Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- When you browse Instagram and find former Australian Prime Minister Tony Abbott’s passport number
- Facebook accused of watching Instagram users through cameras
- Private data gone public: Razer leaks 100,000+ gamers’ personal info
- Chinese database details 2.4 million influential people, their kids, addresses, and how to press their buttons
- German hospital hacked, patient taken to another city dies
- Leading U.S. laser developer IPG Photonics hit with ransomware
- Iranian hackers indicted for stealing data from aerospace and satellite tracking companies
- Russian nationals indicted for conspiracy to defraud multiple cryptocurrency exchanges and their customers
- Apple helps FBI access the iCloud of protester who ‘firebombed at least two police cars’
- Report: 97% of cybersecurity companies have leaked data on the Dark Web
- How to blur your house on Google Street View (and why you should)
For the more technical
- How YubiKeys are made: Security at scale
- About the security content of iOS 14.0 and iPadOS 14.0
- Backdoors and other vulnerabilities in HiSilicon based hardware video encoders
- Zerologon: Unauthenticated domain controller compromise by subverting Netlogon cryptography (PDF)
- Chrome sandbox escape vulnerability earns researchers $20,000
- Speculative probing: Hacking blind in the Spectre era (PDF)
- BLESA: Spoofing attacks against reconnections in Bluetooth Low Energy (PDF)
- Oversecured detects dangerous vulnerabilities in the TikTok Android app
- Change the username for any Facebook page
- CVE-2018-17145: Bitcoin inventory out-of-memory denial-of-service attack (PDF)
- The state of industrial cybersecurity 2020 (PDF)
- Evolution of attacks in the wild on container infrastructure (PDF)
- Cardbleed: a massive Magento1 hack
- Malvertising campaigns come back in full swing
- Popular marketing tool exposes dating site users in massive data leak
- An overview of targeted attacks and APTs on Linux
- h2c smuggling: Request smuggling via HTTP/2 cleartext (h2c)
- Partners in crime: North Koreans and elite Russian-speaking cybercriminals
- Chinese Ministry of State Security-affiliated cyber threat actor activity
- Cerberus banking Trojan source code released for free to cyberattackers
- Mitigating malware and ransomware attacks
- 360lock smart lock review
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.