DATA BREACH & DATA LOSS
- The BEC List: Helping Thwart Business Email Compromise through Collaboration
- Personal data for coffee. What’s the risk? | Avast
- The EU and the US have investigated on data breaches on the Google+
- FitMetrix user data exposed via passwordless ElasticSearch server cluster
- Apple has formed a partnership with lyrics database provider Genius
- Defending Against Business Email Compromise Attacks
- Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
- Palo Alto Networks Uncovers Flash Updater Cryptojacking Campaign
- Gemalto reports that 4.6 billion record leaked in the first half of 2018
- A new database with information on every shooting at a school in the last 50 years is now available publicly
- New Gallmaker APT group eschews malware in cyber espionage campaigns
- Ghostdns Attack Compromised Over 100K Routers
- A simple videocall could compromise your WhatsApp account
- Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'
- Mingis on Tech: Data breaches in a world of 'surveillance capitalism'
DENIAL-OF-SERVICE
Nil
MALVERTISING
Nil
PHISHING
- California Bill Increases Default Password Security
- Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
- Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
- Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
- AVG 2019 now includes enhanced phishing threat detection
WEB DEFACEMENT
- Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
BOTNET
Nil
RANSOMWARE
- Qihoo 360’s precise analysis of ransomware for September
- Costly cryptojacking overtakes ransomware in the enterprise threat stakes
CRYPTOMINING & CRYPTOCURRENCIES
- XMRig Cryptocurrency Miner Camouflages Itself as a Flash Updater
- Cops Arrest Infamous SIM Swapper Who Stole Crypto Currency
- Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
- Cryptomining malware discovered masquerading as Flash updates
- Fake Flash Updaters Push Cryptocurrency Miners
- Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
- Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
- Crypto-mining malware poses as Flash updates
- Dublin Information Sec: Protect your firm from 'Gold Rush' #cryptocurrency scammers: https://www.independent.ie/business/dublin-information-sec/dublin-information-sec-protect-your-firm-from-gold-rush-cryptocurrency-scammers-37286913.html … ( via @jimmychappell )
MALWARE
- Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
- GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
- Hackers Exploit Drupalgeddon2 to Install Backdoor
- Adaptable, All-in-One Android Trojan Shows the Future of Malware
- Talos: Android trojan resembling Play Store installs sophisticated spyware
- Most Malware Arrives Via Email
- Fake Adobe Flash Updates Hide Malicious Crypto Miners
- .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
- GPlayed trojan – .Net playing with Google Market
- Cryptomining malware discovered masquerading as Flash updates
- This cryptojacking mining malware pretends to be a Flash update
- Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
- Reaper Group Uses New Malware to Deploy RAT
- Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
- Exaramel Malware Reinforces Link Between Industroyer and NotPetya
- New TeleBots backdoor: First evidence linking Industroyer to NotPetya
- New TeleBots backdoor: First evidence linking Industroyer to NotPetya
- New Android Trojan Gplayed Adapts to Attacker's Needs
- Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
- Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
- Crypto-mining malware poses as Flash updates
- Who needs custom malware? 'Govt-backed' Gallmaker spy crew uses off-the-shelf wares
- Worker perks flinger Sodexo pulls Engage website after malware smackdown
- New Backdoor Ties NotPetya and Industroyer to TeleBots Group
- .@FarsightSecInc's @paulvixie says his company's new research into domain name lifespans and causes of death shows the need for new
- "Help! I have a #computer worm..oh wait is it a computer #virus?" These terms are often used interchangeably, but have
- The attached file promptly infects Peter’s laptop with the RAT, remote access trojan.
It only takes about an hour from
- New Gallmaker APT group eschews malware in cyber espionage campaigns
- GPlayed Trojan - .Net playing with Google Market
- Canada-Based Restaurant Chain Hit with Malware Attack
- Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread
- JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
- How to Defeat Malicious Everything as-a-Service
EXPLOIT
- Hackers Exploit Drupalgeddon2 to Install Backdoor
- PoC Code Available for Microsoft Edge Remote Code Execution Bug
VULNERABILITY
- Multiple Vulnerabilities Dicovered In RouterOS That Affected MikroTik Routers
- Senate seeks internal memo on Google+ vulnerability
- Slow disclosure of Google+ flaw draws attention of senators
- PoC Code Available for Microsoft Edge Remote Code Execution Bug
- .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
- Network Time Protocol Bugs Sting Juniper Operating System
- Juniper Networks provides dozens of fix for vulnerabilities in Junos OS
- Audit Finds No Critical Flaws in Firefox Update System
- [SingCERT] Alert on 12 Critical Microsoft Vulnerabilities for October 2018 Patch Tuesday
- A patched #MikroTik router vulnerability amps up severity rating as @TenableSecurity researchers find new potential exploits with more critical consequences.
- Juniper fixes 30+ vulnerabilities in its routing, switching devices
- Adobe patches critical flaws in many of its software offerings
- Update now! Microsoft fixes 49 bugs, 12 are critical
- All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
- VMware issues advisory for a DoS vulnerability
- .@TenableSecurity found new exploits of an already patched #MikroTik router vulnerability that could enable hackers to launch #RemoteCode execution attacks.
- Juniper Patches Serious Flaws in Junos OS
- Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
- Four Critical Flaws Patched In Adobe Digital Edition
HEALTHCARE
- What would happen if an attack interrupted a country’s power supply?
TRANSPORT
- AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
- All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
- Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
- A simple videocall could compromise your WhatsApp account
BANKING & FINANCE
- Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
- GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
- Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
- Talos: Android trojan resembling Play Store installs sophisticated spyware
- Cops Arrest Infamous SIM Swapper Who Stole Crypto Currency
- AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
- Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
- Magecart Card-Stealing Gang Hits 'Shopper Approved' Plug-In
- Gemalto reports that 4.6 billion record leaked in the first half of 2018
- Threats in the Netherlands
- GPlayed Trojan - .Net playing with Google Market
- Ghostdns Attack Compromised Over 100K Routers
- Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread
INFORMATION & TELECOMMUNICATION
- Personal data for coffee. What’s the risk? | Avast
- Most Malware Arrives Via Email
- AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
- All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
- Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
- A new database with information on every shooting at a school in the last 50 years is now available publicly
- Dublin Information Sec: Protect your firm from 'Gold Rush' #cryptocurrency scammers: https://www.independent.ie/business/dublin-information-sec/dublin-information-sec-protect-your-firm-from-gold-rush-cryptocurrency-scammers-37286913.html … ( via @jimmychappell )
- A simple videocall could compromise your WhatsApp account
- Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'
- Mingis on Tech: Data breaches in a world of 'surveillance capitalism'
FOOD
Nil
WATER
Nil
ENERGY
- Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
- AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
- Researchers link tools used in NotPetya and Ukraine grid hacks
- What would happen if an attack interrupted a country’s power supply?
- Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread
GOVERNMENT & PUBLIC SERVICE
Nil
ASIA
- Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
- AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
- What would happen if an attack interrupted a country’s power supply?
- Reaper Group Uses New Malware to Deploy RAT
- Threats in the Netherlands
WORLD
- Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
- Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
- The Reality of Self-Driving Cars and the Regulatory Hurdles
- Adaptable, All-in-One Android Trojan Shows the Future of Malware
- Talos: Android trojan resembling Play Store installs sophisticated spyware
- AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
- The EU and the US have investigated on data breaches on the Google+
- Researchers link tools used in NotPetya and Ukraine grid hacks
- What would happen if an attack interrupted a country’s power supply?
- Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
- Reaper Group Uses New Malware to Deploy RAT
- Worker perks flinger Sodexo pulls Engage website after malware smackdown
- Defending Against Business Email Compromise Attacks
- Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
- Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
- Threats in the Netherlands
- New Gallmaker APT group eschews malware in cyber espionage campaigns
- Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
- GPlayed Trojan - .Net playing with Google Market
- Ghostdns Attack Compromised Over 100K Routers
- Canada-Based Restaurant Chain Hit with Malware Attack
ATTACKS
- The BEC List: Helping Thwart Business Email Compromise through Collaboration
- Personal data for coffee. What’s the risk? | Avast
- California Bill Increases Default Password Security
- The EU and the US have investigated on data breaches on the Google+
- FitMetrix user data exposed via passwordless ElasticSearch server cluster
- Apple has formed a partnership with lyrics database provider Genius
- Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
- Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
- Defending Against Business Email Compromise Attacks
- Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
- Palo Alto Networks Uncovers Flash Updater Cryptojacking Campaign
- Gemalto reports that 4.6 billion record leaked in the first half of 2018
- A new database with information on every shooting at a school in the last 50 years is now available publicly
- New Gallmaker APT group eschews malware in cyber espionage campaigns
- Ghostdns Attack Compromised Over 100K Routers
- A simple videocall could compromise your WhatsApp account
- Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'
- Mingis on Tech: Data breaches in a world of 'surveillance capitalism'
- Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
- AVG 2019 now includes enhanced phishing threat detection
THREATS
- Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
- Multiple Vulnerabilities Dicovered In RouterOS That Affected MikroTik Routers
- GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
- Senate seeks internal memo on Google+ vulnerability
- XMRig Cryptocurrency Miner Camouflages Itself as a Flash Updater
- Slow disclosure of Google+ flaw draws attention of senators
- Hackers Exploit Drupalgeddon2 to Install Backdoor
- PoC Code Available for Microsoft Edge Remote Code Execution Bug
- Adaptable, All-in-One Android Trojan Shows the Future of Malware
- Talos: Android trojan resembling Play Store installs sophisticated spyware
- Most Malware Arrives Via Email
- .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
- Cops Arrest Infamous SIM Swapper Who Stole Crypto Currency
- Network Time Protocol Bugs Sting Juniper Operating System
- Juniper Networks provides dozens of fix for vulnerabilities in Junos OS
- Audit Finds No Critical Flaws in Firefox Update System
- Fake Adobe Flash Updates Hide Malicious Crypto Miners
- [SingCERT] Alert on 12 Critical Microsoft Vulnerabilities for October 2018 Patch Tuesday
- Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
- .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
- GPlayed trojan – .Net playing with Google Market
- Cryptomining malware discovered masquerading as Flash updates
- This cryptojacking mining malware pretends to be a Flash update
- Fake Flash Updaters Push Cryptocurrency Miners
- Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
- Reaper Group Uses New Malware to Deploy RAT
- Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
- Exaramel Malware Reinforces Link Between Industroyer and NotPetya
- A patched #MikroTik router vulnerability amps up severity rating as @TenableSecurity researchers find new potential exploits with more critical consequences.
- New TeleBots backdoor: First evidence linking Industroyer to NotPetya
- New TeleBots backdoor: First evidence linking Industroyer to NotPetya
- New Android Trojan Gplayed Adapts to Attacker's Needs
- Juniper fixes 30+ vulnerabilities in its routing, switching devices
- Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
- Adobe patches critical flaws in many of its software offerings
- Update now! Microsoft fixes 49 bugs, 12 are critical
- Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
- Qihoo 360’s precise analysis of ransomware for September
- Costly cryptojacking overtakes ransomware in the enterprise threat stakes
- Crypto-mining malware poses as Flash updates
- All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
- Who needs custom malware? 'Govt-backed' Gallmaker spy crew uses off-the-shelf wares
- Worker perks flinger Sodexo pulls Engage website after malware smackdown
- VMware issues advisory for a DoS vulnerability
- .@TenableSecurity found new exploits of an already patched #MikroTik router vulnerability that could enable hackers to launch #RemoteCode execution attacks.
- New Backdoor Ties NotPetya and Industroyer to TeleBots Group
- Juniper Patches Serious Flaws in Junos OS
- Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
- .@FarsightSecInc's @paulvixie says his company's new research into domain name lifespans and causes of death shows the need for new
- "Help! I have a #computer worm..oh wait is it a computer #virus?" These terms are often used interchangeably, but have
- The attached file promptly infects Peter’s laptop with the RAT, remote access trojan.
It only takes about an hour from
- New Gallmaker APT group eschews malware in cyber espionage campaigns
- GPlayed Trojan - .Net playing with Google Market
- Dublin Information Sec: Protect your firm from 'Gold Rush' #cryptocurrency scammers: https://www.independent.ie/business/dublin-information-sec/dublin-information-sec-protect-your-firm-from-gold-rush-cryptocurrency-scammers-37286913.html … ( via @jimmychappell )
- Canada-Based Restaurant Chain Hit with Malware Attack
- Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread
- JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
- Four Critical Flaws Patched In Adobe Digital Edition
- How to Defeat Malicious Everything as-a-Service
CRIME
- The BEC List: Helping Thwart Business Email Compromise through Collaboration
- PoC Code Available for Microsoft Edge Remote Code Execution Bug
- The EU and the US have investigated on data breaches on the Google+
- Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
- Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
- Defending Against Business Email Compromise Attacks
- Gemalto reports that 4.6 billion record leaked in the first half of 2018
- Threats in the Netherlands
POLITICS
- What would happen if an attack interrupted a country’s power supply?
- Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
- Who needs custom malware? 'Govt-backed' Gallmaker spy crew uses off-the-shelf wares
- Threats in the Netherlands
- New Gallmaker APT group eschews malware in cyber espionage campaigns
- Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
- A simple videocall could compromise your WhatsApp account
- Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
- JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
DATA BREACH & DATA LOSS
- The BEC List: Helping Thwart Business Email Compromise through Collaboration
- Personal data for coffee. What’s the risk? | Avast
- The EU and the US have investigated on data breaches on the Google+
- FitMetrix user data exposed via passwordless ElasticSearch server cluster
- Apple has formed a partnership with lyrics database provider Genius
- Defending Against Business Email Compromise Attacks
- Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
- Palo Alto Networks Uncovers Flash Updater Cryptojacking Campaign
- Gemalto reports that 4.6 billion record leaked in the first half of 2018
- A new database with information on every shooting at a school in the last 50 years is now available publicly
- New Gallmaker APT group eschews malware in cyber espionage campaigns
- Ghostdns Attack Compromised Over 100K Routers
- A simple videocall could compromise your WhatsApp account
- Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'
- Mingis on Tech: Data breaches in a world of 'surveillance capitalism'
DENIAL-OF-SERVICE
Nil
MALVERTISING
Nil
PHISHING
- California Bill Increases Default Password Security
- Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
- Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
- Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
- AVG 2019 now includes enhanced phishing threat detection
WEB DEFACEMENT
- Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
BOTNET
Nil
RANSOMWARE
- Qihoo 360’s precise analysis of ransomware for September
- Costly cryptojacking overtakes ransomware in the enterprise threat stakes
CRYPTOMINING & CRYPTOCURRENCIES
- XMRig Cryptocurrency Miner Camouflages Itself as a Flash Updater
- Cops Arrest Infamous SIM Swapper Who Stole Crypto Currency
- Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
- Cryptomining malware discovered masquerading as Flash updates
- Fake Flash Updaters Push Cryptocurrency Miners
- Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
- Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
- Crypto-mining malware poses as Flash updates
- Dublin Information Sec: Protect your firm from 'Gold Rush' #cryptocurrency scammers: https://www.independent.ie/business/dublin-information-sec/dublin-information-sec-protect-your-firm-from-gold-rush-cryptocurrency-scammers-37286913.html … ( via @jimmychappell )
MALWARE
- Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
- GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
- Hackers Exploit Drupalgeddon2 to Install Backdoor
- Adaptable, All-in-One Android Trojan Shows the Future of Malware
- Talos: Android trojan resembling Play Store installs sophisticated spyware
- Most Malware Arrives Via Email
- Fake Adobe Flash Updates Hide Malicious Crypto Miners
- .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
- GPlayed trojan – .Net playing with Google Market
- Cryptomining malware discovered masquerading as Flash updates
- This cryptojacking mining malware pretends to be a Flash update
- Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
- Reaper Group Uses New Malware to Deploy RAT
- Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
- Exaramel Malware Reinforces Link Between Industroyer and NotPetya
- New TeleBots backdoor: First evidence linking Industroyer to NotPetya
- New TeleBots backdoor: First evidence linking Industroyer to NotPetya
- New Android Trojan Gplayed Adapts to Attacker's Needs
- Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
- Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
- Crypto-mining malware poses as Flash updates
- Who needs custom malware? 'Govt-backed' Gallmaker spy crew uses off-the-shelf wares
- Worker perks flinger Sodexo pulls Engage website after malware smackdown
- New Backdoor Ties NotPetya and Industroyer to TeleBots Group
- .@FarsightSecInc's @paulvixie says his company's new research into domain name lifespans and causes of death shows the need for new
- "Help! I have a #computer worm..oh wait is it a computer #virus?" These terms are often used interchangeably, but have
- The attached file promptly infects Peter’s laptop with the RAT, remote access trojan.
It only takes about an hour from
- New Gallmaker APT group eschews malware in cyber espionage campaigns
- GPlayed Trojan - .Net playing with Google Market
- Canada-Based Restaurant Chain Hit with Malware Attack
- Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread
- JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
- How to Defeat Malicious Everything as-a-Service
EXPLOIT
- Hackers Exploit Drupalgeddon2 to Install Backdoor
- PoC Code Available for Microsoft Edge Remote Code Execution Bug
VULNERABILITY
- Multiple Vulnerabilities Dicovered In RouterOS That Affected MikroTik Routers
- Senate seeks internal memo on Google+ vulnerability
- Slow disclosure of Google+ flaw draws attention of senators
- PoC Code Available for Microsoft Edge Remote Code Execution Bug
- .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
- Network Time Protocol Bugs Sting Juniper Operating System
- Juniper Networks provides dozens of fix for vulnerabilities in Junos OS
- Audit Finds No Critical Flaws in Firefox Update System
- [SingCERT] Alert on 12 Critical Microsoft Vulnerabilities for October 2018 Patch Tuesday
- A patched #MikroTik router vulnerability amps up severity rating as @TenableSecurity researchers find new potential exploits with more critical consequences.
- Juniper fixes 30+ vulnerabilities in its routing, switching devices
- Adobe patches critical flaws in many of its software offerings
- Update now! Microsoft fixes 49 bugs, 12 are critical
- All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
- VMware issues advisory for a DoS vulnerability
- .@TenableSecurity found new exploits of an already patched #MikroTik router vulnerability that could enable hackers to launch #RemoteCode execution attacks.
- Juniper Patches Serious Flaws in Junos OS
- Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
- Four Critical Flaws Patched In Adobe Digital Edition