IT Security Weekend Catch Up – September 3, 2021

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!

For the less technical

  1. Ethiopia starts building local rival to Facebook
  2. Hackers are trying to topple Belarus’s dictator, with help from the inside
  3. The cyberattack against T‑Mobile: What happened, and what we are doing about it
  4. Juniper breach mystery starts to clear with new details on hackers and U.S. role
  5. Bangkok Airways clarifies the incident of a cybersecurity attack
  6. Gift card gang extracts cash from 100k inboxes daily
  7. China’s Microsoft hack may have had a bigger purpose than just spying
  8. Autodesk reveals it was targeted by Russian SolarWinds hackers
  9. Hackers leak surveillance camera videos purportedly taken from inside Iran’s Evin prison
  10. Brooklyn woman pleads guilty to unauthorized intrusion into Credit Union’s computer system
  11. CISA’s catalog of bad practices
  12. Data Protection Commission announces decision in WhatsApp inquiry
  13. This seemingly normal Lightning cable will leak everything you type
  14. Lawyers, bugs, and money: When bug bounties went boom
  15. Amid backlash, Apple will change photo-scanning plan but won’t drop it completely

For the more technical

  1. Comparison of protection solutions for home users and small companies
  2. A new attack surface on MS Exchange – ProxyLogon, ProxyOracle, ProxyShell
  3. ProxyToken: An authentication bypass in Microsoft Exchange server
  4. ChaosDB: Critical vulnerability in Microsoft Azure Cosmos DB
  5. Mozilla VPN completes independent security audit by Cure53
  6. BrakTooth: Causing havoc on Bluetooth Link Manager
  7. Fortress S03 WiFi Home Security System vulnerabilities
  8. Cybercriminal sells tool to hide malware in AMD, NVIDIA GPUs
  9. CVE-2021-26084 remote code execution on Confluence servers
  10. A SANS 2021 survey: OT/ICS cybersecurity (PDF)
  11. Hackers could increase medication doses through infusion pump flaws
  12. Replay-based attack on Honda and Acura vehicles
  13. Here’s another free CA as an alternative to Let’s Encrypt
  14. I figured out how DMARC works, and it almost broke me
  15. APT attacks using PDF files, possibly by North Korea related group
  16. Attracting flies with Honey(gain): Adversarial abuse of proxyware
  17. How MarkMonitor left >60,000 domains for the taking
  18. QakBot technical analysis
  19. Indicators of compromise associated with Hive ransomware (PDF)
  20. Babuk ransomware’s full source code leaked on hacker forum
  21. Mozi botnet authors arrested in China
  22. Phorpiex botnet shuts down, source code goes up for sale

Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.

Leave a Reply

Your email address will not be published. Required fields are marked *