TRANSNATIONAL / UNKNOWN
- IT threat evolution Q3 2018. Statistics
CHINA
Nil
INDIA
Nil
NORTH KOREA
- IT threat evolution Q3 2018
- Researchers Uncover How Lazarus Hacking Group Stole Millions of Dollars From ATMs
PAKISTAN
Nil
VIETNAM
Nil
IRAN
Nil
IRAQ
Nil
LEBANON
Nil
PALESTINE
Nil
SAUDI ARABIA
Nil
SYRIA
Nil
TURKEY
Nil
UNITED ARAB EMIRATES
Nil
YEMEN
Nil
RUSSIA
- France seeks Global Talks on Cyberspace security and a “code of good conduct”
SERBIA
Nil
UKRAINE
Nil
DATA BREACH & DATA LOSS
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- StatCounter Compromise
- Emotet Campaign Ramps Up with Mass Email Harvesting Module
- 2018 On Track to Be One of the Worst Ever for Data Breaches
- U.S. Chip Cards Are Being Compromised in the Millions
- Third-party data breach exposes info of Alabama hospital job applicants
- Small number of HSBC customer accounts compromised in data breach.
Often hackers will make use of user names and passwords compromised
- Popular Data Storage Devices Compromised Due to Flawed Security
- U.S. Chip Cards Are Being Compromised in the Millions:
- What is behind the growing trend of business email compromise attacks? Learn more from expert Michael Cobb of @thehairyITdog.
- The History of Data Breaches
- Cisco Inadvertently Leaked In-House Dirty COW Exploit Code In Its Software
- Emotet Campaign Ramps Up with Mass Email Harvesting Module
- Reported breaches in the first 9 months of 2018 exposed 3.6 billion records
- ADHA privacy boss reportedly quits as My Health Record faces first big test
DENIAL-OF-SERVICE
Nil
MALVERTISING
Nil
PHISHING
- Unable to remember his password, man sent letter bomb to Bitcoin exchange
- Avast Improves Phishing Detection | Avast
- Phishing Training is a Tool, Not a Solution
WEB DEFACEMENT
Nil
BOTNET
- Hacking the hackers – IOT botnet author adds his own backdoor on top of a ZTE router backdoor
- Botnet pwns 100,000 routers using ancient security flaw
RANSOMWARE
- #SamSam #ransomware targeted 67 organizations in 2018, according to @symantec research. By @MaddieBacon11
- Ransomware Assault Strikes Toronto Company, which Sells Data Belonging to Ontario Residents
- Unearthing Ransomware Characteristics Using Classification Taxonomy
CRYPTOMINING & CRYPTOCURRENCIES
- How CIOs can manage blockchain security: 4 tips
- Unable to remember his password, man sent letter bomb to Bitcoin exchange
- A new malware that targets #cryptocurrency investors through #MacOS and chat platforms was recently discovered. Learn how this #malware works
- Cryptomining malware using Windows Installer to remain hidden
- Chinese Head Fired After Cryptomining at School
- Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks
MALWARE
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- Hackers Abuse Critical Bug in Microsoft Office Online Video Feature To Deliver Malware
- Hacking the hackers – IOT botnet author adds his own backdoor on top of a ZTE router backdoor
- Malware-Laced App Lurked on Google Play For a Year
- Malware of the 90s: Remembering the Michelangelo and Melissa viruses
- A new malware that targets #cryptocurrency investors through #MacOS and chat platforms was recently discovered. Learn how this #malware works
- Hide and Script: Inserted Malicious URLs within Office Documents’ Embedded Videos
- Google’s data charts path to avoiding malware on Android
- U.S. Cyber Command #malware samples will be shared to #VirusTotal by the Cyber National Mission Force and one expert said
- Cryptomining malware using Windows Installer to remain hidden
- An #Android app booby-trapped with #malware was recently taken down from Google Play — after being available for download for
- How does new MacOS malware target users through chat?
- How does your enterprise ensure a secure #ApplicationSecurityTesting process?
- Happy #Monday, #CyberSecurity folks! Catch up on the #blog, and discover how fileless #malware is changing how organizations treat
- Overt Command and Control is now live! Check out @william_knows & @nmonkee's talk at this year's #BlueHatv18 exploring the reality
EXPLOIT
- How to Perform Manual SQL Injection With Error Based String Method
- Cisco Inadvertently Leaked In-House Dirty COW Exploit Code In Its Software
- Hackers Exploit Flaw in GDPR Compliance Plugin for WordPress
VULNERABILITY
- Hackers Abuse Critical Bug in Microsoft Office Online Video Feature To Deliver Malware
- DJI Drone Web App Security Flaw Could Let Attackers Take Over Drones
- CVE-2018-6981, CVE-2018-6982: uninitialized stack memory usage vulnerabilities on VMware ESXi, Workstation, and Fusion
- Flaw in WordPress plugin allowed unauthorized admin access, backdoors
- Steam Bug Allowed Unlimited Free Downloads
- Steam bug exposes license keys for every game available on platform
- Botnet pwns 100,000 routers using ancient security flaw
- Used Data Storage Devices Have Security Flaws
- Patched-up Adobe ColdFusion vulnerability exploited by hackers
- A critical flaw in GDPR compliance plugin for WordPress exploited in the wild
- New Acunetix Build Adds Detection for CSP, SRI, Node.js, and Ghostscript RCE Vulnerabilities
- Cisco ASA Security Product Denial-of-Service Vulnerability (CVE-2018-15454) Threat Alert
- Norway’s IT industry must tackle security vulnerabilities
- In this week’s ShadowTalk, the team debates the benefits/drawbacks of bug bounty programs, how you should consider operational value when
- Hackers Exploit Flaw in GDPR Compliance Plugin for WordPress
- Multiple Vulnerabilities Discovered In Roche Handheld Medical Devices
- DOD file sharing tool disabled due to vulnerability
ASIA
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- France seeks Global Talks on Cyberspace security and a “code of good conduct”
- Patched-up Adobe ColdFusion vulnerability exploited by hackers
- Chinese Head Fired After Cryptomining at School
- IT threat evolution Q3 2018. Statistics
- IT threat evolution Q3 2018
- Cisco ASA Security Product Denial-of-Service Vulnerability (CVE-2018-15454) Threat Alert
- Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks
WORLD
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- U.S. Chip Cards Are Being Compromised in the Millions
- Malware of the 90s: Remembering the Michelangelo and Melissa viruses
- France seeks Global Talks on Cyberspace security and a “code of good conduct”
- Popular Data Storage Devices Compromised Due to Flawed Security
- Used Data Storage Devices Have Security Flaws
- U.S. Chip Cards Are Being Compromised in the Millions:
- U.S. Cyber Command #malware samples will be shared to #VirusTotal by the Cyber National Mission Force and one expert said
- Chinese Head Fired After Cryptomining at School
- IT threat evolution Q3 2018. Statistics
- IT threat evolution Q3 2018
- Norway’s IT industry must tackle security vulnerabilities
- In this week’s ShadowTalk, the team debates the benefits/drawbacks of bug bounty programs, how you should consider operational value when
- Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks
ATTACKS
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- StatCounter Compromise
- Emotet Campaign Ramps Up with Mass Email Harvesting Module
- 2018 On Track to Be One of the Worst Ever for Data Breaches
- U.S. Chip Cards Are Being Compromised in the Millions
- Unable to remember his password, man sent letter bomb to Bitcoin exchange
- Third-party data breach exposes info of Alabama hospital job applicants
- Small number of HSBC customer accounts compromised in data breach.
Often hackers will make use of user names and passwords compromised
- Avast Improves Phishing Detection | Avast
- Popular Data Storage Devices Compromised Due to Flawed Security
- Phishing Training is a Tool, Not a Solution
- U.S. Chip Cards Are Being Compromised in the Millions:
- What is behind the growing trend of business email compromise attacks? Learn more from expert Michael Cobb of @thehairyITdog.
- The History of Data Breaches
- Cisco Inadvertently Leaked In-House Dirty COW Exploit Code In Its Software
- Emotet Campaign Ramps Up with Mass Email Harvesting Module
- Reported breaches in the first 9 months of 2018 exposed 3.6 billion records
- ADHA privacy boss reportedly quits as My Health Record faces first big test
THREATS
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- Hackers Abuse Critical Bug in Microsoft Office Online Video Feature To Deliver Malware
- Hacking the hackers – IOT botnet author adds his own backdoor on top of a ZTE router backdoor
- How CIOs can manage blockchain security: 4 tips
- Malware-Laced App Lurked on Google Play For a Year
- DJI Drone Web App Security Flaw Could Let Attackers Take Over Drones
- CVE-2018-6981, CVE-2018-6982: uninitialized stack memory usage vulnerabilities on VMware ESXi, Workstation, and Fusion
- Unable to remember his password, man sent letter bomb to Bitcoin exchange
- Flaw in WordPress plugin allowed unauthorized admin access, backdoors
- Steam Bug Allowed Unlimited Free Downloads
- Malware of the 90s: Remembering the Michelangelo and Melissa viruses
- Steam bug exposes license keys for every game available on platform
- A new malware that targets #cryptocurrency investors through #MacOS and chat platforms was recently discovered. Learn how this #malware works
- Hide and Script: Inserted Malicious URLs within Office Documents’ Embedded Videos
- Google’s data charts path to avoiding malware on Android
- Botnet pwns 100,000 routers using ancient security flaw
- Used Data Storage Devices Have Security Flaws
- Patched-up Adobe ColdFusion vulnerability exploited by hackers
- U.S. Cyber Command #malware samples will be shared to #VirusTotal by the Cyber National Mission Force and one expert said
- Cryptomining malware using Windows Installer to remain hidden
- #SamSam #ransomware targeted 67 organizations in 2018, according to @symantec research. By @MaddieBacon11
- Chinese Head Fired After Cryptomining at School
- A critical flaw in GDPR compliance plugin for WordPress exploited in the wild
- An #Android app booby-trapped with #malware was recently taken down from Google Play — after being available for download for
- New Acunetix Build Adds Detection for CSP, SRI, Node.js, and Ghostscript RCE Vulnerabilities
- Cisco ASA Security Product Denial-of-Service Vulnerability (CVE-2018-15454) Threat Alert
- Norway’s IT industry must tackle security vulnerabilities
- In this week’s ShadowTalk, the team debates the benefits/drawbacks of bug bounty programs, how you should consider operational value when
- How does new MacOS malware target users through chat?
- Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks
- How does your enterprise ensure a secure #ApplicationSecurityTesting process?
- Happy #Monday, #CyberSecurity folks! Catch up on the #blog, and discover how fileless #malware is changing how organizations treat
- Hackers Exploit Flaw in GDPR Compliance Plugin for WordPress
- Ransomware Assault Strikes Toronto Company, which Sells Data Belonging to Ontario Residents
- Unearthing Ransomware Characteristics Using Classification Taxonomy
- Overt Command and Control is now live! Check out @william_knows & @nmonkee's talk at this year's #BlueHatv18 exploring the reality
- Multiple Vulnerabilities Discovered In Roche Handheld Medical Devices
- DOD file sharing tool disabled due to vulnerability
CRIME
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- StatCounter Compromise
- Flaw in WordPress plugin allowed unauthorized admin access, backdoors
- Third-party data breach exposes info of Alabama hospital job applicants
- What is behind the growing trend of business email compromise attacks? Learn more from expert Michael Cobb of @thehairyITdog.
- Chinese Head Fired After Cryptomining at School
- A critical flaw in GDPR compliance plugin for WordPress exploited in the wild
- IT threat evolution Q3 2018. Statistics
- IT threat evolution Q3 2018
- Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks
POLITICS
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- France seeks Global Talks on Cyberspace security and a “code of good conduct”
- IT threat evolution Q3 2018
- Ransomware Assault Strikes Toronto Company, which Sells Data Belonging to Ontario Residents