Oct 24, 2018

APT report for 2018-10-23

TRANSNATIONAL / UNKNOWN

  1. Magecart group leverages zero-days in 20 Magento extensions
  2. NSA Tools Used to Attack Nuclear Energy Firms
  3. Hacking operations with DarkPulsar and other tools developed by the NSA

CHINA

  1. Chinese Cyber Espionage Group using Datper Trojan

INDIA

Nil

NORTH KOREA

  1. North Korean Hackers Stole $571 Million Worth of CryptoCoins in Less Than 24 Months

PAKISTAN

Nil

VIETNAM

Nil

IRAN

Nil

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

Nil

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

  1. Experts advocate for 'ATT&CK' as go-to framework to share threat intel
  2. FireEye links Russia-owned lab to Trisis developers

SERBIA

Nil

UKRAINE

  1. TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers

Platform report for 2018-10-23

WINDOWS

  1. Microsoft Windows zero-day disclosed on Twitter, again
  2. When Ransomware Stopped Working Harder and Started Working Smarter
  3. Chalubo DDoS Botnet Compromises Linux SSH Servers Using Brute-Force Attacks
  4. Bots Targeting SSH Servers and Brute-Forcing Entry
  5. TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers
  6. NSA Tools Used to Attack Nuclear Energy Firms
  7. Hacking operations with DarkPulsar and other tools developed by the NSA
  8. Windows 10 1809 Zip Extraction Bug Overwrites Files without Confirmation

LINUX

  1. Chalubo DDoS Botnet Compromises Linux SSH Servers Using Brute-Force Attacks
  2. Bots Targeting SSH Servers and Brute-Forcing Entry

UNIX

Nil

ANDROID

Nil

IOS

  1. The fix for the DOM-based XSS in Branch.io introduced a new XSS flaw
  2. Apple has launched its university ID Cards feature in Wallet. Students at three universities can now access their student ID

MACOS

  1. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  2. The fix for the DOM-based XSS in Branch.io introduced a new XSS flaw

Threat report for 2018-10-23

DATA BREACH & DATA LOSS

  1. Case Study: Protecting PII
  2. An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet
  3. Top 10 security steps in Microsoft 365 that political campaigns can take today
  4. Critical vulnerabilities in FreeRTOS allowed for IoT device compromise
  5. Thousands of applications affected by a zero-day issue injQuery File Upload plugin
  6. Malicious actors attacked a back-end insurance system and the resulting @HealthCareGov #breach exposed an unknown amount of data on 75,000
  7. Identify when your data is exposed, your brand is abused, or your company is mentioned on the dark web. Test
  8. Thousands of Applications Vulnerable to RCE via jQuery File Upload
  9. Facebook has seen several data breaches in the last few months, leading the company to look into acquiring a
  10. Police have issued a fresh warning concerning Fortnite and players giving out their personal details online. Cheshire Police posted on Facebook,
  11. Adult websites shuttered after 1.2 million user details exposed
  12. #sLoad and #Ramnit pairing in sustained personalized campaigns against UK and Italy
  13. jQuery? More like preyQuery: File upload tool can be exploited to hijack at-risk websites
  14. "Advanced attacks, spear-phishing and data breaches are the norm, instead of the exception. We need to address these issues with
  15. “We’re less likely to be caught up in a massive breach of highly available PII or financial data that gets
  16. A flaw in @Google Firebase #DatabaseSecurity allowed hackers to bypass security and leak data. Learn more about this #SecurityFlaw and
  17. Morrisons loses appeal over data breach
  18. Morrisons loses appeal against data breach liability ruling
  19. A #ZeroDay in the popular #jQuery File Upload plugin could affect thousands of projects and the jQuery #plugin vulnerability may

DENIAL-OF-SERVICE

  1. DDoS-Capable IoT Botnet 'Chalubo' Rises
  2. Chalubo DDoS Botnet Compromises Linux SSH Servers Using Brute-Force Attacks
  3. Netscout Launches Arbor Edge Defense for Enterprise DDoS Security
  4. Oracle Doubles Down on Cloud Security With CASB, WAF, DDoS Protection

MALVERTISING

Nil

PHISHING

  1. Phishing is still the most commonly used attack on organizations, survey says
  2. New Phishing Attack That Uses Multiple Replica Sign-In Pages
  3. How sophisticated phishing grants attackers total control of your computer
  4. How sophisticated phishing grants attackers total control of your computer
  5. 5 Ways #Cybercriminals Can Access Your Emails Without Phishing [Infographic]:
  6. Phishing attacks becoming more targeted, phishers love Microsoft the most
  7. Learn how hackers launched #phishing attacks against @netflix users with expert Michael Cobb of @thehairyITdog
  8. "Advanced attacks, spear-phishing and data breaches are the norm, instead of the exception. We need to address these issues with
  9. Phishing Report Shows Microsoft, Paypal, & Netflix as Top Targets
  10. 4 suggerimenti per utilizzare al meglio il vostro #password manager e generare password davvero efficaci. Ebbene sì, repetita juvant :)

WEB DEFACEMENT

  1. Hackers Defaced Davos In The Desert To Show Image Of Murdered Journalist
  2. Saudi Investment Site Defaced After Journalist’s Murder

BOTNET

  1. DDoS-Capable IoT Botnet 'Chalubo' Rises
  2. Chalubo DDoS Botnet Compromises Linux SSH Servers Using Brute-Force Attacks
  3. Battling Bots: How to Find Fake Twitter Followers
  4. Bots Targeting SSH Servers and Brute-Forcing Entry

RANSOMWARE

  1. When Ransomware Stopped Working Harder and Started Working Smarter
  2. City Pays $2K in Ransomware, Stirs ‘Never Pay’ Debate
  3. Case Study: Ransomware
  4. Indiana National Guard Suffers Ransomware Attack
  5. Indiana National Guard hit by ransomware
  6. Have you ever wondered why #ransomware attacks happen on the Friday before a long weekend? We've teamed up with @SentinelOne

CRYPTOMINING & CRYPTOCURRENCIES

  1. Why the blockchain is not secure
  2. Trade.io Cold Wallet Hacked Losing 50 Million TIO Tokens – TIO Coin To Be Forked
  3. Why is Elon Musk promoting this Bitcoin scam? (He’s not)
  4. Report: Cryptocurrency hackers earned $20M with 51-percent attacks in 2018
  5. Apple has launched its university ID Cards feature in Wallet. Students at three universities can now access their student ID
  6. Can Cybercriminals Hack Blockchain?
  7. A Beginner’s Guide to Bitcoin Mining (Bitcoin Mining 101)

MALWARE

  1. Burned malware returns, according to Cylance: is Hacking Team responsible?
  2. Status of Today’s Email as a Malware Vector
  3. Case Study: Destructive Malware
  4. Banking Trojan Infections Persist Throughout the State
  5. Triton Malware Linked to Russian Government Research Institute
  6. FireEye links Russian research lab to Triton ICS malware attacks
  7. Securing Government Operations with Cloud-based Malware Analysis
  8. How RATs infect computers with malicious software
  9. This is how government spyware StrongPity uses security researchers' work against them
  10. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  11. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  12. Malicious actors attacked a back-end insurance system and the resulting @HealthCareGov #breach exposed an unknown amount of data on 75,000
  13. H-Worm and jRAT Malware: Two RATs are Better than One
  14. How RATs infect computers with malicious software
  15. What do you think the combination of the #TrickBot banking Trojan to #IcedID means for the future of banking #Trojans?
  16. Updated Azorult malware for sale on the Dark Web
  17. UK and US sign military Cyber Accord to dominate cyber domain - with help from business
  18. Chinese Cyber Espionage Group using Datper Trojan
  19. Burned malware returns, says Cylance report: Is Hacking Team responsible?

EXPLOIT

Nil

VULNERABILITY

  1. DHS warns of another dangerous flaw in Advantech WebAccess SCADA software
  2. Microsoft Windows zero-day disclosed on Twitter, again
  3. AWS FreeRTOS Riddled with Security Vulnerabilities | Avast
  4. Critical vulnerabilities in FreeRTOS allowed for IoT device compromise
  5. Thousands of applications affected by a zero-day issue injQuery File Upload plugin
  6. Grave TCP/IP Flaws In FreeRTOS Leave IoT Gear Open To Mass Hijacking
  7. Patch now! Multiple serious flaws found in Drupal
  8. Quantifying Vulnerability Risk: How to Quickly Calculate and Prioritize Risk
  9. Amazon Patched Multiple IoT Vulnerabilities Affecting Its Smart Devices
  10. Amazon patches IoT and critical infrastructure security flaws
  11. Patch me, if you can: Grave TCP/IP flaws in FreeRTOS leave IoT gear open to mass hijacking
  12. Several vulnerabilities were found in controllers made by @Universal_Robot. Discover what these #robot controllers are used for and how
  13. How do newly found flaws affect robot controllers?
  14. Firmware zero-day leaves 2m storage devices open to RCE
  15. A flaw in @Google Firebase #DatabaseSecurity allowed hackers to bypass security and leak data. Learn more about this #SecurityFlaw and
  16. CyberSecurity Asean security alert on Multiple Vulnerabilities in Cisco WebEx Network Recording Player for Advanced Recording Format Files Could Allow for Arbitrary Code Execution
  17. Bug Spells Doom for Nearly-Vacant Google+ Network
  18. The fix for the DOM-based XSS in Branch.io introduced a new XSS flaw
  19. libssh Server-Side Identity Authentication Bypass Vulnerability (CVE-2018-10933)Threat Alert
  20. WebLogic Remote Code Execution Vulnerability(CVE-2018-3191)Threat Alert
  21. Different Vendors Confirm The Impact Of LibSSH Flaw On Their Products
  22. FreeRTOS IoT OS Critical Vulnerabilities Affected Million of Smart Home & Critical Infrastructure Based IoT Devices
  23. LIVE555 Streaming library affected by remote code execution vulnerability
  24. Windows 10 1809 Zip Extraction Bug Overwrites Files without Confirmation
  25. A #ZeroDay in the popular #jQuery File Upload plugin could affect thousands of projects and the jQuery #plugin vulnerability may

Region brief for 2018-10-23

ASIA

  1. FireEye links Russia-owned lab to Trisis developers
  2. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  3. Chinese Cyber Espionage Group using Datper Trojan
  4. Saudi Investment Site Defaced After Journalist’s Murder
  5. NSA Tools Used to Attack Nuclear Energy Firms
  6. Burned malware returns, says Cylance report: Is Hacking Team responsible?
  7. libssh Server-Side Identity Authentication Bypass Vulnerability (CVE-2018-10933)Threat Alert
  8. WebLogic Remote Code Execution Vulnerability(CVE-2018-3191)Threat Alert
  9. North Korean Hackers Stole $571 Million Worth of CryptoCoins in Less Than 24 Months
  10. Hacking operations with DarkPulsar and other tools developed by the NSA
  11. Can Cybercriminals Hack Blockchain?

OCEANIA

Nil

NORTH AMERICA

  1. When Ransomware Stopped Working Harder and Started Working Smarter
  2. FireEye links Russia-owned lab to Trisis developers
  3. An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet
  4. Securing Government Operations with Cloud-based Malware Analysis
  5. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  6. Quantifying Vulnerability Risk: How to Quickly Calculate and Prioritize Risk
  7. Phishing attacks becoming more targeted, phishers love Microsoft the most
  8. Indiana National Guard hit by ransomware
  9. UK and US sign military Cyber Accord to dominate cyber domain - with help from business
  10. Saudi Investment Site Defaced After Journalist’s Murder
  11. NSA Tools Used to Attack Nuclear Energy Firms
  12. Burned malware returns, says Cylance report: Is Hacking Team responsible?
  13. The fix for the DOM-based XSS in Branch.io introduced a new XSS flaw
  14. Can Cybercriminals Hack Blockchain?

SOUTH AMERICA

Nil

EUROPE

  1. Experts advocate for 'ATT&CK' as go-to framework to share threat intel
  2. FireEye links Russia-owned lab to Trisis developers
  3. Triton Malware Linked to Russian Government Research Institute
  4. FireEye links Russian research lab to Triton ICS malware attacks
  5. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  6. TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers
  7. #sLoad and #Ramnit pairing in sustained personalized campaigns against UK and Italy
  8. UK and US sign military Cyber Accord to dominate cyber domain - with help from business
  9. NSA Tools Used to Attack Nuclear Energy Firms
  10. “We’re less likely to be caught up in a massive breach of highly available PII or financial data that gets
  11. Morrisons loses appeal over data breach
  12. Hacking operations with DarkPulsar and other tools developed by the NSA

AFRICA

Nil

Sector brief for 2018-10-23

HEALTHCARE

Nil

TRANSPORT

  1. NSA Tools Used to Attack Nuclear Energy Firms
  2. Hacking operations with DarkPulsar and other tools developed by the NSA

BANKING & FINANCE

  1. Case Study: Ransomware
  2. Banking Trojan Infections Persist Throughout the State
  3. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  4. New Phishing Attack That Uses Multiple Replica Sign-In Pages
  5. What do you think the combination of the #TrickBot banking Trojan to #IcedID means for the future of banking #Trojans?
  6. Phishing attacks becoming more targeted, phishers love Microsoft the most
  7. “We’re less likely to be caught up in a massive breach of highly available PII or financial data that gets
  8. Morrisons loses appeal over data breach
  9. North Korean Hackers Stole $571 Million Worth of CryptoCoins in Less Than 24 Months
  10. Can Cybercriminals Hack Blockchain?

INFORMATION & TELECOMMUNICATION

  1. Microsoft Windows zero-day disclosed on Twitter, again
  2. When Ransomware Stopped Working Harder and Started Working Smarter
  3. Status of Today’s Email as a Malware Vector
  4. Banking Trojan Infections Persist Throughout the State
  5. An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet
  6. Battling Bots: How to Find Fake Twitter Followers
  7. Top 10 security steps in Microsoft 365 that political campaigns can take today
  8. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  9. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  10. Thousands of applications affected by a zero-day issue injQuery File Upload plugin
  11. Identify when your data is exposed, your brand is abused, or your company is mentioned on the dark web. Test
  12. New Phishing Attack That Uses Multiple Replica Sign-In Pages
  13. Facebook has seen several data breaches in the last few months, leading the company to look into acquiring a
  14. 5 Ways #Cybercriminals Can Access Your Emails Without Phishing [Infographic]:
  15. Police have issued a fresh warning concerning Fortnite and players giving out their personal details online. Cheshire Police posted on Facebook,
  16. #sLoad and #Ramnit pairing in sustained personalized campaigns against UK and Italy
  17. Why is Elon Musk promoting this Bitcoin scam? (He’s not)
  18. "Advanced attacks, spear-phishing and data breaches are the norm, instead of the exception. We need to address these issues with
  19. Have you ever wondered why #ransomware attacks happen on the Friday before a long weekend? We've teamed up with @SentinelOne
  20. Apple has launched its university ID Cards feature in Wallet. Students at three universities can now access their student ID

FOOD

Nil

WATER

Nil

ENERGY

  1. FireEye links Russia-owned lab to Trisis developers
  2. NSA Tools Used to Attack Nuclear Energy Firms
  3. Hacking operations with DarkPulsar and other tools developed by the NSA

GOVERNMENT & PUBLIC SERVICE

  1. FireEye links Russia-owned lab to Trisis developers
  2. Case Study: Protecting PII
  3. Banking Trojan Infections Persist Throughout the State
  4. Triton Malware Linked to Russian Government Research Institute
  5. Securing Government Operations with Cloud-based Malware Analysis
  6. Top 10 security steps in Microsoft 365 that political campaigns can take today
  7. This is how government spyware StrongPity uses security researchers' work against them
  8. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  9. Indiana National Guard Suffers Ransomware Attack
  10. TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers
  11. Indiana National Guard hit by ransomware
  12. Police have issued a fresh warning concerning Fortnite and players giving out their personal details online. Cheshire Police posted on Facebook,
  13. UK and US sign military Cyber Accord to dominate cyber domain - with help from business
  14. Saudi Investment Site Defaced After Journalist’s Murder
  15. CyberSecurity Asean security alert on Multiple Vulnerabilities in Cisco WebEx Network Recording Player for Advanced Recording Format Files Could Allow for Arbitrary Code Execution
  16. Morrisons loses appeal over data breach
  17. North Korean Hackers Stole $571 Million Worth of CryptoCoins in Less Than 24 Months
  18. Can Cybercriminals Hack Blockchain?

Daily brief for 2018-10-23

ASIA

  1. FireEye links Russia-owned lab to Trisis developers
  2. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  3. Chinese Cyber Espionage Group using Datper Trojan
  4. Saudi Investment Site Defaced After Journalist’s Murder
  5. NSA Tools Used to Attack Nuclear Energy Firms
  6. Burned malware returns, says Cylance report: Is Hacking Team responsible?
  7. libssh Server-Side Identity Authentication Bypass Vulnerability (CVE-2018-10933)Threat Alert
  8. WebLogic Remote Code Execution Vulnerability(CVE-2018-3191)Threat Alert
  9. North Korean Hackers Stole $571 Million Worth of CryptoCoins in Less Than 24 Months
  10. Hacking operations with DarkPulsar and other tools developed by the NSA
  11. Can Cybercriminals Hack Blockchain?

WORLD

  1. When Ransomware Stopped Working Harder and Started Working Smarter
  2. Experts advocate for 'ATT&CK' as go-to framework to share threat intel
  3. FireEye links Russia-owned lab to Trisis developers
  4. Triton Malware Linked to Russian Government Research Institute
  5. FireEye links Russian research lab to Triton ICS malware attacks
  6. An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet
  7. Securing Government Operations with Cloud-based Malware Analysis
  8. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  9. TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers
  10. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  11. Quantifying Vulnerability Risk: How to Quickly Calculate and Prioritize Risk
  12. Phishing attacks becoming more targeted, phishers love Microsoft the most
  13. Indiana National Guard hit by ransomware
  14. #sLoad and #Ramnit pairing in sustained personalized campaigns against UK and Italy
  15. UK and US sign military Cyber Accord to dominate cyber domain - with help from business
  16. Saudi Investment Site Defaced After Journalist’s Murder
  17. NSA Tools Used to Attack Nuclear Energy Firms
  18. Burned malware returns, says Cylance report: Is Hacking Team responsible?
  19. “We’re less likely to be caught up in a massive breach of highly available PII or financial data that gets
  20. The fix for the DOM-based XSS in Branch.io introduced a new XSS flaw
  21. Morrisons loses appeal over data breach
  22. Hacking operations with DarkPulsar and other tools developed by the NSA
  23. Can Cybercriminals Hack Blockchain?

ATTACKS

  1. Case Study: Protecting PII
  2. An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet
  3. Top 10 security steps in Microsoft 365 that political campaigns can take today
  4. Critical vulnerabilities in FreeRTOS allowed for IoT device compromise
  5. Thousands of applications affected by a zero-day issue injQuery File Upload plugin
  6. Malicious actors attacked a back-end insurance system and the resulting @HealthCareGov #breach exposed an unknown amount of data on 75,000
  7. Identify when your data is exposed, your brand is abused, or your company is mentioned on the dark web. Test
  8. Phishing is still the most commonly used attack on organizations, survey says
  9. New Phishing Attack That Uses Multiple Replica Sign-In Pages
  10. How sophisticated phishing grants attackers total control of your computer
  11. How sophisticated phishing grants attackers total control of your computer
  12. Thousands of Applications Vulnerable to RCE via jQuery File Upload
  13. Facebook has seen several data breaches in the last few months, leading the company to look into acquiring a
  14. 5 Ways #Cybercriminals Can Access Your Emails Without Phishing [Infographic]:
  15. Phishing attacks becoming more targeted, phishers love Microsoft the most
  16. Police have issued a fresh warning concerning Fortnite and players giving out their personal details online. Cheshire Police posted on Facebook,
  17. Adult websites shuttered after 1.2 million user details exposed
  18. #sLoad and #Ramnit pairing in sustained personalized campaigns against UK and Italy
  19. Learn how hackers launched #phishing attacks against @netflix users with expert Michael Cobb of @thehairyITdog
  20. jQuery? More like preyQuery: File upload tool can be exploited to hijack at-risk websites
  21. "Advanced attacks, spear-phishing and data breaches are the norm, instead of the exception. We need to address these issues with
  22. “We’re less likely to be caught up in a massive breach of highly available PII or financial data that gets
  23. Phishing Report Shows Microsoft, Paypal, & Netflix as Top Targets
  24. A flaw in @Google Firebase #DatabaseSecurity allowed hackers to bypass security and leak data. Learn more about this #SecurityFlaw and
  25. Morrisons loses appeal over data breach
  26. 4 suggerimenti per utilizzare al meglio il vostro #password manager e generare password davvero efficaci. Ebbene sì, repetita juvant :)
  27. Morrisons loses appeal against data breach liability ruling
  28. A #ZeroDay in the popular #jQuery File Upload plugin could affect thousands of projects and the jQuery #plugin vulnerability may

THREATS

  1. DHS warns of another dangerous flaw in Advantech WebAccess SCADA software
  2. Burned malware returns, according to Cylance: is Hacking Team responsible?
  3. Microsoft Windows zero-day disclosed on Twitter, again
  4. AWS FreeRTOS Riddled with Security Vulnerabilities | Avast
  5. When Ransomware Stopped Working Harder and Started Working Smarter
  6. City Pays $2K in Ransomware, Stirs ‘Never Pay’ Debate
  7. Status of Today’s Email as a Malware Vector
  8. Case Study: Destructive Malware
  9. Case Study: Ransomware
  10. Banking Trojan Infections Persist Throughout the State
  11. Triton Malware Linked to Russian Government Research Institute
  12. Why the blockchain is not secure
  13. FireEye links Russian research lab to Triton ICS malware attacks
  14. Securing Government Operations with Cloud-based Malware Analysis
  15. How RATs infect computers with malicious software
  16. This is how government spyware StrongPity uses security researchers' work against them
  17. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  18. Indiana National Guard Suffers Ransomware Attack
  19. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  20. Critical vulnerabilities in FreeRTOS allowed for IoT device compromise
  21. Thousands of applications affected by a zero-day issue injQuery File Upload plugin
  22. Grave TCP/IP Flaws In FreeRTOS Leave IoT Gear Open To Mass Hijacking
  23. Malicious actors attacked a back-end insurance system and the resulting @HealthCareGov #breach exposed an unknown amount of data on 75,000
  24. Trade.io Cold Wallet Hacked Losing 50 Million TIO Tokens – TIO Coin To Be Forked
  25. H-Worm and jRAT Malware: Two RATs are Better than One
  26. Patch now! Multiple serious flaws found in Drupal
  27. How RATs infect computers with malicious software
  28. Quantifying Vulnerability Risk: How to Quickly Calculate and Prioritize Risk
  29. What do you think the combination of the #TrickBot banking Trojan to #IcedID means for the future of banking #Trojans?
  30. Indiana National Guard hit by ransomware
  31. Amazon Patched Multiple IoT Vulnerabilities Affecting Its Smart Devices
  32. Updated Azorult malware for sale on the Dark Web
  33. Amazon patches IoT and critical infrastructure security flaws
  34. Why is Elon Musk promoting this Bitcoin scam? (He’s not)
  35. UK and US sign military Cyber Accord to dominate cyber domain - with help from business
  36. Chinese Cyber Espionage Group using Datper Trojan
  37. Patch me, if you can: Grave TCP/IP flaws in FreeRTOS leave IoT gear open to mass hijacking
  38. Several vulnerabilities were found in controllers made by @Universal_Robot. Discover what these #robot controllers are used for and how
  39. Burned malware returns, says Cylance report: Is Hacking Team responsible?
  40. How do newly found flaws affect robot controllers?
  41. Firmware zero-day leaves 2m storage devices open to RCE
  42. Report: Cryptocurrency hackers earned $20M with 51-percent attacks in 2018
  43. A flaw in @Google Firebase #DatabaseSecurity allowed hackers to bypass security and leak data. Learn more about this #SecurityFlaw and
  44. CyberSecurity Asean security alert on Multiple Vulnerabilities in Cisco WebEx Network Recording Player for Advanced Recording Format Files Could Allow for Arbitrary Code Execution
  45. Bug Spells Doom for Nearly-Vacant Google+ Network
  46. The fix for the DOM-based XSS in Branch.io introduced a new XSS flaw
  47. libssh Server-Side Identity Authentication Bypass Vulnerability (CVE-2018-10933)Threat Alert
  48. Have you ever wondered why #ransomware attacks happen on the Friday before a long weekend? We've teamed up with @SentinelOne
  49. WebLogic Remote Code Execution Vulnerability(CVE-2018-3191)Threat Alert
  50. Different Vendors Confirm The Impact Of LibSSH Flaw On Their Products
  51. Apple has launched its university ID Cards feature in Wallet. Students at three universities can now access their student ID
  52. FreeRTOS IoT OS Critical Vulnerabilities Affected Million of Smart Home & Critical Infrastructure Based IoT Devices
  53. LIVE555 Streaming library affected by remote code execution vulnerability
  54. Can Cybercriminals Hack Blockchain?
  55. A Beginner’s Guide to Bitcoin Mining (Bitcoin Mining 101)
  56. Windows 10 1809 Zip Extraction Bug Overwrites Files without Confirmation
  57. A #ZeroDay in the popular #jQuery File Upload plugin could affect thousands of projects and the jQuery #plugin vulnerability may

CRIME

  1. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  2. Thousands of applications affected by a zero-day issue injQuery File Upload plugin
  3. H-Worm and jRAT Malware: Two RATs are Better than One
  4. New Phishing Attack That Uses Multiple Replica Sign-In Pages
  5. Why is Elon Musk promoting this Bitcoin scam? (He’s not)
  6. Morrisons loses appeal over data breach
  7. North Korean Hackers Stole $571 Million Worth of CryptoCoins in Less Than 24 Months
  8. Can Cybercriminals Hack Blockchain?

POLITICS

  1. An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet
  2. Top 10 security steps in Microsoft 365 that political campaigns can take today
  3. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  4. TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers
  5. Chinese Cyber Espionage Group using Datper Trojan
  6. Saudi Investment Site Defaced After Journalist’s Murder
  7. NSA Tools Used to Attack Nuclear Energy Firms