WINDOWS
- Shedding Skin – Turla’s Fresh Faces
- LoJack for computers used to attack European government bodies
- CVE-2018-8373 Exploit Spotted
- LoJax: First UEFI Malware seen in the Wild
- Foxit PDF Reader fixes serious remote code execution vulnerability
LINUX
- LoJack for computers used to attack European government bodies
UNIX
Nothing to report
ANDROID
- .@ThreatFabric researchers uncovered an #Android malware, #MysteryBot, which uses overlay attacks to avoid detection. Learn how this #malware affects @Google's
- How is Android Accessibility Service affected by a banking Trojan?
- .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
- Researchers found that cheap Android devices were shipped pre-installed backdoors
IOS
- A Remote iOS Bug
MACOS
- Google Project Zero drops macOS exploit, calls out Apple for silent patching
- CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
- macOS Flaw Allows Attackers To Hijack Installed Apps
- Tearing Apart the Undetected (OSX)Coldroot RAT
- An Unpatched Kernel Bug
- OSX/MacRansom; analyzing the latest ransomware to target macs
- Two Bugs, One Func(), part three
- Two Bugs, One Func(), part two
- Two Bugs, One Func(), part one
- Analysis of an Intrusive Cross-Platform Adware; OSX/Pirrit
- More on, "Adware for OS X Distributes Trojans"
- A Google bug breaks the search results in Safari
DATA BREACH
- UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
- .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
- Campaign 2018: Cyberattacks on infrastructure could suppress voter turnout
- Sony accidentally leaked November's PS Plus free games
- US charges Russian military officers over international hacking and disinformation campaigns
- Burgerville Customer Credit Card Info Stolen In Data Breach
- HIDDEN COBRA – FASTCash Campaign
- Database of 200 Million Records Stolen from Apollo in Data Breach
- Irish Data Regulator Likely to Fine Facebook for Data Breach
- 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
- The @UN accidentally exposed credentials on public @trello boards. Plus, #Uber is set to pay $148 million settlement following its
- Burgerville customer credit card info stolen in data breach laid at Fin7's feet
- How #livechatsoftware leak personal #employeedata?
- Democratic congressional intern arrested for doxing GOP senators during Kavanaugh hearing
- Business Email Compromise: When You Don’t Need to Phish.
- Business email compromise made easy for cyber criminals
- In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
- Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined
- UK and allies accuse Russia of cyber attack campaign
- Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
- U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
DENIAL-OF-SERVICE
- California bill bans bots during elections
- Why It’s Time to Nuke the Password
- Why It’s Time to Nuke the Password
MALVERTISING
Nothing to report
PHISHING
- Exclusive: Moving away from passwords to two-factor authentication
- Block Blocking Login Items
- Business Email Compromise: When You Don’t Need to Phish.
- Hackers Selling Facebook Account Logins Details On Dark Web For $3
- Experts recommend avoiding single step logins
- Phishing Attacks Distributed Through CloudFlare's IPFS Gateway
- Why It’s Time to Nuke the Password
- Why It’s Time to Nuke the Password
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
WEB DEFACEMENT
- Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
MALWARE
- Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
- .@ThreatFabric researchers uncovered an #Android malware, #MysteryBot, which uses overlay attacks to avoid detection. Learn how this #malware affects @Google's
- China allegedly infiltrated US companies through implanted hardware backdoors
- Researchers at the 2018 @RSAConference discussed #stegware: @malware that uses #steganography. Discover how this works with expert @lewisnic.
- Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
- Avast AV reclassifies cryptominers | Avast
- Researchers at Cisco Talos (@TalosSecurity) recently discovered #GravityRAT, a remote access #Trojan. Discover how this RAT can check for
- This is also a good time to remind that bugdoors are far more scary than backdoors.
- Fallout Exploit Kit Now Installing the Kraken Cryptor Ransomware
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- Tearing Apart the Undetected (OSX)Coldroot RAT
- Mac Malware of 2017
- WTF is Mughthesec!? poking on a piece of undetected adware
- OSX/MacRansom; analyzing the latest ransomware to target macs
- Mac Malware of 2016
- Towards Generic Ransomware Detection
- Analysis of an Intrusive Cross-Platform Adware; OSX/Pirrit
- Analyzing the Anti-Analysis Logic of an Adware Installer
- Monitoring Process Creation via the Kernel (Part III)
- Monitoring Process Creation via the Kernel (Part II)
- Monitoring Process Creation via the Kernel (Part I)
- More on, "Adware for OS X Distributes Trojans"
- LoJax: First UEFI Malware seen in the Wild
- Virus Bulletin 2018: Attack velocity ramps up
- More than 4,000 ransomware attacks occur every day. Secure your company & build your network at #RiskSec with promo code
- Malicious remote admin tool seemingly linked to KONNI malware, North Korea
- Betabot trojan packed with anti-malware evasion tools
- How is Android Accessibility Service affected by a banking Trojan?
- How does stegware malware exploit steganography techniques?
- .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
- Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
- A new group of #malware -- dubbed #GoScanSSH -- was recently discovered by researchers. Learn how this malware works and
- Seriously if I could make evil semiconductors I would just replace one which is already present rather than adding it.
Show
- WATCH: Top 5 Viruses of All Time by Security Expert @mikko Hyppönen
- New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
- Researchers found that cheap Android devices were shipped pre-installed backdoors
- Google opened the .page domain
- Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers
- Zoho Heavily Used by Keyloggers to Transmit Stolen Data
- Network Outage at Some Recipe Unlimited Locations Caused by Malware
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
EXPLOIT
- Google Project Zero drops macOS exploit, calls out Apple for silent patching
- CVE-2018-8373 Exploit Spotted
- Fallout Exploit Kit Now Installing the Kraken Cryptor Ransomware
- Remote Mac Exploitation Via Custom URL Schemes
- How does stegware malware exploit steganography techniques?
- Secure encrypted #virtualization: How is this technology exploited?
VULNERABILITY
- Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
- CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
- macOS Flaw Allows Attackers To Hijack Installed Apps
- ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
- CVE-2018-8373 Exploit Spotted
- Vulnerability Scanning vs. Penetration Testing by @TripwireInc
- This is also a good time to remind that bugdoors are far more scary than backdoors.
- A Remote iOS Bug
- An Unpatched Kernel Bug
- From the Top to the Bottom; Tracking down CVE-2017-7149
- Two Bugs, One Func(), part three
- Two Bugs, One Func(), part two
- Two Bugs, One Func(), part one
- CVE-2015-3673: Goodbye Rootpipe...(for now?)
- Cisco: Two critical bugs in DNA network software need these urgent patches
- Paper over the Kracks: New techniques can bypass WPA2 flaw mitigations
- Hackers Earn $150,000 in Marine Corps Bug Bounty Program
- Cisco plugs critical flaws in DNA Center and Prime Infrastructure
- Marine Corps bug bounty program finds 150 vulnerabilities
- Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
- Foxit PDF Reader fixes serious remote code execution vulnerability
- A Google bug breaks the search results in Safari
- Hacking for good uncovers over 150 Marine Corps web vulnerabilities
ASIA
- Should You Worry About Software Supply Chain Attacks?
- .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
- Shedding Skin – Turla’s Fresh Faces
- China allegedly infiltrated US companies through implanted hardware backdoors
- Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- A Remote iOS Bug
- APT38 is behind financially motivated attacks carried out by North Korea
- Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined
OCEANIA
- New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
NORTH AMERICA
- UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
- Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
- China allegedly infiltrated US companies through implanted hardware backdoors
- US charges Russian military officers over international hacking and disinformation campaigns
- Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
- Justice Department charges 7 Russian intelligence officers
- CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
- ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
- HIDDEN COBRA – FASTCash Campaign
- Pacific Northwest burger chain hit by FIN7
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- Burgerville customer credit card info stolen in data breach laid at Fin7's feet
- LoJax: First UEFI Malware seen in the Wild
- Hackers Earn $150,000 in Marine Corps Bug Bounty Program
- APT38 is behind financially motivated attacks carried out by North Korea
- U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
SOUTH AMERICA
- APT38 is behind financially motivated attacks carried out by North Korea
EUROPE
- UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
- Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
- Should You Worry About Software Supply Chain Attacks?
- US charges Russian military officers over international hacking and disinformation campaigns
- LoJack for computers used to attack European government bodies
- Justice Department charges 7 Russian intelligence officers
- Russian Fancy Bear APT Linked To Earworm Hacking Group
- Pacific Northwest burger chain hit by FIN7
- Irish Data Regulator Likely to Fine Facebook for Data Breach
- Russian Fancy Bear APT linked to Earworm hacking group
- 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- LoJax: First UEFI Malware seen in the Wild
- UK and allies accuse Russia of cyber attack campaign
- New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
- Experts recommend avoiding single step logins
AFRICA
Nothing to report
HEALTHCARE
- Justice Department charges 7 Russian intelligence officers
- Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers
TRANSPORT
- Shedding Skin – Turla’s Fresh Faces
BANKING & FINANCE
- Should You Worry About Software Supply Chain Attacks?
- China allegedly infiltrated US companies through implanted hardware backdoors
- Burgerville Customer Credit Card Info Stolen In Data Breach
- HIDDEN COBRA – FASTCash Campaign
- Pacific Northwest burger chain hit by FIN7
- Database of 200 Million Records Stolen from Apollo in Data Breach
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
- Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- Burgerville customer credit card info stolen in data breach laid at Fin7's feet
- How is Android Accessibility Service affected by a banking Trojan?
- APT38 is behind financially motivated attacks carried out by North Korea
- Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
- New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
INFORMATION & TELECOMMUNICATION
- Google Project Zero drops macOS exploit, calls out Apple for silent patching
- .@ThreatFabric researchers uncovered an #Android malware, #MysteryBot, which uses overlay attacks to avoid detection. Learn how this #malware affects @Google's
- Shedding Skin – Turla’s Fresh Faces
- ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
- CVE-2018-8373 Exploit Spotted
- Irish Data Regulator Likely to Fine Facebook for Data Breach
- 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- More than 4,000 ransomware attacks occur every day. Secure your company & build your network at #RiskSec with promo code
- Business Email Compromise: When You Don’t Need to Phish.
- In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
- Hackers Selling Facebook Account Logins Details On Dark Web For $3
- Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
- WATCH: Top 5 Viruses of All Time by Security Expert @mikko Hyppönen
- Experts recommend avoiding single step logins
- A Google bug breaks the search results in Safari
- Phishing Attacks Distributed Through CloudFlare's IPFS Gateway
- Google opened the .page domain
- Why It’s Time to Nuke the Password
- Why It’s Time to Nuke the Password
FOOD
Nothing to report
WATER
Nothing to report
ENERGY
- Should You Worry About Software Supply Chain Attacks?
- Shedding Skin – Turla’s Fresh Faces
- Justice Department charges 7 Russian intelligence officers
- Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers
GOVERNMENT & PUBLIC SERVICE
- UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
- Justice Department charges 7 Russian intelligence officers
- APT28 turns away from election hacking and back to cyberespionage
- Irish Data Regulator Likely to Fine Facebook for Data Breach
ASIA
- Should You Worry About Software Supply Chain Attacks?
- .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
- Shedding Skin – Turla’s Fresh Faces
- China allegedly infiltrated US companies through implanted hardware backdoors
- Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- A Remote iOS Bug
- APT38 is behind financially motivated attacks carried out by North Korea
- Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined
WORLD
- UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
- Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
- Should You Worry About Software Supply Chain Attacks?
- Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
- China allegedly infiltrated US companies through implanted hardware backdoors
- US charges Russian military officers over international hacking and disinformation campaigns
- LoJack for computers used to attack European government bodies
- Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
- Justice Department charges 7 Russian intelligence officers
- CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
- Russian Fancy Bear APT Linked To Earworm Hacking Group
- ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
- HIDDEN COBRA – FASTCash Campaign
- Pacific Northwest burger chain hit by FIN7
- Irish Data Regulator Likely to Fine Facebook for Data Breach
- Russian Fancy Bear APT linked to Earworm hacking group
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- Burgerville customer credit card info stolen in data breach laid at Fin7's feet
- LoJax: First UEFI Malware seen in the Wild
- Hackers Earn $150,000 in Marine Corps Bug Bounty Program
- APT38 is behind financially motivated attacks carried out by North Korea
- UK and allies accuse Russia of cyber attack campaign
- New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
- Experts recommend avoiding single step logins
- U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
ATTACKS
- UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
- .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
- Campaign 2018: Cyberattacks on infrastructure could suppress voter turnout
- Sony accidentally leaked November's PS Plus free games
- US charges Russian military officers over international hacking and disinformation campaigns
- Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
- Burgerville Customer Credit Card Info Stolen In Data Breach
- Exclusive: Moving away from passwords to two-factor authentication
- HIDDEN COBRA – FASTCash Campaign
- Database of 200 Million Records Stolen from Apollo in Data Breach
- Irish Data Regulator Likely to Fine Facebook for Data Breach
- 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
- The @UN accidentally exposed credentials on public @trello boards. Plus, #Uber is set to pay $148 million settlement following its
- Burgerville customer credit card info stolen in data breach laid at Fin7's feet
- Block Blocking Login Items
- How #livechatsoftware leak personal #employeedata?
- Democratic congressional intern arrested for doxing GOP senators during Kavanaugh hearing
- California bill bans bots during elections
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
- Business Email Compromise: When You Don’t Need to Phish.
- Business email compromise made easy for cyber criminals
- In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
- Hackers Selling Facebook Account Logins Details On Dark Web For $3
- Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined
- UK and allies accuse Russia of cyber attack campaign
- Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
- Experts recommend avoiding single step logins
- Phishing Attacks Distributed Through CloudFlare's IPFS Gateway
- Why It’s Time to Nuke the Password
- Why It’s Time to Nuke the Password
- U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
THREATS
- Google Project Zero drops macOS exploit, calls out Apple for silent patching
- Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
- .@ThreatFabric researchers uncovered an #Android malware, #MysteryBot, which uses overlay attacks to avoid detection. Learn how this #malware affects @Google's
- Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
- China allegedly infiltrated US companies through implanted hardware backdoors
- Researchers at the 2018 @RSAConference discussed #stegware: @malware that uses #steganography. Discover how this works with expert @lewisnic.
- Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
- Avast AV reclassifies cryptominers | Avast
- Researchers at Cisco Talos (@TalosSecurity) recently discovered #GravityRAT, a remote access #Trojan. Discover how this RAT can check for
- CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
- macOS Flaw Allows Attackers To Hijack Installed Apps
- ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
- CVE-2018-8373 Exploit Spotted
- Vulnerability Scanning vs. Penetration Testing by @TripwireInc
- This is also a good time to remind that bugdoors are far more scary than backdoors.
- Fallout Exploit Kit Now Installing the Kraken Cryptor Ransomware
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- Remote Mac Exploitation Via Custom URL Schemes
- A Remote iOS Bug
- Tearing Apart the Undetected (OSX)Coldroot RAT
- An Unpatched Kernel Bug
- Mac Malware of 2017
- From the Top to the Bottom; Tracking down CVE-2017-7149
- WTF is Mughthesec!? poking on a piece of undetected adware
- OSX/MacRansom; analyzing the latest ransomware to target macs
- Two Bugs, One Func(), part three
- Two Bugs, One Func(), part two
- Two Bugs, One Func(), part one
- Mac Malware of 2016
- Towards Generic Ransomware Detection
- Analysis of an Intrusive Cross-Platform Adware; OSX/Pirrit
- Analyzing the Anti-Analysis Logic of an Adware Installer
- Monitoring Process Creation via the Kernel (Part III)
- Monitoring Process Creation via the Kernel (Part II)
- Monitoring Process Creation via the Kernel (Part I)
- CVE-2015-3673: Goodbye Rootpipe...(for now?)
- More on, "Adware for OS X Distributes Trojans"
- LoJax: First UEFI Malware seen in the Wild
- Cisco: Two critical bugs in DNA network software need these urgent patches
- Virus Bulletin 2018: Attack velocity ramps up
- Paper over the Kracks: New techniques can bypass WPA2 flaw mitigations
- Hackers Earn $150,000 in Marine Corps Bug Bounty Program
- More than 4,000 ransomware attacks occur every day. Secure your company & build your network at #RiskSec with promo code
- Malicious remote admin tool seemingly linked to KONNI malware, North Korea
- Betabot trojan packed with anti-malware evasion tools
- Cisco plugs critical flaws in DNA Center and Prime Infrastructure
- Marine Corps bug bounty program finds 150 vulnerabilities
- How is Android Accessibility Service affected by a banking Trojan?
- How does stegware malware exploit steganography techniques?
- .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
- Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
- A new group of #malware -- dubbed #GoScanSSH -- was recently discovered by researchers. Learn how this malware works and
- Secure encrypted #virtualization: How is this technology exploited?
- Seriously if I could make evil semiconductors I would just replace one which is already present rather than adding it.
Show
- WATCH: Top 5 Viruses of All Time by Security Expert @mikko Hyppönen
- New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
- Foxit PDF Reader fixes serious remote code execution vulnerability
- A Google bug breaks the search results in Safari
- Researchers found that cheap Android devices were shipped pre-installed backdoors
- Google opened the .page domain
- Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers
- Zoho Heavily Used by Keyloggers to Transmit Stolen Data
- Hacking for good uncovers over 150 Marine Corps web vulnerabilities
- Network Outage at Some Recipe Unlimited Locations Caused by Malware
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
CRIME
- Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
- Shedding Skin – Turla’s Fresh Faces
- Avast AV reclassifies cryptominers | Avast
- Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
- Justice Department charges 7 Russian intelligence officers
- CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
- Burgerville Customer Credit Card Info Stolen In Data Breach
- HIDDEN COBRA – FASTCash Campaign
- Pacific Northwest burger chain hit by FIN7
- Database of 200 Million Records Stolen from Apollo in Data Breach
- Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- Burgerville customer credit card info stolen in data breach laid at Fin7's feet
- Remote Mac Exploitation Via Custom URL Schemes
- How is Android Accessibility Service affected by a banking Trojan?
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
- Business Email Compromise: When You Don’t Need to Phish.
- Business email compromise made easy for cyber criminals
- APT38 is behind financially motivated attacks carried out by North Korea
- In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
- Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
- New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
- Experts recommend avoiding single step logins
POLITICS
- UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
- Justice Department charges 7 Russian intelligence officers
- APT28 turns away from election hacking and back to cyberespionage
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
- APT38 is behind financially motivated attacks carried out by North Korea