches
- Who are initial access brokers and how do they work?
- Attackers abusing legitimate cloud monitoring tools to conduct cyber attacks
- Epic Manchego – atypical maldoc delivery brings flurry of infostealers
- ‘Baka’ JavaScript skimmer identified (PDF)
- Thanos ransomware: Destructive variant targeting state-run organizations in the Middle East and North Africa
- An overview of targeted attacks and APTs on Linux
- New cyberattacks targeting U.S. elections
- The Internet’s biggest webmaster forum had a data breach
- State of cybersecurity industry exposure at Dark Web
- Digital Education: The cyberrisks of the online classroom
- Technical approaches to uncovering and remediating malicious activity
- Breaking LUKS Encryption
- Where is Twardowski? Mini CTF by SecuRing
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.