TRANSNATIONAL / UNKNOWN
- DDoS Attacks Hit Games Like Assassin’s Creed and Final Fantasy XIV
- Security Affairs newsletter Round 184 – News of the week
CHINA
Nil
INDIA
Nil
NORTH KOREA
Nil
PAKISTAN
Nil
VIETNAM
Nil
IRAN
Nil
IRAQ
Nil
LEBANON
Nil
PALESTINE
Nil
SAUDI ARABIA
Nil
SYRIA
Nil
TURKEY
Nil
UNITED ARAB EMIRATES
Nil
YEMEN
Nil
RUSSIA
- Security Affairs newsletter Round 184 – News of the week
SERBIA
Nil
UKRAINE
Nil
DATA BREACH & DATA LOSS
- My Health Record privacy amendments 'woefully inadequate': Labor
- #NetSpectre exploits speculative execution to leak data remotely via side-channel attacks. Learn how this #SecurityVulnerability affects the #cloud from expert
- Web Hosting Provider Suffers Data Breach Second Time in a Year
- Find out how #TLBleed abuses @Intel's HTT chip feature to leak data via TLB
- Microsoft still has not completely solved the Microsoft JET database engine vulnerability
- See how SearchLight identifies when your data is exposed, your brand is abused, or your company is mentioned on the
- Pentagon Discloses Data Breach, More Than 30,000 Workers Have Affected
- A @Google security audit uncovered a glitch in #GooglePlus that exposed data from nearly 500,000 accounts, causing the company to
- PHASE 4 – INFORMATION GATHERING AND PLANNING
Meet Eric, a control systems engineer working for a third-party integrator.
He’s guy who uploaded
DENIAL-OF-SERVICE
- DDoS Attacks Hit Games Like Assassin’s Creed and Final Fantasy XIV
MALVERTISING
Nil
PHISHING
Nil
WEB DEFACEMENT
Nil
BOTNET
Nil
RANSOMWARE
- New @ESET research finds APT group dubbed #TeleBots was behind #Industroyer #malware attacks, #NotPetya #ransomware outbreaks, and a recent Exaramel
CRYPTOMINING & CRYPTOCURRENCIES
- Fake Flash Updates pushing Malware to Inject XMRig Cryptocurrency Miners
MALWARE
- Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free
- New @ESET research finds APT group dubbed #TeleBots was behind #Industroyer #malware attacks, #NotPetya #ransomware outbreaks, and a recent Exaramel
- .@ThreatFabric researchers uncovered a #malware that uses overlay techniques to avoid detection. Learn from @lewisnic how this new #Androidmalware --
- At the 2018 @RSAConference, researchers discussed the rise of stegware -- #malware that uses #steganography techniques to avoid detection. Learn
- How a remote access #Trojan checks for
- Fake Flash Updates pushing Malware to Inject XMRig Cryptocurrency Miners
EXPLOIT
- Expert released PoC Code Microsoft Edge Remote Code Execution flaw
- Exploiting Windows Using Microsoft Office DDE Exploit (MACROLESS)
VULNERABILITY
- Microsoft fixed the Zero-Day for JET flaw, but the fix is incomplete
- A2SV – SSL Vulnerability Analysis Tool
- Microsoft patch for JET flaw zero-day is ‘incomplete,’ Windows still vulnerable
- Microsoft still has not completely solved the Microsoft JET database engine vulnerability
- Expert released PoC Code Microsoft Edge Remote Code Execution flaw
ASIA
Nil
WORLD
- My Health Record privacy amendments 'woefully inadequate': Labor
- Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free
- Web Hosting Provider Suffers Data Breach Second Time in a Year
- Security Affairs newsletter Round 184 – News of the week
- Expert released PoC Code Microsoft Edge Remote Code Execution flaw
- Pentagon Discloses Data Breach, More Than 30,000 Workers Have Affected
- A @Google security audit uncovered a glitch in #GooglePlus that exposed data from nearly 500,000 accounts, causing the company to
ATTACKS
- My Health Record privacy amendments 'woefully inadequate': Labor
- #NetSpectre exploits speculative execution to leak data remotely via side-channel attacks. Learn how this #SecurityVulnerability affects the #cloud from expert
- Web Hosting Provider Suffers Data Breach Second Time in a Year
- Find out how #TLBleed abuses @Intel's HTT chip feature to leak data via TLB
- Microsoft still has not completely solved the Microsoft JET database engine vulnerability
- See how SearchLight identifies when your data is exposed, your brand is abused, or your company is mentioned on the
- Pentagon Discloses Data Breach, More Than 30,000 Workers Have Affected
- A @Google security audit uncovered a glitch in #GooglePlus that exposed data from nearly 500,000 accounts, causing the company to
- PHASE 4 – INFORMATION GATHERING AND PLANNING
Meet Eric, a control systems engineer working for a third-party integrator.
He’s guy who uploaded
THREATS
- Microsoft fixed the Zero-Day for JET flaw, but the fix is incomplete
- Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free
- A2SV – SSL Vulnerability Analysis Tool
- New @ESET research finds APT group dubbed #TeleBots was behind #Industroyer #malware attacks, #NotPetya #ransomware outbreaks, and a recent Exaramel
- .@ThreatFabric researchers uncovered a #malware that uses overlay techniques to avoid detection. Learn from @lewisnic how this new #Androidmalware --
- Microsoft patch for JET flaw zero-day is ‘incomplete,’ Windows still vulnerable
- At the 2018 @RSAConference, researchers discussed the rise of stegware -- #malware that uses #steganography techniques to avoid detection. Learn
- Microsoft still has not completely solved the Microsoft JET database engine vulnerability
- Expert released PoC Code Microsoft Edge Remote Code Execution flaw
- How a remote access #Trojan checks for
- Fake Flash Updates pushing Malware to Inject XMRig Cryptocurrency Miners
CRIME
- Security Affairs newsletter Round 184 – News of the week
- Expert released PoC Code Microsoft Edge Remote Code Execution flaw
POLITICS
- Security Affairs newsletter Round 184 – News of the week
- Pentagon Discloses Data Breach, More Than 30,000 Workers Have Affected