DATA BREACH & DATA LOSS
- Russian APT comes back to life with new US spear-phishing campaign
 
- EgressBuster  – Compromise Victim via Command & Control using Firewall
 
- Voxox Database Containing Around 26 Million SMS Entries Exposed 2FA, Reset Codes
 
- China's Hack Attacks: An Economic Espionage Campaign
 
- New HealthEquity Data Breach Exposes PII/PHI of Almost 21,000 Customers
 
- AWS Adds New Feature for Preventing Data Leaks
 
- Details of 170,000 Pakistani debit cards leaked on dark web
 
- AWS rolls out new security feature to prevent accidental S3 data leaks
 
- Google BGP route leak was accidental, not hijacking
 
- After early speculation of #malicious intent, experts said an accidental misconfiguration caused the BGP route leak that sent traffic destined
 
- After 2015 OPM data breach, agency failed to update security
 
- 26M Texts Exposed in Poorly Secured Vovox Database
 
- Data Breaches on the Rise in Financial Services
 
- SUNY Upstate Hospital announced a former employee inappropriately accessed more than 1,200 patient records.
 
- 2FA codes are great for security, except when 26M of them are leaked
 
- Business email compromise attacks cost over $676 million in 2017, according to the @FBI's Internet #CrimeReport. Learn how to recognize
 
- #GroupIB #ThreatIntelligence detected large set of compromised payment cards details that was put on sale on underground card shop on
 
- French Company Data Breach Causes Sensitive Information Stolen to the Hackers
 
- Text message database reportedly leaked password resets
 
- New variants of Meltdown and Spectre cause information leaks
 
DENIAL-OF-SERVICE
Nil
MALVERTISING
Nil
PHISHING
- Russian APT comes back to life with new US spear-phishing campaign
 
- Gmail Glitch Offers Stealthy Trick for Phishing Attacks
 
- Russian Banks Hit By Major Phishing Attacks
 
- How to Stay One Step Ahead of Phishing Websites — Literally
 
- Emotet has some customized phish for you
 
- Russian banks hit by major phishing attacks from two hacker groups
 
- Word of the Day: social engineering
 
- Create and enforce a password policy across the enterprise
 
 
- Massive Rise is Seen in Phishing Attacks
 
- Warning Issued by Emirates NBD over VAT Phishing Email Targeting its Customers
 
- Text message database reportedly leaked password resets
 
- Consider a reputable password manager to store your information, and don’t forget to use a strong password to secure the
 
WEB DEFACEMENT
Nil
BOTNET
- phpMyAdmin Servers Targeted By New Variant of Muhstik Botnet
 
- NTT Security Adds Botnet Infrastructure Detection to Managed Security Services
 
- Mylobot Botnet Now Exfiltrates Data Using Second Stage Khalesi Trojan
 
RANSOMWARE
- Stealthy DarkGate Cryptocurrency Mining and Ransomware Evades AV Detection
 
- SamSam and GandCrab Illustrate Evolution of Ransomware
 
- Hacking group returns, switches attacks from ransomware to trojan malware
 
- .@TalosSecurity recently created a #decryptor that helps files affected by the #ransomware #Thanatos -- typically known to not decrypt files
 
- Malaysia’s Largest Media Company Allegedly Suffers Ransomware Attack
 
- Hacking group returns, switches attacks from ransomware to trojan malware
 
- Hackers infect Malaysia’s largest media company with ransomware, then demand $6.45 million
 
- How does Thanatos ransomware decryptor tool restore data?
 
- SentinelOne Detects KeyPass Ransomware!
KeyPass is a new ransomware threat that has hit at least 20 countries and appears to be
 
CRYPTOMINING & CRYPTOCURRENCIES
- Cryptocurrency Trader Gets 15 Months of Jail for Stealing Bitcoin, Litecoin
 
- Stealthy DarkGate Cryptocurrency Mining and Ransomware Evades AV Detection
 
- This Week in Security News: Holiday Cybercriminals & Cryptomining Malware
 
- Most antivirus programs fail to detect this cryptocurrency-stealing malware
 
- Hackers stole millions from ATMs across the world. @verge shares details here.
 
- Four More Malicious Cryptocurrency Apps on Google Play
 
- Google, US and Israeli politician Twitter accounts hijacked to promote 'Elon Musk' Bitcoin scam
 
- 5 Top Techniques for Testing Blockchain Apps
 
- Digital identity, the blockchain and the GDPR: A round peg in a square hole?
 
- New WebCobra Cryptojacking Malware Uses Platform Specific Miners
 
MALWARE
- EgressBuster  – Compromise Victim via Command & Control using Firewall
 
- Reappearance of Magecart Malware to Infect Virtual Stores
 
- Using Microsoft Powerpoint as Malware Dropper
 
- Hacking group returns, switches attacks from ransomware to trojan malware
 
- This Week in Security News: Holiday Cybercriminals & Cryptomining Malware
 
- Simple Call Recorder Android Malware
 
- After early speculation of #malicious intent, experts said an accidental misconfiguration caused the BGP route leak that sent traffic destined
 
- Cybaze ZLab- Yoroi team spotted a new variant of the APT28 Lojax rootkit
 
- Researchers at @okta found a bypass that allows #ThreatActors to pose files as legitimate @Apple files despite being #malware and
 
- Most antivirus programs fail to detect this cryptocurrency-stealing malware
 
- APT group TA505 testing out new modular RAT
 
- tRat is a new modular RAT used by the threat actor TA505
 
- Hacking group returns, switches attacks from ransomware to trojan malware
 
- Malicious code hidden in advert images cost ad networks $1.13bn this year
 
- Four More Malicious Cryptocurrency Apps on Google Play
 
- Vaporworms: New breed of self-propagating fileless malware to emerge in 2019
 
- Dridex/Locky Operators Unleash New Malware in Recent Attack
 
- New WebCobra Cryptojacking Malware Uses Platform Specific Miners
 
- AMD launches new mid-range graphics card RX 590 based on 12nm process
 
- Mylobot Botnet Now Exfiltrates Data Using Second Stage Khalesi Trojan
 
EXPLOIT
Nil
VULNERABILITY
- Up to three million kids' GPS watches can be tracked by parents... and any miscreant: Flaws spill pick-and-choose catalog for perverts
 
- Critical WordPress Flaw Grants Admin Access to Any Registered Site User
 
- Adobe Patch Tuesday November Fixed Multiple Information Disclosure Vulnerabilities
 
- Lock-Screen Bypass Bug Quietly Patched in Handsets
 
- Scanning Akamai's Edge Servers for Vulnerabilities, Correctly
 
- ATM Tests Reveal Surprising Security Flaws
 
- SUNY Upstate Hospital announced a former employee inappropriately accessed more than 1,200 patient records.
 
- D-Link router vulnerability detailed
 
- Apache Struts2 Commons FileUpload Deserialization Remote Code Execution Vulnerability (CVE-2016-100031)Threat Alert
 
- Amid calls for a Windows bug status dashboard, Microsoft belatedly agrees to build one
 
- Kaspersky Announces the Details of Windows 7 Zero-Day Vulnerability
 
 
 
 
ASIA
- InfoWars: Magecart Infection Points to 'Industrial Sabotage'
 
- China's Hack Attacks: An Economic Espionage Campaign
 
- Operation Shaheen – Pakistan Air Force members targeted by nation-state attackers
 
- Details of 170,000 Pakistani debit cards leaked on dark web
 
- Cyber News Rundown: Infowars Hacked by Card Skimmers
 
- This Week in Security News: Holiday Cybercriminals & Cryptomining Malware
 
- How to Stay One Step Ahead of Phishing Websites — Literally
 
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia
 
- After early speculation of #malicious intent, experts said an accidental misconfiguration caused the BGP route leak that sent traffic destined
 
- Malaysia’s Largest Media Company Allegedly Suffers Ransomware Attack
 
- Hackers infect Malaysia’s largest media company with ransomware, then demand $6.45 million
 
- #GroupIB #ThreatIntelligence detected large set of compromised payment cards details that was put on sale on underground card shop on
 
- Google, US and Israeli politician Twitter accounts hijacked to promote 'Elon Musk' Bitcoin scam
 
- Two hacker groups attacked Russian banks posing as the Central Bank of Russia
 
- Apache Struts2 Commons FileUpload Deserialization Remote Code Execution Vulnerability (CVE-2016-100031)Threat Alert
 
- Mylobot Botnet Now Exfiltrates Data Using Second Stage Khalesi Trojan
 
- Looking Back at LogRhythm Labs' 2018 Predictions for Security - How Did We Do?
 
OCEANIA
Nil
NORTH AMERICA
- Russian APT comes back to life with new US spear-phishing campaign
 
- Cryptocurrency Trader Gets 15 Months of Jail for Stealing Bitcoin, Litecoin
 
- Using Microsoft Powerpoint as Malware Dropper
 
- Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery
 
- This Week in Security News: Holiday Cybercriminals & Cryptomining Malware
 
- Scanning Akamai's Edge Servers for Vulnerabilities, Correctly
 
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia
 
- Hackers infect Malaysia’s largest media company with ransomware, then demand $6.45 million
 
- Google, US and Israeli politician Twitter accounts hijacked to promote 'Elon Musk' Bitcoin scam
 
- Two hacker groups attacked Russian banks posing as the Central Bank of Russia
 
- NTT Security Adds Botnet Infrastructure Detection to Managed Security Services
 
- Apache Struts2 Commons FileUpload Deserialization Remote Code Execution Vulnerability (CVE-2016-100031)Threat Alert
 
- 5 Top Techniques for Testing Blockchain Apps
 
- New variants of Meltdown and Spectre cause information leaks
 
- New WebCobra Cryptojacking Malware Uses Platform Specific Miners
 
- AMD launches new mid-range graphics card RX 590 based on 12nm process
 
- Looking Back at LogRhythm Labs' 2018 Predictions for Security - How Did We Do?
 
SOUTH AMERICA
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia
 
- New WebCobra Cryptojacking Malware Uses Platform Specific Miners
 
- Mylobot Botnet Now Exfiltrates Data Using Second Stage Khalesi Trojan
 
EUROPE
- Russian APT comes back to life with new US spear-phishing campaign
 
- Stealthy DarkGate Cryptocurrency Mining and Ransomware Evades AV Detection
 
- Using Microsoft Powerpoint as Malware Dropper
 
- Operation Shaheen – Pakistan Air Force members targeted by nation-state attackers
 
- Cyber News Rundown: Infowars Hacked by Card Skimmers
 
- Russian Banks Hit By Major Phishing Attacks
 
- This Week in Security News: Holiday Cybercriminals & Cryptomining Malware
 
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia
 
- After early speculation of #malicious intent, experts said an accidental misconfiguration caused the BGP route leak that sent traffic destined
 
- Russian banks hit by major phishing attacks from two hacker groups
 
- Cybaze ZLab- Yoroi team spotted a new variant of the APT28 Lojax rootkit
 
- Two hacker groups attacked Russian banks posing as the Central Bank of Russia
 
 
- French Company Data Breach Causes Sensitive Information Stolen to the Hackers
 
- Magecart become close to a household name with hacks of massive sites like http://Ticketmaster.com , http://Newegg.com  and British Airways.
 
- New WebCobra Cryptojacking Malware Uses Platform Specific Miners
 
- Mylobot Botnet Now Exfiltrates Data Using Second Stage Khalesi Trojan
 
- Looking Back at LogRhythm Labs' 2018 Predictions for Security - How Did We Do?
 
AFRICA
- New WebCobra Cryptojacking Malware Uses Platform Specific Miners
 
 
 
 
HEALTHCARE
- New HealthEquity Data Breach Exposes PII/PHI of Almost 21,000 Customers
 
- SUNY Upstate Hospital announced a former employee inappropriately accessed more than 1,200 patient records.
 
- Apache Struts2 Commons FileUpload Deserialization Remote Code Execution Vulnerability (CVE-2016-100031)Threat Alert
 
TRANSPORT
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia
 
BANKING & FINANCE
- InfoWars: Magecart Infection Points to 'Industrial Sabotage'
 
- Reappearance of Magecart Malware to Infect Virtual Stores
 
- New HealthEquity Data Breach Exposes PII/PHI of Almost 21,000 Customers
 
- Hacking group returns, switches attacks from ransomware to trojan malware
 
- Details of 170,000 Pakistani debit cards leaked on dark web
 
- Cyber News Rundown: Infowars Hacked by Card Skimmers
 
- .@TalosSecurity recently created a #decryptor that helps files affected by the #ransomware #Thanatos -- typically known to not decrypt files
 
- Russian Banks Hit By Major Phishing Attacks
 
- How to Stay One Step Ahead of Phishing Websites — Literally
 
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia
 
- Russian banks hit by major phishing attacks from two hacker groups
 
- ATM Tests Reveal Surprising Security Flaws
 
- tRat is a new modular RAT used by the threat actor TA505
 
- Malaysia’s Largest Media Company Allegedly Suffers Ransomware Attack
 
- Data Breaches on the Rise in Financial Services
 
- Four More Malicious Cryptocurrency Apps on Google Play
 
- Hackers infect Malaysia’s largest media company with ransomware, then demand $6.45 million
 
- #GroupIB #ThreatIntelligence detected large set of compromised payment cards details that was put on sale on underground card shop on
 
- Two hacker groups attacked Russian banks posing as the Central Bank of Russia
 
 
- Apache Struts2 Commons FileUpload Deserialization Remote Code Execution Vulnerability (CVE-2016-100031)Threat Alert
 
- 5 Top Techniques for Testing Blockchain Apps
 
- Warning Issued by Emirates NBD over VAT Phishing Email Targeting its Customers
 
- Looking Back at LogRhythm Labs' 2018 Predictions for Security - How Did We Do?
 
INFORMATION & TELECOMMUNICATION
- InfoWars: Magecart Infection Points to 'Industrial Sabotage'
 
- Gmail Glitch Offers Stealthy Trick for Phishing Attacks
 
- Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery
 
- This Week in Security News: Holiday Cybercriminals & Cryptomining Malware
 
- Cybaze ZLab- Yoroi team spotted a new variant of the APT28 Lojax rootkit
 
- Word of the Day: social engineering
 
- SUNY Upstate Hospital announced a former employee inappropriately accessed more than 1,200 patient records.
 
- 2FA codes are great for security, except when 26M of them are leaked
 
- #GroupIB #ThreatIntelligence detected large set of compromised payment cards details that was put on sale on underground card shop on
 
- Google, US and Israeli politician Twitter accounts hijacked to promote 'Elon Musk' Bitcoin scam
 
- Two hacker groups attacked Russian banks posing as the Central Bank of Russia
 
- Apache Struts2 Commons FileUpload Deserialization Remote Code Execution Vulnerability (CVE-2016-100031)Threat Alert
 
- French Company Data Breach Causes Sensitive Information Stolen to the Hackers
 
- Magecart become close to a household name with hacks of massive sites like http://Ticketmaster.com , http://Newegg.com  and British Airways.
 
- Amid calls for a Windows bug status dashboard, Microsoft belatedly agrees to build one
 
- Looking Back at LogRhythm Labs' 2018 Predictions for Security - How Did We Do?
 
- SentinelOne Detects KeyPass Ransomware!
KeyPass is a new ransomware threat that has hit at least 20 countries and appears to be
 
FOOD
Nil
WATER
Nil
ENERGY
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia
 
- Apache Struts2 Commons FileUpload Deserialization Remote Code Execution Vulnerability (CVE-2016-100031)Threat Alert
 
- French Company Data Breach Causes Sensitive Information Stolen to the Hackers
 
GOVERNMENT & PUBLIC SERVICE
- Using Microsoft Powerpoint as Malware Dropper
 
- Operation Shaheen – Pakistan Air Force members targeted by nation-state attackers
 
- Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery
 
- This Week in Security News: Holiday Cybercriminals & Cryptomining Malware
 
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia
 
- Kaspersky Announces the Details of Windows 7 Zero-Day Vulnerability
 
- Looking Back at LogRhythm Labs' 2018 Predictions for Security - How Did We Do?
 
 
 
 
ASIA
- InfoWars: Magecart Infection Points to 'Industrial Sabotage'
 
- China's Hack Attacks: An Economic Espionage Campaign
 
- Operation Shaheen – Pakistan Air Force members targeted by nation-state attackers
 
- Details of 170,000 Pakistani debit cards leaked on dark web
 
- Cyber News Rundown: Infowars Hacked by Card Skimmers
 
- This Week in Security News: Holiday Cybercriminals & Cryptomining Malware
 
- How to Stay One Step Ahead of Phishing Websites — Literally
 
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia
 
- After early speculation of #malicious intent, experts said an accidental misconfiguration caused the BGP route leak that sent traffic destined
 
- Malaysia’s Largest Media Company Allegedly Suffers Ransomware Attack
 
- Hackers infect Malaysia’s largest media company with ransomware, then demand $6.45 million
 
- #GroupIB #ThreatIntelligence detected large set of compromised payment cards details that was put on sale on underground card shop on
 
- Google, US and Israeli politician Twitter accounts hijacked to promote 'Elon Musk' Bitcoin scam
 
- Two hacker groups attacked Russian banks posing as the Central Bank of Russia
 
- Apache Struts2 Commons FileUpload Deserialization Remote Code Execution Vulnerability (CVE-2016-100031)Threat Alert
 
- Mylobot Botnet Now Exfiltrates Data Using Second Stage Khalesi Trojan
 
- Looking Back at LogRhythm Labs' 2018 Predictions for Security - How Did We Do?
 
WORLD
- Russian APT comes back to life with new US spear-phishing campaign
 
- Cryptocurrency Trader Gets 15 Months of Jail for Stealing Bitcoin, Litecoin
 
- Stealthy DarkGate Cryptocurrency Mining and Ransomware Evades AV Detection
 
- Using Microsoft Powerpoint as Malware Dropper
 
- Operation Shaheen – Pakistan Air Force members targeted by nation-state attackers
 
- Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery
 
- Cyber News Rundown: Infowars Hacked by Card Skimmers
 
- Russian Banks Hit By Major Phishing Attacks
 
- This Week in Security News: Holiday Cybercriminals & Cryptomining Malware
 
- Scanning Akamai's Edge Servers for Vulnerabilities, Correctly
 
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia
 
- After early speculation of #malicious intent, experts said an accidental misconfiguration caused the BGP route leak that sent traffic destined
 
- Russian banks hit by major phishing attacks from two hacker groups
 
- Cybaze ZLab- Yoroi team spotted a new variant of the APT28 Lojax rootkit
 
- Hackers infect Malaysia’s largest media company with ransomware, then demand $6.45 million
 
- Google, US and Israeli politician Twitter accounts hijacked to promote 'Elon Musk' Bitcoin scam
 
- Two hacker groups attacked Russian banks posing as the Central Bank of Russia
 
 
- NTT Security Adds Botnet Infrastructure Detection to Managed Security Services
 
- Apache Struts2 Commons FileUpload Deserialization Remote Code Execution Vulnerability (CVE-2016-100031)Threat Alert
 
- 5 Top Techniques for Testing Blockchain Apps
 
- French Company Data Breach Causes Sensitive Information Stolen to the Hackers
 
- Magecart become close to a household name with hacks of massive sites like http://Ticketmaster.com , http://Newegg.com  and British Airways.
 
- New variants of Meltdown and Spectre cause information leaks
 
- New WebCobra Cryptojacking Malware Uses Platform Specific Miners
 
- AMD launches new mid-range graphics card RX 590 based on 12nm process
 
- Mylobot Botnet Now Exfiltrates Data Using Second Stage Khalesi Trojan
 
- Looking Back at LogRhythm Labs' 2018 Predictions for Security - How Did We Do?
 
ATTACKS
- Russian APT comes back to life with new US spear-phishing campaign
 
- EgressBuster  – Compromise Victim via Command & Control using Firewall
 
- Voxox Database Containing Around 26 Million SMS Entries Exposed 2FA, Reset Codes
 
- China's Hack Attacks: An Economic Espionage Campaign
 
- Gmail Glitch Offers Stealthy Trick for Phishing Attacks
 
- New HealthEquity Data Breach Exposes PII/PHI of Almost 21,000 Customers
 
- AWS Adds New Feature for Preventing Data Leaks
 
- Details of 170,000 Pakistani debit cards leaked on dark web
 
- AWS rolls out new security feature to prevent accidental S3 data leaks
 
- Russian Banks Hit By Major Phishing Attacks
 
- How to Stay One Step Ahead of Phishing Websites — Literally
 
- Emotet has some customized phish for you
 
- Google BGP route leak was accidental, not hijacking
 
- After early speculation of #malicious intent, experts said an accidental misconfiguration caused the BGP route leak that sent traffic destined
 
- Russian banks hit by major phishing attacks from two hacker groups
 
- After 2015 OPM data breach, agency failed to update security
 
- Word of the Day: social engineering
 
- 26M Texts Exposed in Poorly Secured Vovox Database
 
- Create and enforce a password policy across the enterprise
 
- Data Breaches on the Rise in Financial Services
 
- SUNY Upstate Hospital announced a former employee inappropriately accessed more than 1,200 patient records.
 
- 2FA codes are great for security, except when 26M of them are leaked
 
- Business email compromise attacks cost over $676 million in 2017, according to the @FBI's Internet #CrimeReport. Learn how to recognize
 
- #GroupIB #ThreatIntelligence detected large set of compromised payment cards details that was put on sale on underground card shop on
 
 
- Massive Rise is Seen in Phishing Attacks
 
- Warning Issued by Emirates NBD over VAT Phishing Email Targeting its Customers
 
- French Company Data Breach Causes Sensitive Information Stolen to the Hackers
 
- Text message database reportedly leaked password resets
 
- Consider a reputable password manager to store your information, and don’t forget to use a strong password to secure the
 
- New variants of Meltdown and Spectre cause information leaks
 
THREATS
- EgressBuster  – Compromise Victim via Command & Control using Firewall
 
- Cryptocurrency Trader Gets 15 Months of Jail for Stealing Bitcoin, Litecoin
 
- Up to three million kids' GPS watches can be tracked by parents... and any miscreant: Flaws spill pick-and-choose catalog for perverts
 
- Stealthy DarkGate Cryptocurrency Mining and Ransomware Evades AV Detection
 
- Reappearance of Magecart Malware to Infect Virtual Stores
 
- Using Microsoft Powerpoint as Malware Dropper
 
- SamSam and GandCrab Illustrate Evolution of Ransomware
 
- Critical WordPress Flaw Grants Admin Access to Any Registered Site User
 
- Adobe Patch Tuesday November Fixed Multiple Information Disclosure Vulnerabilities
 
- Lock-Screen Bypass Bug Quietly Patched in Handsets
 
- Hacking group returns, switches attacks from ransomware to trojan malware
 
- .@TalosSecurity recently created a #decryptor that helps files affected by the #ransomware #Thanatos -- typically known to not decrypt files
 
- This Week in Security News: Holiday Cybercriminals & Cryptomining Malware
 
- Scanning Akamai's Edge Servers for Vulnerabilities, Correctly
 
- Simple Call Recorder Android Malware
 
- After early speculation of #malicious intent, experts said an accidental misconfiguration caused the BGP route leak that sent traffic destined
 
- ATM Tests Reveal Surprising Security Flaws
 
- Cybaze ZLab- Yoroi team spotted a new variant of the APT28 Lojax rootkit
 
- Researchers at @okta found a bypass that allows #ThreatActors to pose files as legitimate @Apple files despite being #malware and
 
- Most antivirus programs fail to detect this cryptocurrency-stealing malware
 
- APT group TA505 testing out new modular RAT
 
- tRat is a new modular RAT used by the threat actor TA505
 
- Malaysia’s Largest Media Company Allegedly Suffers Ransomware Attack
 
- Hacking group returns, switches attacks from ransomware to trojan malware
 
- Malicious code hidden in advert images cost ad networks $1.13bn this year
 
- Hackers stole millions from ATMs across the world. @verge shares details here.
 
- SUNY Upstate Hospital announced a former employee inappropriately accessed more than 1,200 patient records.
 
- Four More Malicious Cryptocurrency Apps on Google Play
 
- Hackers infect Malaysia’s largest media company with ransomware, then demand $6.45 million
 
- D-Link router vulnerability detailed
 
- Google, US and Israeli politician Twitter accounts hijacked to promote 'Elon Musk' Bitcoin scam
 
- How does Thanatos ransomware decryptor tool restore data?
 
- Vaporworms: New breed of self-propagating fileless malware to emerge in 2019
 
- Apache Struts2 Commons FileUpload Deserialization Remote Code Execution Vulnerability (CVE-2016-100031)Threat Alert
 
- 5 Top Techniques for Testing Blockchain Apps
 
- Digital identity, the blockchain and the GDPR: A round peg in a square hole?
 
- Amid calls for a Windows bug status dashboard, Microsoft belatedly agrees to build one
 
- Dridex/Locky Operators Unleash New Malware in Recent Attack
 
- New WebCobra Cryptojacking Malware Uses Platform Specific Miners
 
- AMD launches new mid-range graphics card RX 590 based on 12nm process
 
- Kaspersky Announces the Details of Windows 7 Zero-Day Vulnerability
 
- Mylobot Botnet Now Exfiltrates Data Using Second Stage Khalesi Trojan
 
- SentinelOne Detects KeyPass Ransomware!
KeyPass is a new ransomware threat that has hit at least 20 countries and appears to be
 
CRIME
- Cryptocurrency Trader Gets 15 Months of Jail for Stealing Bitcoin, Litecoin
 
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia
 
- Cybaze ZLab- Yoroi team spotted a new variant of the APT28 Lojax rootkit
 
- Hackers infect Malaysia’s largest media company with ransomware, then demand $6.45 million
 
- Business email compromise attacks cost over $676 million in 2017, according to the @FBI's Internet #CrimeReport. Learn how to recognize
 
- Google, US and Israeli politician Twitter accounts hijacked to promote 'Elon Musk' Bitcoin scam
 
- Two hacker groups attacked Russian banks posing as the Central Bank of Russia
 
- NTT Security Adds Botnet Infrastructure Detection to Managed Security Services
 
- Warning Issued by Emirates NBD over VAT Phishing Email Targeting its Customers
 
- French Company Data Breach Causes Sensitive Information Stolen to the Hackers
 
- Looking Back at LogRhythm Labs' 2018 Predictions for Security - How Did We Do?
 
POLITICS
- Up to three million kids' GPS watches can be tracked by parents... and any miscreant: Flaws spill pick-and-choose catalog for perverts
 
- InfoWars: Magecart Infection Points to 'Industrial Sabotage'
 
- China's Hack Attacks: An Economic Espionage Campaign
 
- Operation Shaheen – Pakistan Air Force members targeted by nation-state attackers
 
- This Week in Security News: Holiday Cybercriminals & Cryptomining Malware
 
- Group-IB presented latest cybercrime and nation-state hacking trends in Asia