DATA BREACH & DATA LOSS
- Week in review: Volume of Australian data breaches continues unabated
- Google dorks were the root cause of a catastrophic compromise of CIA’s communications
- Your personal data is widely available to hackers
- This Tool Shows Exposed Cameras Around Your Neighborhood
- New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips
- Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
- Australian shipbuilder Austal hit by data breach
- Equifax Set to Share More PII with Experian
- #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
- National biometric database could be on the way (and in private hands)
- Over 80,000 Facebook User Accounts Compromised
- "If an organization created #DMARC records for the first time, it would encounter syntax and content issues -- one of
- Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
- "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
- "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"
DENIAL-OF-SERVICE
- What were the DDoS numbers for Q2 & Q3 2018?
- A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
MALVERTISING
Nil
PHISHING
- Almost 300 Percent Increase in eCommerce Phishing Attacks in Q3 2018
- Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
- How to use Firefox Master Password.
- Why you should be using a password manager
- How did @Google eliminate successful #PhishingAttacks? Learn how employees used U2F authentication and physical #SecurityKeys to defend against phishing from
- Password Constraints and Their Unintended Security Consequences
- Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM
- How can U2F authentication end phishing attacks?
- Phishing attacks up by 297 percent across eCommerce in Q3 2018
WEB DEFACEMENT
Nil
BOTNET
- Shellbot Botnet Targets Linux, Android Devices
- Original Mirai botnet creator hit with hefty financial sentence
RANSOMWARE
- #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
- Researchers found #Kraken #ransomware has become more popular after being packaged in the Fallout #ExploitKit and becoming part of an
CRYPTOMINING & CRYPTOCURRENCIES
- No, blockchain isn't the answer to our voting system woes
- Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
- Another wave of Elon Musk bitcoin scams spread by verified Twitter accounts
- Researchers found #Kraken #ransomware has become more popular after being packaged in the Fallout #ExploitKit and becoming part of an
- Blockhead makes blockchain easy for developers
- The building blocks of blockchain-based digital identity
MALWARE
- Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
- Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
- Malware of the 1980s: Looking back at the Brain Virus and the Morris Worm
- Why malware attacks should no longer be a problem for businesses
- Android Rat – TheFatRat to Hack and Gain access to Targeted Android Phone
- Scammers Ride on Popular Vote411 Voter Info Site to Push Scareware Alerts
- How to Get Rid of Cortana Runtime Broker CPU Miner Virus
- Fake malicious @RSAsecurity #SecurID malware in pre-release state on @GooglePlay:
- Currently gathering information (profiling) the mobile device it is installed
- Video analysis of Android banking Trojan found on Google Play (Red Alert 2)
- Recently there have been a lot of packed Android malware around, so I decided to write a blog-post on how
EXPLOIT
- PoC Available for Microsoft Edge Zero-Day RCE, Exploit Under Development
- Security researchers exploit Intel hyperthreading flaw to break encryption
VULNERABILITY
- Apache warns Struts 2.3 is using a library with a two year old critical flaw
- Online Radio Stations at Risk from Icecast Flaw
- PoC Available for Microsoft Edge Zero-Day RCE, Exploit Under Development
- Flaws In Self-Encrypting SSDs Let Attackers Bypass Encryption
- New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips
- Why Are Deserialization Vulnerabilities So Popular?
- Flaws in self-encrypting SSDs let attackers bypass disk encryption
- [SingCERT] Technical Advisory on Vulnerabilities in Bluetooth Low Energy Chips by Texas Instruments (CVE-2018-16986 and CVE-2018-7080)
- Inception Attackers Target Europe with Year-old Office Vulnerability
- Kemp Investigates Dems, Not the Reported Vulnerability
- Flaws in Popular SSD Drives Bypass Hardware Disk Encryption
- Flaw in Icecast streaming media server allows to take off online Radio Stations
- Security researchers exploit Intel hyperthreading flaw to break encryption
- .@ArmisSecurity researchers discovered two chip-level #Bluetooth vulnerabilities -- dubbed #Bleedingbit -- that could allow pseudo #RemoteCodeExecution on wireless access points.
- Vulnerabilities’ CVSS scores soon to be assigned by AI
- Cisco Products Affected By A Zero-Day SIP Inspection Vulnerability Exploited In The Wild
- High severity XML external entity flaw affects Sauter building automation product
- Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.
- Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points
- Mozilla Patched Multiple Security Vulnerabilities in Thunderbird 60.3
- Apple Patched Multiple XNU Kernel Vulnerabilities In MacOS And iOS
- Companies implementing DevSecOps address vulnerabilities faster than others
- The Ultimate Guide to Bug Bounty Platforms
- PortSmash – A New Side Channel Vulnerability in SMT/Hyper-Threading That Allows Attackers To Steal Sensitive Data
- Security Think Tank: Three ways to safeguard against application layer vulnerabilities
- Security Bug in Icecast Puts Online Radio Stations At Risk
- Researchers discover new zero-day vulnerability in EDGE browser
ASIA
- Google dorks were the root cause of a catastrophic compromise of CIA’s communications
- Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
- Persian Stalker pillages Iranian users of Instagram and Telegram
- A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
OCEANIA
- Week in review: Volume of Australian data breaches continues unabated
- Australian shipbuilder Austal hit by data breach
- Persian Stalker pillages Iranian users of Instagram and Telegram
- A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
- "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"
NORTH AMERICA
- What were the DDoS numbers for Q2 & Q3 2018?
- Google dorks were the root cause of a catastrophic compromise of CIA’s communications
- Your personal data is widely available to hackers
- Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
- Magecart Strikes Again, and Kitronik Is Latest Victim
- Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
- Equifax Set to Share More PII with Experian
- #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
- Over 80,000 Facebook User Accounts Compromised
- Why malware attacks should no longer be a problem for businesses
- Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points
- Persian Stalker pillages Iranian users of Instagram and Telegram
- A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
- "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
- "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"
SOUTH AMERICA
- Over 80,000 Facebook User Accounts Compromised
EUROPE
- Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
- Google dorks were the root cause of a catastrophic compromise of CIA’s communications
- Magecart Infiltrates U.K. Online Retailer Kitronik POS
- Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
- Magecart Strikes Again, and Kitronik Is Latest Victim
- Inception Attackers Target Europe with Year-old Office Vulnerability
- Kemp Investigates Dems, Not the Reported Vulnerability
- Over 80,000 Facebook User Accounts Compromised
- Persian Stalker pillages Iranian users of Instagram and Telegram
- Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
- A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
AFRICA
- Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
HEALTHCARE
Nil
TRANSPORT
Nil
BANKING & FINANCE
- Original Mirai botnet creator hit with hefty financial sentence
- Magecart Strikes Again, and Kitronik Is Latest Victim
- Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
- Over 80,000 Facebook User Accounts Compromised
- Why malware attacks should no longer be a problem for businesses
- Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM
- Persian Stalker pillages Iranian users of Instagram and Telegram
- Phishing attacks up by 297 percent across eCommerce in Q3 2018
- A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
- Video analysis of Android banking Trojan found on Google Play (Red Alert 2)
INFORMATION & TELECOMMUNICATION
- PoC Available for Microsoft Edge Zero-Day RCE, Exploit Under Development
- Original Mirai botnet creator hit with hefty financial sentence
- Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
- Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
- Another wave of Elon Musk bitcoin scams spread by verified Twitter accounts
- Inception Attackers Target Europe with Year-old Office Vulnerability
- Flaw in Icecast streaming media server allows to take off online Radio Stations
- Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.
- Over 80,000 Facebook User Accounts Compromised
- Persian Stalker pillages Iranian users of Instagram and Telegram
- Phishing attacks up by 297 percent across eCommerce in Q3 2018
- The Ultimate Guide to Bug Bounty Platforms
- Researchers discover new zero-day vulnerability in EDGE browser
- Fake malicious @RSAsecurity #SecurID malware in pre-release state on @GooglePlay:
- Currently gathering information (profiling) the mobile device it is installed
- "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
FOOD
Nil
WATER
Nil
ENERGY
- [SingCERT] Technical Advisory on Vulnerabilities in Bluetooth Low Energy Chips by Texas Instruments (CVE-2018-16986 and CVE-2018-7080)
- Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points
GOVERNMENT & PUBLIC SERVICE
- No, blockchain isn't the answer to our voting system woes
- Google dorks were the root cause of a catastrophic compromise of CIA’s communications
- Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
- Inception Attackers Target Europe with Year-old Office Vulnerability
- Kemp Investigates Dems, Not the Reported Vulnerability
- Persian Stalker pillages Iranian users of Instagram and Telegram
- Phishing attacks up by 297 percent across eCommerce in Q3 2018
- Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
- "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
ASIA
- Google dorks were the root cause of a catastrophic compromise of CIA’s communications
- Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
- Persian Stalker pillages Iranian users of Instagram and Telegram
- A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
WORLD
- Week in review: Volume of Australian data breaches continues unabated
- Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
- What were the DDoS numbers for Q2 & Q3 2018?
- Google dorks were the root cause of a catastrophic compromise of CIA’s communications
- Your personal data is widely available to hackers
- Magecart Infiltrates U.K. Online Retailer Kitronik POS
- Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
- Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
- Magecart Strikes Again, and Kitronik Is Latest Victim
- Inception Attackers Target Europe with Year-old Office Vulnerability
- Kemp Investigates Dems, Not the Reported Vulnerability
- Australian shipbuilder Austal hit by data breach
- Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
- Equifax Set to Share More PII with Experian
- #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
- Over 80,000 Facebook User Accounts Compromised
- Why malware attacks should no longer be a problem for businesses
- Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points
- Persian Stalker pillages Iranian users of Instagram and Telegram
- Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
- A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
- "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
- "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"
ATTACKS
- Week in review: Volume of Australian data breaches continues unabated
- Almost 300 Percent Increase in eCommerce Phishing Attacks in Q3 2018
- Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
- Google dorks were the root cause of a catastrophic compromise of CIA’s communications
- Your personal data is widely available to hackers
- This Tool Shows Exposed Cameras Around Your Neighborhood
- New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips
- How to use Firefox Master Password.
- Why you should be using a password manager
- Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
- Australian shipbuilder Austal hit by data breach
- How did @Google eliminate successful #PhishingAttacks? Learn how employees used U2F authentication and physical #SecurityKeys to defend against phishing from
- Password Constraints and Their Unintended Security Consequences
- Equifax Set to Share More PII with Experian
- #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
- National biometric database could be on the way (and in private hands)
- Over 80,000 Facebook User Accounts Compromised
- Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM
- How can U2F authentication end phishing attacks?
- Phishing attacks up by 297 percent across eCommerce in Q3 2018
- "If an organization created #DMARC records for the first time, it would encounter syntax and content issues -- one of
- Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
- "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
- "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"
THREATS
- Apache warns Struts 2.3 is using a library with a two year old critical flaw
- Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
- Online Radio Stations at Risk from Icecast Flaw
- No, blockchain isn't the answer to our voting system woes
- PoC Available for Microsoft Edge Zero-Day RCE, Exploit Under Development
- Flaws In Self-Encrypting SSDs Let Attackers Bypass Encryption
- New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips
- Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
- Why Are Deserialization Vulnerabilities So Popular?
- Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
- Another wave of Elon Musk bitcoin scams spread by verified Twitter accounts
- Flaws in self-encrypting SSDs let attackers bypass disk encryption
- [SingCERT] Technical Advisory on Vulnerabilities in Bluetooth Low Energy Chips by Texas Instruments (CVE-2018-16986 and CVE-2018-7080)
- Inception Attackers Target Europe with Year-old Office Vulnerability
- Malware of the 1980s: Looking back at the Brain Virus and the Morris Worm
- Kemp Investigates Dems, Not the Reported Vulnerability
- Flaws in Popular SSD Drives Bypass Hardware Disk Encryption
- Flaw in Icecast streaming media server allows to take off online Radio Stations
- Security researchers exploit Intel hyperthreading flaw to break encryption
- .@ArmisSecurity researchers discovered two chip-level #Bluetooth vulnerabilities -- dubbed #Bleedingbit -- that could allow pseudo #RemoteCodeExecution on wireless access points.
- Vulnerabilities’ CVSS scores soon to be assigned by AI
- Cisco Products Affected By A Zero-Day SIP Inspection Vulnerability Exploited In The Wild
- #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
- Researchers found #Kraken #ransomware has become more popular after being packaged in the Fallout #ExploitKit and becoming part of an
- High severity XML external entity flaw affects Sauter building automation product
- Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.
- Blockhead makes blockchain easy for developers
- Why malware attacks should no longer be a problem for businesses
- Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points
- Mozilla Patched Multiple Security Vulnerabilities in Thunderbird 60.3
- Android Rat – TheFatRat to Hack and Gain access to Targeted Android Phone
- Apple Patched Multiple XNU Kernel Vulnerabilities In MacOS And iOS
- Scammers Ride on Popular Vote411 Voter Info Site to Push Scareware Alerts
- The building blocks of blockchain-based digital identity
- Companies implementing DevSecOps address vulnerabilities faster than others
- How to Get Rid of Cortana Runtime Broker CPU Miner Virus
- The Ultimate Guide to Bug Bounty Platforms
- PortSmash – A New Side Channel Vulnerability in SMT/Hyper-Threading That Allows Attackers To Steal Sensitive Data
- Security Think Tank: Three ways to safeguard against application layer vulnerabilities
- Security Bug in Icecast Puts Online Radio Stations At Risk
- Researchers discover new zero-day vulnerability in EDGE browser
- Fake malicious @RSAsecurity #SecurID malware in pre-release state on @GooglePlay:
- Currently gathering information (profiling) the mobile device it is installed
- Video analysis of Android banking Trojan found on Google Play (Red Alert 2)
- Recently there have been a lot of packed Android malware around, so I decided to write a blog-post on how
CRIME
- Week in review: Volume of Australian data breaches continues unabated
- Original Mirai botnet creator hit with hefty financial sentence
- Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
- Australian shipbuilder Austal hit by data breach
- Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
- Equifax Set to Share More PII with Experian
- Over 80,000 Facebook User Accounts Compromised
- Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM
- Persian Stalker pillages Iranian users of Instagram and Telegram
- Phishing attacks up by 297 percent across eCommerce in Q3 2018
- The Ultimate Guide to Bug Bounty Platforms
POLITICS
- Google dorks were the root cause of a catastrophic compromise of CIA’s communications
- Kemp Investigates Dems, Not the Reported Vulnerability
- Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
- "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me