Daily brief for 2018-10-08
ASIA
Nil
WORLD
Nil
ATTACKS
- 10/8/18: Dtex, Insider Threat, Privacy News: Dtex Earns Leadership, Product Awards; Insider Compromises French Law Enforcement Agency; The Big Hack
- Google was aware of a flaw that exposed over 500,000 of Google Plus users, but did not disclose it
- Hide and Seek IoT Botnet Now Spreads to New Android Devices Using ADB over Wi-Fi
- Google Says Social Network Bug Exposed Private Data
- Google+ Is Shutting Down After a Security Bug Exposed User Info
- Google chose not to go public about bug that exposed Google Plus users’ data
- Google shuts down Google+ after API bug exposed details for over 500,000 users
- Assassin’s Creed Odyssey suffers DDoS attack at launch
- #TLBleed exploits abuse Intel's HTT chip feature to leak data. Find out how hackers could launch side-channel attacks to obtain
- California to Ban Weak Passwords
- Phishing Enables Domestic Violence. Education Can Help Stop It.
- GitLab API Vulnerability Leaked Confidential Data On Public Projects
- Google announces plans to close Google+ for consumers following data breach
- Google+ Shutting Down After Bug Leaks Info of 500k Accounts
- .@David_Ingram of @NBCNews reports that political #campaigns and parties say they’re sending many more texts this year than in past
- Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data
- Expert presented a new attack technique to compromise MikroTik Routers
- With 12,556,810 email archives already exposed across misconfigured online file stores, attackers don’t even need to perform #accounttakeovers to gain
- Hook, Line and Sinker: After Phish Get Caught
- ICO hits Heathrow Airport with £120,000 data breach fine over lost USB stick
- MikroTik routers with default credentials can be easily compromised
- Project Insecurity (@insecurity) researchers discovered certain #livechatsoftware that were leaking personal details of employee at several high-profile sites. Discover how
- Aspire Health Lost 'Protected Health Information' after Getting Hacked by a Phishing Scheme
- "Life is short - passwords are long."
- Finnish Communications Regulatory Authority
THREATS
- Google shutting down Google+ after covering up privacy bug
- Hackers exploit vulnerability in Bitcoin code
- Google was aware of a flaw that exposed over 500,000 of Google Plus users, but did not disclose it
- Google Says Social Network Bug Exposed Private Data
- WECON PI Studio HMI software affected by code execution flaws
- Mozilla Patched Multiple Vulnerabilities In Thunderbird 60.2.1
- Google+ Is Shutting Down After a Security Bug Exposed User Info
- Google shuts down Google+ for consumers due to bug found months ago
- Google chose not to go public about bug that exposed Google Plus users’ data
- iOS 12.0.1 Released with Fixes to Passcode Bypass Bugs
- GRRCon Augusta 2018, Ankur Tyagi’s ‘Analyzing Multi-Dimensional Malware Dataset’
- Google+ Shutting Down After Google Discovers API Bug Affecting 500K Users
- Google shuts down Google+ after API bug exposed details for over 500,000 users
- #TLBleed exploits abuse Intel's HTT chip feature to leak data. Find out how hackers could launch side-channel attacks to obtain
- Malware isn't the only threat to Android apps. Others include copies of popular apps and those that abuse permission requests.
Here
- Code Execution Flaws Found in WECON Industrial Products
- GitLab API Vulnerability Leaked Confidential Data On Public Projects
- Code Execution Bug In Malicious Repositories Resolved By Git Project
- #Stegware: it's #Malware that uses #steganography techniques to avoid detection
- 2018's Most Active Ransomware: The Ongoing Evolution of GandCrab
- Websites vulnerable to attack exploiting major framework
- Most hosting providers take too long to remove malware distribution sites
- Google+ Shutting Down After Bug Leaks Info of 500k Accounts
- .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
- Vulnerabilities in RouterOS could enble hackers to take control of routers
- #Shodan, a device search engine, can help identify #ICS security vulnerabilities. Learn more about how Shodan works and how it
- .@ThreatFabric researchers uncovered a #malware that uses overlay techniques to avoid detection. Learn from @lewisnic how this new #Androidmalware --
- NEW #CYBERSAUNA EPISODE: Reinventing the Cold Boot Attack: Modern Laptop Version
@nxsolle and Pasi Saarinen discuss how they discovered a flaw
- Vulnerabilities discovered in electoral counting machines in 23 states
- Most routers full of firmware flaws that leave users at risk
- Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data
- Who's watching your TV? Sony quietly killed three critical Bravia TV bugs
- Microsoft says it can recover files lost to the Windows 10 October Update's data deletion bug
- Mikko Hypponen's Picks For the Top 5 Viruses of All Time - F-Secure Blog
- US government rolls out 2-step verification for .gov domain owners
- Tenable Researcher Reveals Extended MikroTik Router Vulnerability
- Intel’s 9th-Generation Core Processors Unveiled
- MikroTik vulnerability climbs up the severity scale, new attack permits root access
- Google Criticizes Apple Over Safari Security, Flaw Disclosures
- Code execution bug in malicious repositories resolved by Git Project
- Users complain of boot loops on Series 4 Apple Watch due to daylight savings bug
- "It is no secret that the #RemoteDesktop Protocol has long been a source of exploitable vulnerabilities, and it is well
- New Exploit for MikroTik Router WinBox Vulnerability Gives Full Root Access
- #Android #Trojan: How is data being stolen from #messagingapps?
- #GoScanSSH: How does this #malware work and differ from others?
- How did an organized crime group get a zip file from a reputable malware scanning service?
Malware researchers occasionally have ties
- The Git Project addresses a critical arbitrary code execution vulnerability in Git
- Keeping your cloud malware-free: What you need to know
- D-Link Security Updates Fixed Multiple Vulnerabilities in WiFiManager Software
- Virus Attack Hampers the Email System of Ulster Town
- Beware!! Hackers Now Spreading Dangerous FlawedAmmyy Malware Through PDF & IQY File
- First In-The-Wild UEFI Rootkit Discovered
- PoC Attack Escalates MikroTik Router Bug to ‘As Bad As It Gets’
- The MITRE ATT&CK Framework: Command and Control
- .@TrendMicro researchers discovered #FacexWorm, a #malware that uses a #ChromeExtension and @Facebook Messenger to spread. Learn which users are at
CRIME
Nil
POLITICS
Nil