Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Fraudsters hijack eBay parcels in a postcode lottery
- Massive wave of account hijacks hits YouTube creators
- Hackers stole data on nearly 5m DoorDash users, including order history
- Russian hacker pleads guilty for involvement in massive network intrusions at U.S. financial institutions
- Regional disruption of production due to malware at Rheinmetall Automotive
For the more technical
- New iOS exploit checkm8 allows permanent compromise of iPhones
- Apple warns about third-party keyboard issue in iOS 13 and iPadOS
- CVE-2019-0801: Microsoft Office Uri Hyperlink Hijinks
- Microsoft releases emergency patches for IE 0-day and Windows Defender flaw
- VMware patches six vulnerabilities in various products
- Cisco IOx for IOS software guest operating system unauthorized access vulnerability
- Anonymous researcher drops vBulletin zero-day impacting tens of thousands of sites
- Critical vulnerability addressed in Jira Service Desk
- Thousands of cloud computing servers could be owned with ‘very simple’ attack
- All your cloud are belong to us (CVE-2019-12491)
- Write-up of DOMPurify 2.0.0 bypass using mutation XSS
- Researchers think they know how many phones are vulnerable to ‘SIMjacker’ attacks
- Airbus hit by series of cyber attacks on suppliers
- How to monitor GitHub for secrets
- PcShare backdoor attacks targeting Windows users with FakeNarrator malware
- Hackers tried to compromise phones of Tibetans working for Dalai Lama
- How hundreds of fake apps spread on iOS App Store and Google Play
- Who IsErIk: A resurface of an advanced persistent adware? (PDF)
- Meet Stop ransomware: The most active ransomware nobody talks about
- CryptonDie – a ransomware developed for study purposes
- Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware
- “Fileless” NodeJS malware burrows deep within the host
- Mapping the connections inside Russia’s APT Ecosystem
- Dtrack and ATMDtrack ATM malware linked to Lazarus
- Trickbot – An analysis of data collected from the botnet
- How Tortoiseshell created a fake veteran hiring website to host malware
- Zebrocy relies on dropbox to supply its dishes to an institution of Eastern Europe diplomatic sector
- No summer vacations for Zebrocy
- Continued targeting of the United States’ utilities sector reveals additional adversary TTPs
- xHunt campaign: Attacks on Kuwait shipping and transportation organizations
- Leading Magecart group targeting captive Wi-Fi users via L7 routers (PDF)
- Behind the scenes of a massively distributed credential stuffing attack
- USB Restricted Mode in iOS 13: Apple vs. GrayKey, round two
- Changes to file types blocked in Outlook on the web
- HTTP/3: the past, the present, and the future
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.