Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Fool me once: Russian influence operation Doppelganger continues on X and Facebook (PDF)
- How Navy chiefs conspired to get themselves illegal warship Wi-Fi
- Sextortion scams now include photos of your home
- Hackers linked to Russia and Belarus increasingly target Latvian websites, officials say
- Halliburton cyberattack linked to RansomHub ransomware gang
- Justice Department disrupts covert Russian government-sponsored foreign malign influence operation
- Website operators promised fraudsters profit within minutes if they subscribed to illegal service
- Dutch privacy watchdog fines Clearview AI $34 million for ‘illegal’ database of faces
- The Internet Archive loses its appeal of a major copyright case
- Docker-OSX image used for security research hit by Apple DMCA takedown
- Telegram quietly updates website to allow abuse reports following founder’s arrest
- Take action to stop chat control now!
For the more technical
- Exploiting Exchange PowerShell after ProxyNotShell: Part 1 – MultiValuedProperty
- EUCLEAK: Side-channel attack on the YubiKey 5 series (PDF)
- Microsoft Copilot: From prompt injection to exfiltration of personal information
- Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk
- IT threat evolution Q2 2024. Non-mobile & mobile statistics
- TLD tracker: Exploring newly released top-level domains
- Deep analysis of Snake keylogger’s new variant
- Banking trojans: Mekotio looks to expand targets, BBTok abuses utility command
- Mallox ransomware: in-depth analysis and evolution
- Dissecting the Cicada
- Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads
- Unpacking the unpleasant FIN7 gift: PackXOR
- Emansrepo stealer: Multi-vector attack chains
- Luxy: A stealer and a ransomware in one
- CyberVolk ransomware technical & malware analysis
- Earth Lusca uses KTLVdoor backdoor for multiplatform intrusion
- Recent dllFake activity shares code with SecondEye
- Silent intrusions: Godzilla fileless backdoors targeting Atlassian Confluence
- Spoofed GlobalProtect used to deliver unique WikiLoader variant
- Predator spyware infrastructure returns following exposure and sanctions
- Chinese state-linked influence operation Spamouflage masquerades as U.S. voters to push divisive online narratives ahead of 2024 election
- Russian military cyber actors target US and global critical infrastructure
- The emerging dynamics of deepfake scam campaigns on the web
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.