Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- MalwareTech’s donations mostly fraudulent
- Facebook discovers family secrets
- Attacks on US home buyers
- North Korea spies in Ukraine
- Russians accused of treason for helping US catch Russian hackers
- Remote update bricked Samsung TVs
- How a US fraudster was caught
- Don’t post your boarding pass online
- Data analysis used to fight human trafficking
- IT staffers stole classified data
- Millions USD phished with a simple email
- Instagram user data leak
- A US/Russia spy story
- Drug dealer story
- Story of a hotel hacker
- Female hacker interview
- [VIDEO] How was Dread Pirate Roberts identified
For the more technical
- Kronos analysis part 2
- [PDF] Fortinet Threat Landscape Report Q2
- User data leak from secure official mailbox service in Norway
- Nice summary of physical attacks on data security
- Analysis of a malware attacks and leak of stolen data
- AccuWeather app continues to invade user privacy
- BGP configuration errors partially shut down Japan’s internet
- Ronggolawe ransomware analysis
- Brazilian researcher collected .onion addresses
- Game of Thrones leaks used in malware attacks
- UAC bypasses
- [PDF] Indictment of Chinese malware author and some interesting parts
- Critical vulnerabilities in SAP POS
- Detecting hidden microphones with SDR
- Expired plugin domains used in redirect attacks
- Malicious attachments on LinkedIn
- iOS 9.3.5 physical acquisition thanks to jailbreak
- Personal hack via phone number takeover
- Another attack on cryptocurrency users
- Chinese exchanges gambled with customer funds
- How one of ICOs was hacked
- Websites deanonymise bitcoin users
- NotPetya decryption tool
- New exploit prices according to Zerodium
- Interesting malware attack analysis
- Fuze phones vulnerabilities
- About iCloud keychain
- Extracting iCloud keychain
- APT28 attack analysis
- How to frame yourself in thousands of attacks
- [VIDEO] Stuxnet attack results analysis
- Wikileaks attack analysis
- Free RAT with a backdoor
- PowerPoint attack analysis
- GitLab session hijacking
- Online file conversion website hacked
- Threat hunting in ICS
- New Poison Ivy sample analysis
- Hacking gift cards
- Angler Exploit Kit evading EMET
- Bypassing Twitter API restrictions
- Backdoors in Arris modems
- Attacking UEFI
- Malware attacks via USB
- RCE in Western Digital products
- Russian companies help in hacking US phones
- New Turla APT modules: WhiteBear by Kaspersky and Gazer by ESET
- Additional Turla modules described by BitDefender
- TrickBot looking for cryptocurrency
- Cardiac pacemakers recalled for updates + advisory
- Analysis of a huge email addresses dump + description of leak source
- Anonymous messenger steals contact information
- Analysis of a new Neutrino version
- Turning off Intel ME 11
- Evolution of Android ransomware
- Android WireX botnet analysis
- Dumping data from deep insert skimmers
- Exploiting robots
- Phishing techniques
- Vulnerable Jenkins in Snapchat
- Chrome warns about malicious plugins
- Multiplatform malware spreading on Facebook
- Hackers scanning the internet for vulnerabilities
- Rooting Motorola phones
- Cracking 320 million hashes
- BTC exchange attacks in South Korea
- Free malware analysis sandboxes
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.
One thought on “IT Security Weekend Catch Up – September 3, 2017”