TRANSNATIONAL / UNKNOWN
- Fin7 Cybercrime Group Hacked Burgerville and Stolen Payment Card Details
CHINA
- Apple tells Congress it was never hacked by Chinese spy chips
- Apple to Congress: Chinese spy-chip story is “simply wrong”
- Bloomberg’s Chinese Hacking Report Is Wrong, Claims Apple
- Apple denies Chinese surveillance claims, Microsoft pulls Windows 10 update video
- UK, US Security Agencies Deny Investigating Chinese Spy Chips
- Why I don’t believe Bloomberg’s Chinese spy chip report
- Department of Homeland Security and GCHQ back Apple and Amazon’s denials they were hacked by China
- Apple, Amazon deny servers affected by China microchip plot
- China inserts microchips into motherboards used by Apple, CIA, Amazon
- China Infiltrated Amazon, Apple, U.S. Companies Using Tiny Chip: Report
- DHS, Apple push back on Bloomberg supply chain story
- DHS and GCHQ Say There's no Reason to Doubt Apple, Amazon Supermicro Hack Denial
- There’s a serious threat to the supply chain, says Pentagon
- DHS and GCHQ join Amazon and Apple in denying Bloomberg chip hack story
- US and UK Governments Back Denial of Supermicro Story
INDIA
Nil
NORTH KOREA
Nil
PAKISTAN
Nil
VIETNAM
Nil
IRAN
Nil
IRAQ
Nil
LEBANON
Nil
PALESTINE
Nil
SAUDI ARABIA
Nil
SYRIA
Nil
TURKEY
Nil
UNITED ARAB EMIRATES
Nil
YEMEN
Nil
RUSSIA
- APT28 Gets the Spotlight, But Turla Remains Russia’s Elite Hacking Unit
- APT28 Hacking Group’s New Espionage Operations Targets Military and Government Organizations
- Russian Privacy Blunder May Have Outed 300 GRU Agents
- Russia dismisses suspected spy actions as routine Dutch trip
- Seven Russian cyberspies indicted for hacking, wire fraud, ID theft
- Investigation Uncovers 300+ Possible GRU Officers
- Researchers: Turla and Zebrocy APT actors shared code, targets in 2018
- Kaspersky shed lights on the overlap of operations conducted by Turla and Sofacy
- First In-The-Wild UEFI Rootkit Discovered
SERBIA
Nil
UKRAINE
Nil
WINDOWS
Nil
LINUX
Nil
UNIX
Nil
ANDROID
Nil
IOS
Nil
MACOS
Nil
DATA BREACH
- 10/8/18: Dtex, Insider Threat, Privacy News: Dtex Earns Leadership, Product Awards; Insider Compromises French Law Enforcement Agency; The Big Hack
- Google was aware of a flaw that exposed over 500,000 of Google Plus users, but did not disclose it
- Google Says Social Network Bug Exposed Private Data
- Google+ Is Shutting Down After a Security Bug Exposed User Info
- Google chose not to go public about bug that exposed Google Plus users’ data
- Google shuts down Google+ after API bug exposed details for over 500,000 users
- #TLBleed exploits abuse Intel's HTT chip feature to leak data. Find out how hackers could launch side-channel attacks to obtain
- GitLab API Vulnerability Leaked Confidential Data On Public Projects
- Google announces plans to close Google+ for consumers following data breach
- Google+ Shutting Down After Bug Leaks Info of 500k Accounts
- .@David_Ingram of @NBCNews reports that political #campaigns and parties say they’re sending many more texts this year than in past
- Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data
- Expert presented a new attack technique to compromise MikroTik Routers
- With 12,556,810 email archives already exposed across misconfigured online file stores, attackers don’t even need to perform #accounttakeovers to gain
- ICO hits Heathrow Airport with £120,000 data breach fine over lost USB stick
- MikroTik routers with default credentials can be easily compromised
- Project Insecurity (@insecurity) researchers discovered certain #livechatsoftware that were leaking personal details of employee at several high-profile sites. Discover how
DENIAL-OF-SERVICE
- Hide and Seek IoT Botnet Now Spreads to New Android Devices Using ADB over Wi-Fi
- Assassin’s Creed Odyssey suffers DDoS attack at launch
MALVERTISING
Nil
PHISHING
- California to Ban Weak Passwords
- Phishing Enables Domestic Violence. Education Can Help Stop It.
- Hook, Line and Sinker: After Phish Get Caught
- Aspire Health Lost 'Protected Health Information' after Getting Hacked by a Phishing Scheme
- "Life is short - passwords are long."
- Finnish Communications Regulatory Authority
WEB DEFACEMENT
Nil
MALWARE
- GRRCon Augusta 2018, Ankur Tyagi’s ‘Analyzing Multi-Dimensional Malware Dataset’
- Malware isn't the only threat to Android apps. Others include copies of popular apps and those that abuse permission requests.
Here
- Code Execution Bug In Malicious Repositories Resolved By Git Project
- #Stegware: it's #Malware that uses #steganography techniques to avoid detection
- 2018's Most Active Ransomware: The Ongoing Evolution of GandCrab
- Most hosting providers take too long to remove malware distribution sites
- .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
- .@ThreatFabric researchers uncovered a #malware that uses overlay techniques to avoid detection. Learn from @lewisnic how this new #Androidmalware --
- Mikko Hypponen's Picks For the Top 5 Viruses of All Time - F-Secure Blog
- US government rolls out 2-step verification for .gov domain owners
- Intel’s 9th-Generation Core Processors Unveiled
- Code execution bug in malicious repositories resolved by Git Project
- #Android #Trojan: How is data being stolen from #messagingapps?
- #GoScanSSH: How does this #malware work and differ from others?
- How did an organized crime group get a zip file from a reputable malware scanning service?
Malware researchers occasionally have ties
- Keeping your cloud malware-free: What you need to know
- Virus Attack Hampers the Email System of Ulster Town
- Beware!! Hackers Now Spreading Dangerous FlawedAmmyy Malware Through PDF & IQY File
- First In-The-Wild UEFI Rootkit Discovered
- The MITRE ATT&CK Framework: Command and Control
- .@TrendMicro researchers discovered #FacexWorm, a #malware that uses a #ChromeExtension and @Facebook Messenger to spread. Learn which users are at
EXPLOIT
- Hackers exploit vulnerability in Bitcoin code
- #TLBleed exploits abuse Intel's HTT chip feature to leak data. Find out how hackers could launch side-channel attacks to obtain
- Websites vulnerable to attack exploiting major framework
- "It is no secret that the #RemoteDesktop Protocol has long been a source of exploitable vulnerabilities, and it is well
- New Exploit for MikroTik Router WinBox Vulnerability Gives Full Root Access
VULNERABILITY
- Google shutting down Google+ after covering up privacy bug
- Hackers exploit vulnerability in Bitcoin code
- Google was aware of a flaw that exposed over 500,000 of Google Plus users, but did not disclose it
- Google Says Social Network Bug Exposed Private Data
- WECON PI Studio HMI software affected by code execution flaws
- Mozilla Patched Multiple Vulnerabilities In Thunderbird 60.2.1
- Google+ Is Shutting Down After a Security Bug Exposed User Info
- Google shuts down Google+ for consumers due to bug found months ago
- Google chose not to go public about bug that exposed Google Plus users’ data
- iOS 12.0.1 Released with Fixes to Passcode Bypass Bugs
- Google+ Shutting Down After Google Discovers API Bug Affecting 500K Users
- Google shuts down Google+ after API bug exposed details for over 500,000 users
- Code Execution Flaws Found in WECON Industrial Products
- GitLab API Vulnerability Leaked Confidential Data On Public Projects
- Code Execution Bug In Malicious Repositories Resolved By Git Project
- Google+ Shutting Down After Bug Leaks Info of 500k Accounts
- Vulnerabilities in RouterOS could enble hackers to take control of routers
- #Shodan, a device search engine, can help identify #ICS security vulnerabilities. Learn more about how Shodan works and how it
- NEW #CYBERSAUNA EPISODE: Reinventing the Cold Boot Attack: Modern Laptop Version
@nxsolle and Pasi Saarinen discuss how they discovered a flaw
- Vulnerabilities discovered in electoral counting machines in 23 states
- Most routers full of firmware flaws that leave users at risk
- Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data
- Who's watching your TV? Sony quietly killed three critical Bravia TV bugs
- Microsoft says it can recover files lost to the Windows 10 October Update's data deletion bug
- Tenable Researcher Reveals Extended MikroTik Router Vulnerability
- MikroTik vulnerability climbs up the severity scale, new attack permits root access
- Google Criticizes Apple Over Safari Security, Flaw Disclosures
- Code execution bug in malicious repositories resolved by Git Project
- Users complain of boot loops on Series 4 Apple Watch due to daylight savings bug
- "It is no secret that the #RemoteDesktop Protocol has long been a source of exploitable vulnerabilities, and it is well
- New Exploit for MikroTik Router WinBox Vulnerability Gives Full Root Access
- The Git Project addresses a critical arbitrary code execution vulnerability in Git
- D-Link Security Updates Fixed Multiple Vulnerabilities in WiFiManager Software
- Beware!! Hackers Now Spreading Dangerous FlawedAmmyy Malware Through PDF & IQY File
- PoC Attack Escalates MikroTik Router Bug to ‘As Bad As It Gets’
ASIA
Nil
OCEANIA
Nil
NORTH AMERICA
Nil
SOUTH AMERICA
Nil
EUROPE
Nil
AFRICA
Nil
ASIA
Nil
WORLD
Nil
ATTACKS
- 10/8/18: Dtex, Insider Threat, Privacy News: Dtex Earns Leadership, Product Awards; Insider Compromises French Law Enforcement Agency; The Big Hack
- Google was aware of a flaw that exposed over 500,000 of Google Plus users, but did not disclose it
- Hide and Seek IoT Botnet Now Spreads to New Android Devices Using ADB over Wi-Fi
- Google Says Social Network Bug Exposed Private Data
- Google+ Is Shutting Down After a Security Bug Exposed User Info
- Google chose not to go public about bug that exposed Google Plus users’ data
- Google shuts down Google+ after API bug exposed details for over 500,000 users
- Assassin’s Creed Odyssey suffers DDoS attack at launch
- #TLBleed exploits abuse Intel's HTT chip feature to leak data. Find out how hackers could launch side-channel attacks to obtain
- California to Ban Weak Passwords
- Phishing Enables Domestic Violence. Education Can Help Stop It.
- GitLab API Vulnerability Leaked Confidential Data On Public Projects
- Google announces plans to close Google+ for consumers following data breach
- Google+ Shutting Down After Bug Leaks Info of 500k Accounts
- .@David_Ingram of @NBCNews reports that political #campaigns and parties say they’re sending many more texts this year than in past
- Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data
- Expert presented a new attack technique to compromise MikroTik Routers
- With 12,556,810 email archives already exposed across misconfigured online file stores, attackers don’t even need to perform #accounttakeovers to gain
- Hook, Line and Sinker: After Phish Get Caught
- ICO hits Heathrow Airport with £120,000 data breach fine over lost USB stick
- MikroTik routers with default credentials can be easily compromised
- Project Insecurity (@insecurity) researchers discovered certain #livechatsoftware that were leaking personal details of employee at several high-profile sites. Discover how
- Aspire Health Lost 'Protected Health Information' after Getting Hacked by a Phishing Scheme
- "Life is short - passwords are long."
- Finnish Communications Regulatory Authority
THREATS
- Google shutting down Google+ after covering up privacy bug
- Hackers exploit vulnerability in Bitcoin code
- Google was aware of a flaw that exposed over 500,000 of Google Plus users, but did not disclose it
- Google Says Social Network Bug Exposed Private Data
- WECON PI Studio HMI software affected by code execution flaws
- Mozilla Patched Multiple Vulnerabilities In Thunderbird 60.2.1
- Google+ Is Shutting Down After a Security Bug Exposed User Info
- Google shuts down Google+ for consumers due to bug found months ago
- Google chose not to go public about bug that exposed Google Plus users’ data
- iOS 12.0.1 Released with Fixes to Passcode Bypass Bugs
- GRRCon Augusta 2018, Ankur Tyagi’s ‘Analyzing Multi-Dimensional Malware Dataset’
- Google+ Shutting Down After Google Discovers API Bug Affecting 500K Users
- Google shuts down Google+ after API bug exposed details for over 500,000 users
- #TLBleed exploits abuse Intel's HTT chip feature to leak data. Find out how hackers could launch side-channel attacks to obtain
- Malware isn't the only threat to Android apps. Others include copies of popular apps and those that abuse permission requests.
Here
- Code Execution Flaws Found in WECON Industrial Products
- GitLab API Vulnerability Leaked Confidential Data On Public Projects
- Code Execution Bug In Malicious Repositories Resolved By Git Project
- #Stegware: it's #Malware that uses #steganography techniques to avoid detection
- 2018's Most Active Ransomware: The Ongoing Evolution of GandCrab
- Websites vulnerable to attack exploiting major framework
- Most hosting providers take too long to remove malware distribution sites
- Google+ Shutting Down After Bug Leaks Info of 500k Accounts
- .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
- Vulnerabilities in RouterOS could enble hackers to take control of routers
- #Shodan, a device search engine, can help identify #ICS security vulnerabilities. Learn more about how Shodan works and how it
- .@ThreatFabric researchers uncovered a #malware that uses overlay techniques to avoid detection. Learn from @lewisnic how this new #Androidmalware --
- NEW #CYBERSAUNA EPISODE: Reinventing the Cold Boot Attack: Modern Laptop Version
@nxsolle and Pasi Saarinen discuss how they discovered a flaw
- Vulnerabilities discovered in electoral counting machines in 23 states
- Most routers full of firmware flaws that leave users at risk
- Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data
- Who's watching your TV? Sony quietly killed three critical Bravia TV bugs
- Microsoft says it can recover files lost to the Windows 10 October Update's data deletion bug
- Mikko Hypponen's Picks For the Top 5 Viruses of All Time - F-Secure Blog
- US government rolls out 2-step verification for .gov domain owners
- Tenable Researcher Reveals Extended MikroTik Router Vulnerability
- Intel’s 9th-Generation Core Processors Unveiled
- MikroTik vulnerability climbs up the severity scale, new attack permits root access
- Google Criticizes Apple Over Safari Security, Flaw Disclosures
- Code execution bug in malicious repositories resolved by Git Project
- Users complain of boot loops on Series 4 Apple Watch due to daylight savings bug
- "It is no secret that the #RemoteDesktop Protocol has long been a source of exploitable vulnerabilities, and it is well
- New Exploit for MikroTik Router WinBox Vulnerability Gives Full Root Access
- #Android #Trojan: How is data being stolen from #messagingapps?
- #GoScanSSH: How does this #malware work and differ from others?
- How did an organized crime group get a zip file from a reputable malware scanning service?
Malware researchers occasionally have ties
- The Git Project addresses a critical arbitrary code execution vulnerability in Git
- Keeping your cloud malware-free: What you need to know
- D-Link Security Updates Fixed Multiple Vulnerabilities in WiFiManager Software
- Virus Attack Hampers the Email System of Ulster Town
- Beware!! Hackers Now Spreading Dangerous FlawedAmmyy Malware Through PDF & IQY File
- First In-The-Wild UEFI Rootkit Discovered
- PoC Attack Escalates MikroTik Router Bug to ‘As Bad As It Gets’
- The MITRE ATT&CK Framework: Command and Control
- .@TrendMicro researchers discovered #FacexWorm, a #malware that uses a #ChromeExtension and @Facebook Messenger to spread. Learn which users are at
CRIME
Nil
POLITICS
Nil