DATA BREACH & DATA LOSS
- Instagram glitch exposed some user passwords
- SMS 2FA database leak drama, MageCart mishaps, Black Friday badware, and more
- According to the @FBI's Internet #CrimeReport, business email compromise attacks cost more than $676 million in 2017. Learn more from
- See how SearchLight identifies when your data is exposed, your brand is abused, or your company is mentioned on the
DENIAL-OF-SERVICE
Nil
MALVERTISING
Nil
PHISHING
- Hacking Gmail’s UX with from fields for phishing attacks
- To help you rule out the worst password ideas, FrontNet has put together a list of the 25 words passwords
- "Keep in mind that it's not just users who can find and exploit #SQLinjection, but business logic flaws, password policy
WEB DEFACEMENT
Nil
BOTNET
Nil
RANSOMWARE
- Ransomware Remediation for Comprehensive Protection
- A new ransomware -- dubbed #Thanatos #ransomware -- was found encrypting data but not decrypting it despite victims paying the
CRYPTOMINING & CRYPTOCURRENCIES
- Twitter Bitcoin Scam Account Hacks Were Caused By Third-Party Apps
- OSX.Dummy #malware has been discovered to use chat platforms in order to target #cryptocurrency investors. Learn more with expert @lewisnic
MALWARE
- Hackers May Exploit Microsoft PowerPoint For Malware Attacks
- In @usnistgo's draft on 'Vetting the #Security of #MobileApplications,' several key general requirements are discussed. However, the process could be
- OSX.Dummy #malware has been discovered to use chat platforms in order to target #cryptocurrency investors. Learn more with expert @lewisnic
- The machine learning technology used by Google to detect malware on APK files
EXPLOIT
- Hackers May Exploit Microsoft PowerPoint For Malware Attacks
- "Keep in mind that it's not just users who can find and exploit #SQLinjection, but business logic flaws, password policy
VULNERABILITY
- An iPhone X Vulnerability Allows Hackers To Access Deleted Pictures
- Processor Woes Continue: 7 New Meltdown and Spectre Bugs Arrive Weeks Before The Holidays
- "Keep in mind that it's not just users who can find and exploit #SQLinjection, but business logic flaws, password policy
ASIA
- Security Affairs newsletter Round 189 – News of the week
- WatchGuard Technologies 2019 Security Predictions
WORLD
- Twitter Bitcoin Scam Account Hacks Were Caused By Third-Party Apps
- A Look Inside MageCart, A Notorious Hacker Group
- Processor Woes Continue: 7 New Meltdown and Spectre Bugs Arrive Weeks Before The Holidays
- Suspected APT29 hackers behind attacks on US gov agencies, think tanks, and businesses
- Security Affairs newsletter Round 189 – News of the week
- Hacking Gmail’s UX with from fields for phishing attacks
- The machine learning technology used by Google to detect malware on APK files
- WatchGuard Technologies 2019 Security Predictions
ATTACKS
- Instagram glitch exposed some user passwords
- SMS 2FA database leak drama, MageCart mishaps, Black Friday badware, and more
- According to the @FBI's Internet #CrimeReport, business email compromise attacks cost more than $676 million in 2017. Learn more from
- See how SearchLight identifies when your data is exposed, your brand is abused, or your company is mentioned on the
- Hacking Gmail’s UX with from fields for phishing attacks
- To help you rule out the worst password ideas, FrontNet has put together a list of the 25 words passwords
- "Keep in mind that it's not just users who can find and exploit #SQLinjection, but business logic flaws, password policy
THREATS
- Ransomware Remediation for Comprehensive Protection
- Twitter Bitcoin Scam Account Hacks Were Caused By Third-Party Apps
- Hackers May Exploit Microsoft PowerPoint For Malware Attacks
- An iPhone X Vulnerability Allows Hackers To Access Deleted Pictures
- A new ransomware -- dubbed #Thanatos #ransomware -- was found encrypting data but not decrypting it despite victims paying the
- Processor Woes Continue: 7 New Meltdown and Spectre Bugs Arrive Weeks Before The Holidays
- In @usnistgo's draft on 'Vetting the #Security of #MobileApplications,' several key general requirements are discussed. However, the process could be
- OSX.Dummy #malware has been discovered to use chat platforms in order to target #cryptocurrency investors. Learn more with expert @lewisnic
- "Keep in mind that it's not just users who can find and exploit #SQLinjection, but business logic flaws, password policy
- The machine learning technology used by Google to detect malware on APK files
CRIME
- Twitter Bitcoin Scam Account Hacks Were Caused By Third-Party Apps
- A Look Inside MageCart, A Notorious Hacker Group
- According to the @FBI's Internet #CrimeReport, business email compromise attacks cost more than $676 million in 2017. Learn more from
- Security Affairs newsletter Round 189 – News of the week
POLITICS
- Suspected APT29 hackers behind attacks on US gov agencies, think tanks, and businesses
- Security Affairs newsletter Round 189 – News of the week
- WatchGuard Technologies 2019 Security Predictions