Nov 7, 2018

APT report for 2018-11-06

TRANSNATIONAL / UNKNOWN

  1. Magecart infiltrates UK online retailer Kitronik payment system

CHINA

  1. Intel responds to the Epyc server threat from AMD

INDIA

  1. Tech companies offered free products to help secure the election. Now what?

NORTH KOREA

  1. Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges
  2. Worst malware and threat actors of 2018 so far

PAKISTAN

Nil

VIETNAM

Nil

IRAN

  1. Fake Telegram Apps Used to Spy on Iranian Users
  2. Worst malware and threat actors of 2018 so far

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

Nil

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

  1. Compromising vital infrastructure: transport and logistics
  2. Worst malware and threat actors of 2018 so far
  3. Nation states sponsoring increasingly sophisticated cyber attacks

SERBIA

Nil

UKRAINE

Nil

Platform report for 2018-11-06

WINDOWS

  1. Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
  2. Malware Execution via Microsoft Word Embedded Video
  3. Evernote for Windows patch resolves stored XSS vulnerability
  4. Spam and phishing in Q3 2018
  5. Worst malware and threat actors of 2018 so far
  6. Shellbot Botnet Targets IoT devices and Linux servers

LINUX

  1. Shellbot Botnet Targets IoT devices and Linux servers

UNIX

Nil

ANDROID

  1. Android November update fixes flaws galore
  2. Shellbot Botnet Targets IoT devices and Linux servers
  3. #ThreatFabric discovers #NeoBot Android Banking Trojan (#Exobot spawn) in #GooglePlay with 10,000+ installs Please contact us if your interested in
  4. Symantec acquires Appthority to enhance protection from mobile application vulnerabilities

IOS

  1. Spam and phishing in Q3 2018
  2. Apple Patches Critical iOS, macOS and watchOS Flaws
  3. Symantec acquires Appthority to enhance protection from mobile application vulnerabilities

MACOS

  1. Backdoors Installed via macOS Cryptocurrency App
  2. Apple Patches Critical iOS, macOS and watchOS Flaws

Threat report for 2018-11-06

DATA BREACH & DATA LOSS

  1. HSBC Data Breach Hits Online Banking Customers
  2. My Health Record data misuse penalties raised
  3. Holiday Suppliers Already Under Assault by Fileless Malware Campaign
  4. Election Day: Five Security Experts Conclude that Georgia’s Online Voter Database is Easily Hackable
  5. HSBC Bank Confirms US Data Breach
  6. UK Regulator Calls for Tougher Rules on Personal Data Use
  7. HSBC Bank USA Warns Customers of Data Breach
  8. HSBC Bank Data Breach Exposed Account Numbers, Balances, and More
  9. Samsung, Crucial’s Flawed Storage Drive Encryption Leaves Data Exposed
  10. Why business can't keep the public safe from data breaches
  11. It’s thought that the private message data was obtained via a malicious browser extension that scraped the data from users’
  12. Alert: Emotet is Back with Major Spam Campaign, Email Exfiltration Module
  13. Azorult Malware Spread by New Ramnit Campaign
  14. Pocket iNet ISP Exposed 73GB of Corporate Data Online
  15. HSBC Bank Notifies Customers of Data Breach
  16. Business email compromise made easy for cybercriminals as 12.5 million company email inboxes and 33,000 finance department credentials openly accessible
  17. Wealthy Moscow residents' data leaked in Akado Telecom incident
  18. New attack by Anonymous Italy: personal data from ministries and police have been released online

DENIAL-OF-SERVICE

Nil

MALVERTISING

Nil

PHISHING

  1. ThreatList: Despite Fraud Awareness, Password Reuse Persists for Half of U.S. Consumers
  2. Zombie Phish
  3. Login VSI announces Release 3 of Login PI for proactive monitoring
  4. Spam and phishing in Q3 2018
  5. GPU side channel attacks can enable spying on web activity, password stealing
  6. Our crucible SoC OTP fusing tool now support graphical mapping of fusemap definition files. This, other than being very pretty, facilitates
  7. Social Media Brand Impersonators Go #Phishing: 3 Emerging Tactics from ZeroFOX Research
  8. Gift Card Phishing Scam Using Email Addresses of Bosses’ is Latest Trend Adopted by Scammers
  9. Samsung & Crucial Storage Device Vulnerability Allow Attackers to Break the Password & Access the Entire Device Data
  10. Just half of Fortune 500 companies have installed DMARC, a tool that guards against email phishing scams, according to new

WEB DEFACEMENT

  1. Anonymous Hackers Syndicate Defaces Huge Number of Websites of Gabon Government

BOTNET

  1. Zombie Phish
  2. VB2018 paper: Uncovering the wholesale industry of social media fraud: from botnet to bulk reseller panels
  3. Shellbot Botnet Targets IoT devices and Linux servers

RANSOMWARE

  1. Ransomware Keeps Ringing in Profits for Cybercrime Rings
  2. New ransomware spotted using DiskCryptor
  3. We're hosting a lunch and learn event geared towards endpoint #security and #ransomware, with technology partner @SentinelOne. Please join us on

CRYPTOMINING & CRYPTOCURRENCIES

  1. Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges
  2. Hackers Breach StatCounter To Hijack Bitcoin Transactions
  3. StatCounter Hacked to Inject Malicious Script in gate.io Cryptocurrency Exchange
  4. VMware Unveils New Blockchain Service
  5. Hackers breach StatCounter to hijack Bitcoin transactions on Gate.io exchange
  6. Backdoors Installed via macOS Cryptocurrency App
  7. Supply-chain attack on cryptocurrency exchange
  8. Supply-chain attack on cryptocurrency exchange
  9. Why are fake Elon Musk bitcoin scams running rife on Twitter right now?
  10. How IAM is Evolving in the Blockchain Era
  11. A Blockchain Solution for Data Provenance Using Hyperledger Fabric
  12. Watch Out for the “Programmer Who Cracked Your Email” Bitcoin Scam

MALWARE

  1. US DoD’s first malware submissions to Google-bought VirusTotal is Russia-linked LoJack
  2. Holiday Suppliers Already Under Assault by Fileless Malware Campaign
  3. StatCounter Hacked to Inject Malicious Script in gate.io Cryptocurrency Exchange
  4. It’s thought that the private message data was obtained via a malicious browser extension that scraped the data from users’
  5. Malware Execution via Microsoft Word Embedded Video
  6. Azorult Malware Spread by New Ramnit Campaign
  7. Private messages from 81,000 hacked Facebook accounts were for sale online. The information was obtained through malicious browser extensions, such as
  8. Worst malware and threat actors of 2018 so far
  9. #ThreatFabric discovers #NeoBot Android Banking Trojan (#Exobot spawn) in #GooglePlay with 10,000+ installs Please contact us if your interested in

EXPLOIT

  1. Exploit Developer Discovers Zero-Day Microsoft Edge Vulnerability Triggering RCE Attacks

VULNERABILITY

  1. Apache Struts Vulnerability Would Allow System Takeover
  2. Hack the Air Force 3.0 Bug Bounty Announced by USAF
  3. Android November update fixes flaws galore
  4. Zero-Day Vulnerability Explained
  5. WordPress Design Flaw + WooCommerce Vulnerability Leads to Site Takeover
  6. Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
  7. Side-Channel Vulnerability PortSmash Steals Keys
  8. Apache Struts Warns Users of Two-Year-Old Vulnerability
  9. Apache Struts Warns Users of Two-Year-Old Vulnerability
  10. Apache Struts 2.3.x vulnerable to two year old RCE flaw
  11. IBM Watson will be used by NIST to assign CVSS scores to vulnerabilities
  12. Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.
  13. Hidden Costs of IoT Vulnerabilities
  14. Evernote for Windows patch resolves stored XSS vulnerability
  15. Exploit Developer Discovers Zero-Day Microsoft Edge Vulnerability Triggering RCE Attacks
  16. How testing perspectives helps find application security flaws
  17. PortSmash Side-Channel Vulnerability – Another Threat For Intel CPUs
  18. U.S. Air Force Announces Third Bug Bounty Program
  19. CVE-2018-11759: Apache mod_jk Access Control Bypass Vulnerability
  20. High risk vulnerability discovered in Sauter CASE Suite building automation software
  21. Apache Struts Team Urges Users for Library Update to Plug Years-Old Bugs
  22. Samsung & Crucial Storage Device Vulnerability Allow Attackers to Break the Password & Access the Entire Device Data
  23. Flaws in Popular Self-Encrypting SSDs Let Attackers Decrypt Data
  24. Apple Patches Critical iOS, macOS and watchOS Flaws
  25. Multiple Cisco Vulnerabilities Threat Alert
  26. Vulnerability in Icecast can collapse online radio stations
  27. Two zero-day vulnerabilities expose millions of access points
  28. Gitlab v11.4.5 release: fix bugs
  29. Symantec acquires Appthority to enhance protection from mobile application vulnerabilities

Region brief for 2018-11-06

ASIA

  1. Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges
  2. Fake Telegram Apps Used to Spy on Iranian Users
  3. Spam and phishing in Q3 2018
  4. Worst malware and threat actors of 2018 so far
  5. Shellbot Botnet Targets IoT devices and Linux servers
  6. Nation states sponsoring increasingly sophisticated cyber attacks
  7. New attack by Anonymous Italy: personal data from ministries and police have been released online
  8. Multiple Cisco Vulnerabilities Threat Alert

OCEANIA

  1. Spam and phishing in Q3 2018

NORTH AMERICA

  1. US DoD’s first malware submissions to Google-bought VirusTotal is Russia-linked LoJack
  2. Hack the Air Force 3.0 Bug Bounty Announced by USAF
  3. ThreatList: Despite Fraud Awareness, Password Reuse Persists for Half of U.S. Consumers
  4. Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges
  5. HSBC Bank Confirms US Data Breach
  6. Compromising vital infrastructure: transport and logistics
  7. HSBC Bank USA Warns Customers of Data Breach
  8. Pocket iNet ISP Exposed 73GB of Corporate Data Online
  9. Tech companies offered free products to help secure the election. Now what?
  10. Spam and phishing in Q3 2018
  11. We're hosting a lunch and learn event geared towards endpoint #security and #ransomware, with technology partner @SentinelOne. Please join us on
  12. U.S. Air Force Announces Third Bug Bounty Program
  13. Nation states sponsoring increasingly sophisticated cyber attacks
  14. New attack by Anonymous Italy: personal data from ministries and police have been released online
  15. Two zero-day vulnerabilities expose millions of access points
  16. #ThreatFabric discovers #NeoBot Android Banking Trojan (#Exobot spawn) in #GooglePlay with 10,000+ installs Please contact us if your interested in

SOUTH AMERICA

  1. Spam and phishing in Q3 2018

EUROPE

  1. US DoD’s first malware submissions to Google-bought VirusTotal is Russia-linked LoJack
  2. Election Day: Five Security Experts Conclude that Georgia’s Online Voter Database is Easily Hackable
  3. Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges
  4. UK Regulator Calls for Tougher Rules on Personal Data Use
  5. Compromising vital infrastructure: transport and logistics
  6. Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
  7. Side-Channel Vulnerability PortSmash Steals Keys
  8. Magecart infiltrates UK online retailer Kitronik payment system
  9. Spam and phishing in Q3 2018
  10. Worst malware and threat actors of 2018 so far
  11. Wealthy Moscow residents' data leaked in Akado Telecom incident
  12. Shellbot Botnet Targets IoT devices and Linux servers
  13. Nation states sponsoring increasingly sophisticated cyber attacks
  14. New attack by Anonymous Italy: personal data from ministries and police have been released online

AFRICA

  1. Anonymous Hackers Syndicate Defaces Huge Number of Websites of Gabon Government

Sector brief for 2018-11-06

HEALTHCARE

  1. Ransomware Keeps Ringing in Profits for Cybercrime Rings

TRANSPORT

  1. Compromising vital infrastructure: transport and logistics
  2. Zero-Day Vulnerability Explained
  3. Nation states sponsoring increasingly sophisticated cyber attacks

BANKING & FINANCE

  1. HSBC Data Breach Hits Online Banking Customers
  2. HSBC Bank Confirms US Data Breach
  3. HSBC Bank USA Warns Customers of Data Breach
  4. HSBC Bank Data Breach Exposed Account Numbers, Balances, and More
  5. Zero-Day Vulnerability Explained
  6. Supply-chain attack on cryptocurrency exchange
  7. Supply-chain attack on cryptocurrency exchange
  8. HSBC Bank Notifies Customers of Data Breach
  9. Business email compromise made easy for cybercriminals as 12.5 million company email inboxes and 33,000 finance department credentials openly accessible
  10. Spam and phishing in Q3 2018
  11. Worst malware and threat actors of 2018 so far
  12. Nation states sponsoring increasingly sophisticated cyber attacks
  13. #ThreatFabric discovers #NeoBot Android Banking Trojan (#Exobot spawn) in #GooglePlay with 10,000+ installs Please contact us if your interested in

INFORMATION & TELECOMMUNICATION

  1. Compromising vital infrastructure: transport and logistics
  2. Zero-Day Vulnerability Explained
  3. It’s thought that the private message data was obtained via a malicious browser extension that scraped the data from users’
  4. Pocket iNet ISP Exposed 73GB of Corporate Data Online
  5. Why are fake Elon Musk bitcoin scams running rife on Twitter right now?
  6. Intel responds to the Epyc server threat from AMD
  7. Fake Telegram Apps Used to Spy on Iranian Users
  8. Business email compromise made easy for cybercriminals as 12.5 million company email inboxes and 33,000 finance department credentials openly accessible
  9. Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.
  10. Spam and phishing in Q3 2018
  11. Private messages from 81,000 hacked Facebook accounts were for sale online. The information was obtained through malicious browser extensions, such as
  12. Our crucible SoC OTP fusing tool now support graphical mapping of fusemap definition files. This, other than being very pretty, facilitates
  13. Shellbot Botnet Targets IoT devices and Linux servers
  14. Vulnerability in Icecast can collapse online radio stations
  15. #ThreatFabric discovers #NeoBot Android Banking Trojan (#Exobot spawn) in #GooglePlay with 10,000+ installs Please contact us if your interested in
  16. Just half of Fortune 500 companies have installed DMARC, a tool that guards against email phishing scams, according to new

FOOD

Nil

WATER

  1. Spam and phishing in Q3 2018

ENERGY

  1. High risk vulnerability discovered in Sauter CASE Suite building automation software
  2. Multiple Cisco Vulnerabilities Threat Alert
  3. Two zero-day vulnerabilities expose millions of access points

GOVERNMENT & PUBLIC SERVICE

  1. US DoD’s first malware submissions to Google-bought VirusTotal is Russia-linked LoJack
  2. Election Day: Five Security Experts Conclude that Georgia’s Online Voter Database is Easily Hackable
  3. UK Regulator Calls for Tougher Rules on Personal Data Use
  4. Compromising vital infrastructure: transport and logistics
  5. Fake Telegram Apps Used to Spy on Iranian Users
  6. Tech companies offered free products to help secure the election. Now what?
  7. A Blockchain Solution for Data Provenance Using Hyperledger Fabric
  8. Shellbot Botnet Targets IoT devices and Linux servers
  9. U.S. Air Force Announces Third Bug Bounty Program
  10. Nation states sponsoring increasingly sophisticated cyber attacks
  11. Anonymous Hackers Syndicate Defaces Huge Number of Websites of Gabon Government
  12. New attack by Anonymous Italy: personal data from ministries and police have been released online

Daily brief for 2018-11-06

ASIA

  1. Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges
  2. Fake Telegram Apps Used to Spy on Iranian Users
  3. Spam and phishing in Q3 2018
  4. Worst malware and threat actors of 2018 so far
  5. Shellbot Botnet Targets IoT devices and Linux servers
  6. Nation states sponsoring increasingly sophisticated cyber attacks
  7. New attack by Anonymous Italy: personal data from ministries and police have been released online
  8. Multiple Cisco Vulnerabilities Threat Alert

WORLD

  1. US DoD’s first malware submissions to Google-bought VirusTotal is Russia-linked LoJack
  2. Hack the Air Force 3.0 Bug Bounty Announced by USAF
  3. ThreatList: Despite Fraud Awareness, Password Reuse Persists for Half of U.S. Consumers
  4. Election Day: Five Security Experts Conclude that Georgia’s Online Voter Database is Easily Hackable
  5. Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges
  6. HSBC Bank Confirms US Data Breach
  7. UK Regulator Calls for Tougher Rules on Personal Data Use
  8. Compromising vital infrastructure: transport and logistics
  9. HSBC Bank USA Warns Customers of Data Breach
  10. Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
  11. Side-Channel Vulnerability PortSmash Steals Keys
  12. Pocket iNet ISP Exposed 73GB of Corporate Data Online
  13. Tech companies offered free products to help secure the election. Now what?
  14. Magecart infiltrates UK online retailer Kitronik payment system
  15. Spam and phishing in Q3 2018
  16. Worst malware and threat actors of 2018 so far
  17. Wealthy Moscow residents' data leaked in Akado Telecom incident
  18. We're hosting a lunch and learn event geared towards endpoint #security and #ransomware, with technology partner @SentinelOne. Please join us on
  19. Shellbot Botnet Targets IoT devices and Linux servers
  20. U.S. Air Force Announces Third Bug Bounty Program
  21. Nation states sponsoring increasingly sophisticated cyber attacks
  22. Anonymous Hackers Syndicate Defaces Huge Number of Websites of Gabon Government
  23. New attack by Anonymous Italy: personal data from ministries and police have been released online
  24. Two zero-day vulnerabilities expose millions of access points
  25. #ThreatFabric discovers #NeoBot Android Banking Trojan (#Exobot spawn) in #GooglePlay with 10,000+ installs Please contact us if your interested in

ATTACKS

  1. HSBC Data Breach Hits Online Banking Customers
  2. My Health Record data misuse penalties raised
  3. Holiday Suppliers Already Under Assault by Fileless Malware Campaign
  4. ThreatList: Despite Fraud Awareness, Password Reuse Persists for Half of U.S. Consumers
  5. Election Day: Five Security Experts Conclude that Georgia’s Online Voter Database is Easily Hackable
  6. HSBC Bank Confirms US Data Breach
  7. UK Regulator Calls for Tougher Rules on Personal Data Use
  8. HSBC Bank USA Warns Customers of Data Breach
  9. HSBC Bank Data Breach Exposed Account Numbers, Balances, and More
  10. Samsung, Crucial’s Flawed Storage Drive Encryption Leaves Data Exposed
  11. Why business can't keep the public safe from data breaches
  12. It’s thought that the private message data was obtained via a malicious browser extension that scraped the data from users’
  13. Alert: Emotet is Back with Major Spam Campaign, Email Exfiltration Module
  14. Zombie Phish
  15. Azorult Malware Spread by New Ramnit Campaign
  16. Login VSI announces Release 3 of Login PI for proactive monitoring
  17. Pocket iNet ISP Exposed 73GB of Corporate Data Online
  18. HSBC Bank Notifies Customers of Data Breach
  19. Business email compromise made easy for cybercriminals as 12.5 million company email inboxes and 33,000 finance department credentials openly accessible
  20. Spam and phishing in Q3 2018
  21. Wealthy Moscow residents' data leaked in Akado Telecom incident
  22. GPU side channel attacks can enable spying on web activity, password stealing
  23. Our crucible SoC OTP fusing tool now support graphical mapping of fusemap definition files. This, other than being very pretty, facilitates
  24. Social Media Brand Impersonators Go #Phishing: 3 Emerging Tactics from ZeroFOX Research
  25. Gift Card Phishing Scam Using Email Addresses of Bosses’ is Latest Trend Adopted by Scammers
  26. New attack by Anonymous Italy: personal data from ministries and police have been released online
  27. Samsung & Crucial Storage Device Vulnerability Allow Attackers to Break the Password & Access the Entire Device Data
  28. Just half of Fortune 500 companies have installed DMARC, a tool that guards against email phishing scams, according to new

THREATS

  1. US DoD’s first malware submissions to Google-bought VirusTotal is Russia-linked LoJack
  2. Apache Struts Vulnerability Would Allow System Takeover
  3. Hack the Air Force 3.0 Bug Bounty Announced by USAF
  4. Android November update fixes flaws galore
  5. Holiday Suppliers Already Under Assault by Fileless Malware Campaign
  6. Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges
  7. Hackers Breach StatCounter To Hijack Bitcoin Transactions
  8. StatCounter Hacked to Inject Malicious Script in gate.io Cryptocurrency Exchange
  9. VMware Unveils New Blockchain Service
  10. Hackers breach StatCounter to hijack Bitcoin transactions on Gate.io exchange
  11. Zero-Day Vulnerability Explained
  12. WordPress Design Flaw + WooCommerce Vulnerability Leads to Site Takeover
  13. Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
  14. It’s thought that the private message data was obtained via a malicious browser extension that scraped the data from users’
  15. Backdoors Installed via macOS Cryptocurrency App
  16. Malware Execution via Microsoft Word Embedded Video
  17. Azorult Malware Spread by New Ramnit Campaign
  18. Supply-chain attack on cryptocurrency exchange
  19. Supply-chain attack on cryptocurrency exchange
  20. Side-Channel Vulnerability PortSmash Steals Keys
  21. Apache Struts Warns Users of Two-Year-Old Vulnerability
  22. Why are fake Elon Musk bitcoin scams running rife on Twitter right now?
  23. Apache Struts Warns Users of Two-Year-Old Vulnerability
  24. Apache Struts 2.3.x vulnerable to two year old RCE flaw
  25. IBM Watson will be used by NIST to assign CVSS scores to vulnerabilities
  26. Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.
  27. Hidden Costs of IoT Vulnerabilities
  28. Evernote for Windows patch resolves stored XSS vulnerability
  29. Ransomware Keeps Ringing in Profits for Cybercrime Rings
  30. How IAM is Evolving in the Blockchain Era
  31. A Blockchain Solution for Data Provenance Using Hyperledger Fabric
  32. Private messages from 81,000 hacked Facebook accounts were for sale online. The information was obtained through malicious browser extensions, such as
  33. New ransomware spotted using DiskCryptor
  34. Exploit Developer Discovers Zero-Day Microsoft Edge Vulnerability Triggering RCE Attacks
  35. How testing perspectives helps find application security flaws
  36. Worst malware and threat actors of 2018 so far
  37. We're hosting a lunch and learn event geared towards endpoint #security and #ransomware, with technology partner @SentinelOne. Please join us on
  38. PortSmash Side-Channel Vulnerability – Another Threat For Intel CPUs
  39. U.S. Air Force Announces Third Bug Bounty Program
  40. CVE-2018-11759: Apache mod_jk Access Control Bypass Vulnerability
  41. High risk vulnerability discovered in Sauter CASE Suite building automation software
  42. Apache Struts Team Urges Users for Library Update to Plug Years-Old Bugs
  43. Samsung & Crucial Storage Device Vulnerability Allow Attackers to Break the Password & Access the Entire Device Data
  44. Flaws in Popular Self-Encrypting SSDs Let Attackers Decrypt Data
  45. Apple Patches Critical iOS, macOS and watchOS Flaws
  46. Watch Out for the “Programmer Who Cracked Your Email” Bitcoin Scam
  47. Multiple Cisco Vulnerabilities Threat Alert
  48. Vulnerability in Icecast can collapse online radio stations
  49. Two zero-day vulnerabilities expose millions of access points
  50. Gitlab v11.4.5 release: fix bugs
  51. #ThreatFabric discovers #NeoBot Android Banking Trojan (#Exobot spawn) in #GooglePlay with 10,000+ installs Please contact us if your interested in
  52. Symantec acquires Appthority to enhance protection from mobile application vulnerabilities

CRIME

  1. ThreatList: Despite Fraud Awareness, Password Reuse Persists for Half of U.S. Consumers
  2. Hackers Breach StatCounter To Hijack Bitcoin Transactions
  3. Hackers breach StatCounter to hijack Bitcoin transactions on Gate.io exchange
  4. Zero-Day Vulnerability Explained
  5. Tech companies offered free products to help secure the election. Now what?
  6. Business email compromise made easy for cybercriminals as 12.5 million company email inboxes and 33,000 finance department credentials openly accessible
  7. Magecart infiltrates UK online retailer Kitronik payment system
  8. Ransomware Keeps Ringing in Profits for Cybercrime Rings
  9. Spam and phishing in Q3 2018
  10. A Blockchain Solution for Data Provenance Using Hyperledger Fabric
  11. Nation states sponsoring increasingly sophisticated cyber attacks
  12. Gift Card Phishing Scam Using Email Addresses of Bosses’ is Latest Trend Adopted by Scammers
  13. Watch Out for the “Programmer Who Cracked Your Email” Bitcoin Scam

POLITICS

  1. Election Day: Five Security Experts Conclude that Georgia’s Online Voter Database is Easily Hackable
  2. Compromising vital infrastructure: transport and logistics
  3. Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain
  4. Pocket iNet ISP Exposed 73GB of Corporate Data Online
  5. Fake Telegram Apps Used to Spy on Iranian Users
  6. Tech companies offered free products to help secure the election. Now what?
  7. Spam and phishing in Q3 2018
  8. GPU side channel attacks can enable spying on web activity, password stealing
  9. Nation states sponsoring increasingly sophisticated cyber attacks
  10. New attack by Anonymous Italy: personal data from ministries and police have been released online