Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Ethiopia starts building local rival to Facebook
- Hackers are trying to topple Belarus’s dictator, with help from the inside
- The cyberattack against T‑Mobile: What happened, and what we are doing about it
- Juniper breach mystery starts to clear with new details on hackers and U.S. role
- Bangkok Airways clarifies the incident of a cybersecurity attack
- Gift card gang extracts cash from 100k inboxes daily
- China’s Microsoft hack may have had a bigger purpose than just spying
- Autodesk reveals it was targeted by Russian SolarWinds hackers
- Hackers leak surveillance camera videos purportedly taken from inside Iran’s Evin prison
- Brooklyn woman pleads guilty to unauthorized intrusion into Credit Union’s computer system
- CISA’s catalog of bad practices
- Data Protection Commission announces decision in WhatsApp inquiry
- This seemingly normal Lightning cable will leak everything you type
- Lawyers, bugs, and money: When bug bounties went boom
- Amid backlash, Apple will change photo-scanning plan but won’t drop it completely
For the more technical
- Comparison of protection solutions for home users and small companies
- A new attack surface on MS Exchange – ProxyLogon, ProxyOracle, ProxyShell
- ProxyToken: An authentication bypass in Microsoft Exchange server
- ChaosDB: Critical vulnerability in Microsoft Azure Cosmos DB
- Mozilla VPN completes independent security audit by Cure53
- BrakTooth: Causing havoc on Bluetooth Link Manager
- Fortress S03 WiFi Home Security System vulnerabilities
- Cybercriminal sells tool to hide malware in AMD, NVIDIA GPUs
- CVE-2021-26084 remote code execution on Confluence servers
- A SANS 2021 survey: OT/ICS cybersecurity (PDF)
- Hackers could increase medication doses through infusion pump flaws
- Replay-based attack on Honda and Acura vehicles
- Here’s another free CA as an alternative to Let’s Encrypt
- I figured out how DMARC works, and it almost broke me
- APT attacks using PDF files, possibly by North Korea related group
- Attracting flies with Honey(gain): Adversarial abuse of proxyware
- How MarkMonitor left >60,000 domains for the taking
- QakBot technical analysis
- Indicators of compromise associated with Hive ransomware (PDF)
- Babuk ransomware’s full source code leaked on hacker forum
- Mozi botnet authors arrested in China
- Phorpiex botnet shuts down, source code goes up for sale
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.