ASIA
- Should You Worry About Software Supply Chain Attacks?
- .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
- Shedding Skin – Turla’s Fresh Faces
- China allegedly infiltrated US companies through implanted hardware backdoors
- Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- A Remote iOS Bug
- APT38 is behind financially motivated attacks carried out by North Korea
- Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined
WORLD
- UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
- Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
- Should You Worry About Software Supply Chain Attacks?
- Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
- China allegedly infiltrated US companies through implanted hardware backdoors
- US charges Russian military officers over international hacking and disinformation campaigns
- LoJack for computers used to attack European government bodies
- Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
- Justice Department charges 7 Russian intelligence officers
- CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
- Russian Fancy Bear APT Linked To Earworm Hacking Group
- ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
- HIDDEN COBRA – FASTCash Campaign
- Pacific Northwest burger chain hit by FIN7
- Irish Data Regulator Likely to Fine Facebook for Data Breach
- Russian Fancy Bear APT linked to Earworm hacking group
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- Burgerville customer credit card info stolen in data breach laid at Fin7's feet
- LoJax: First UEFI Malware seen in the Wild
- Hackers Earn $150,000 in Marine Corps Bug Bounty Program
- APT38 is behind financially motivated attacks carried out by North Korea
- UK and allies accuse Russia of cyber attack campaign
- New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
- Experts recommend avoiding single step logins
- U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
ATTACKS
- UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
- .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
- Campaign 2018: Cyberattacks on infrastructure could suppress voter turnout
- Sony accidentally leaked November's PS Plus free games
- US charges Russian military officers over international hacking and disinformation campaigns
- Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
- Burgerville Customer Credit Card Info Stolen In Data Breach
- Exclusive: Moving away from passwords to two-factor authentication
- HIDDEN COBRA – FASTCash Campaign
- Database of 200 Million Records Stolen from Apollo in Data Breach
- Irish Data Regulator Likely to Fine Facebook for Data Breach
- 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
- The @UN accidentally exposed credentials on public @trello boards. Plus, #Uber is set to pay $148 million settlement following its
- Burgerville customer credit card info stolen in data breach laid at Fin7's feet
- Block Blocking Login Items
- How #livechatsoftware leak personal #employeedata?
- Democratic congressional intern arrested for doxing GOP senators during Kavanaugh hearing
- California bill bans bots during elections
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
- Business Email Compromise: When You Don’t Need to Phish.
- Business email compromise made easy for cyber criminals
- In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
- Hackers Selling Facebook Account Logins Details On Dark Web For $3
- Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined
- UK and allies accuse Russia of cyber attack campaign
- Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
- Experts recommend avoiding single step logins
- Phishing Attacks Distributed Through CloudFlare's IPFS Gateway
- Why It’s Time to Nuke the Password
- Why It’s Time to Nuke the Password
- U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
THREATS
- Google Project Zero drops macOS exploit, calls out Apple for silent patching
- Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
- .@ThreatFabric researchers uncovered an #Android malware, #MysteryBot, which uses overlay attacks to avoid detection. Learn how this #malware affects @Google's
- Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
- China allegedly infiltrated US companies through implanted hardware backdoors
- Researchers at the 2018 @RSAConference discussed #stegware: @malware that uses #steganography. Discover how this works with expert @lewisnic.
- Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
- Avast AV reclassifies cryptominers | Avast
- Researchers at Cisco Talos (@TalosSecurity) recently discovered #GravityRAT, a remote access #Trojan. Discover how this RAT can check for
- CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
- macOS Flaw Allows Attackers To Hijack Installed Apps
- ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
- CVE-2018-8373 Exploit Spotted
- Vulnerability Scanning vs. Penetration Testing by @TripwireInc
- This is also a good time to remind that bugdoors are far more scary than backdoors.
- Fallout Exploit Kit Now Installing the Kraken Cryptor Ransomware
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- Remote Mac Exploitation Via Custom URL Schemes
- A Remote iOS Bug
- Tearing Apart the Undetected (OSX)Coldroot RAT
- An Unpatched Kernel Bug
- Mac Malware of 2017
- From the Top to the Bottom; Tracking down CVE-2017-7149
- WTF is Mughthesec!? poking on a piece of undetected adware
- OSX/MacRansom; analyzing the latest ransomware to target macs
- Two Bugs, One Func(), part three
- Two Bugs, One Func(), part two
- Two Bugs, One Func(), part one
- Mac Malware of 2016
- Towards Generic Ransomware Detection
- Analysis of an Intrusive Cross-Platform Adware; OSX/Pirrit
- Analyzing the Anti-Analysis Logic of an Adware Installer
- Monitoring Process Creation via the Kernel (Part III)
- Monitoring Process Creation via the Kernel (Part II)
- Monitoring Process Creation via the Kernel (Part I)
- CVE-2015-3673: Goodbye Rootpipe...(for now?)
- More on, "Adware for OS X Distributes Trojans"
- LoJax: First UEFI Malware seen in the Wild
- Cisco: Two critical bugs in DNA network software need these urgent patches
- Virus Bulletin 2018: Attack velocity ramps up
- Paper over the Kracks: New techniques can bypass WPA2 flaw mitigations
- Hackers Earn $150,000 in Marine Corps Bug Bounty Program
- More than 4,000 ransomware attacks occur every day. Secure your company & build your network at #RiskSec with promo code
- Malicious remote admin tool seemingly linked to KONNI malware, North Korea
- Betabot trojan packed with anti-malware evasion tools
- Cisco plugs critical flaws in DNA Center and Prime Infrastructure
- Marine Corps bug bounty program finds 150 vulnerabilities
- How is Android Accessibility Service affected by a banking Trojan?
- How does stegware malware exploit steganography techniques?
- .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
- Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
- A new group of #malware -- dubbed #GoScanSSH -- was recently discovered by researchers. Learn how this malware works and
- Secure encrypted #virtualization: How is this technology exploited?
- Seriously if I could make evil semiconductors I would just replace one which is already present rather than adding it.
Show
- WATCH: Top 5 Viruses of All Time by Security Expert @mikko Hyppönen
- New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
- Foxit PDF Reader fixes serious remote code execution vulnerability
- A Google bug breaks the search results in Safari
- Researchers found that cheap Android devices were shipped pre-installed backdoors
- Google opened the .page domain
- Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers
- Zoho Heavily Used by Keyloggers to Transmit Stolen Data
- Hacking for good uncovers over 150 Marine Corps web vulnerabilities
- Network Outage at Some Recipe Unlimited Locations Caused by Malware
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
CRIME
- Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
- Shedding Skin – Turla’s Fresh Faces
- Avast AV reclassifies cryptominers | Avast
- Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
- Justice Department charges 7 Russian intelligence officers
- CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
- Burgerville Customer Credit Card Info Stolen In Data Breach
- HIDDEN COBRA – FASTCash Campaign
- Pacific Northwest burger chain hit by FIN7
- Database of 200 Million Records Stolen from Apollo in Data Breach
- Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- Burgerville customer credit card info stolen in data breach laid at Fin7's feet
- Remote Mac Exploitation Via Custom URL Schemes
- How is Android Accessibility Service affected by a banking Trojan?
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
- Business Email Compromise: When You Don’t Need to Phish.
- Business email compromise made easy for cyber criminals
- APT38 is behind financially motivated attacks carried out by North Korea
- In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
- Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
- New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
- Experts recommend avoiding single step logins
POLITICS
- UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
- Justice Department charges 7 Russian intelligence officers
- APT28 turns away from election hacking and back to cyberespionage
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
- APT38 is behind financially motivated attacks carried out by North Korea
DATA BREACH
- FakeSpy Is Back as Part of New SmiShing Campaign, Adds New Features
- The ultimate fallout from the Facebook data breach could be massive
- Gwinnett Medical Center Investigates Possible Data Breach
- Gwinnett Medical Center investigates possible data breach
- GhostDNS hijacking campaign steps up attacks on Brazilians; 100K+ devices compromised
- #DanaBot Observed in Large Campaign Targeting U.S. Organizations
- Ransomware operators breach 40.000+ records from Fetal Diagnostic Institute of the Pacific
- Facebook Reveals That Trio of Bugs Led to Data Breach
- Vietnam-Born Worker in U.S Intelligence Ordered Prison over Data Theft and Leakage
- New Danabot Banking Malware campaign now targets banks in the U.S.
- Zoho domains central to keylogger, data theft campaigns worldwide
- 100,000-Plus Home Routers Hijacked in Campaign to Steal Banking Credentials
- .@Lookout’s @VijayaKaza is at @FedNewsRadio’s studio recording with @gschumm!
- How Ashley Madison Recovered From Its Massive Data Breach
- An extremely high number of keylogger #phishing campaigns have been seen tied to the Zoho online office suite software:
- New Betabot campaign under the microscope
- CyberSecurity Asean security alert on A Vulnerability in Microsoft Windows JET Database Engine Could Allow for Remote Code Execution
- Facebook faces legal actions after data breach
- Norton by Symantec Urges Consumers to Help Protect Their Personal Data
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
DENIAL-OF-SERVICE
- Torii Botnet - Definitely Not a Mirai Wannabe
- Instagram Used as Marketplace to Sell Stolen Fortnite Accounts and Botnets
- Hacked Fortnite accounts and rent-a-botnet being pushed on Instagram
- Hackers Use Instagram For Selling Stolen ‘Fortnite’ Accounts And Botnets
- Enormous botnet used to hijack traffic destined for Brazilian banks
- BYOB – Build Your Own Botnet
- The @activereach guide to #DDoS, is aimed at technically aware business people who do not necessarily have a background in
MALVERTISING
Nothing to report
PHISHING
- Phishing 101: Protection for Everyone
- How to use the Firefox Master Password
- Phishing gets more complex as decoy PDF pops up with Microsoft-issued SSL certificate
- LastPass study shines new light on global password security practices
- Do you know the top myths and facts of #mobile #phishing? If not, don't worry, we've compiled a list of
- Phishing Attack Impersonates Law Firm
- Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft
- Phishing Attack Impersonates Law Firm
- Password-sharing is still prevalent in the workplace – although 45 percent of businesses do now use multifactor authentication:
- GhostDNS hijacked 100,000 router traffic directed to phishing sites
- Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data
- An extremely high number of keylogger #phishing campaigns have been seen tied to the Zoho online office suite software:
- What is the future of authentication? Hint: It’s not passwords, passphrases or MFA
- 100,000 routers hijacked by GhostDNS, traffic directed to phishing sites
WEB DEFACEMENT
- Hacker Faces Jail Time After Defacing West Point, NYC Sites
- Hacker Defacing 11,000 US Websites Faces 10 Years behind Bars
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
- Hacker faces jail time after defacing US military academy, NYC sites
MALWARE
- Windows 10 October 2018 Update refines ransomware protection
- Virus Bulletin 2018: macOS Flaw Allows Attackers to Hijack Installed Apps
- Virus Bulletin 2018: Microsoft’s Lambert on How Cloud is Changing Security
- Malware Outbreak Causes Disruptions, Closures at Canadian Restaurant Chain
- Betabot - An Example of Cheap Modern Malware Sophistication
- Instagram accounts frozen with ransomware | Avast
- Instagram accounts frozen with ransomware | Avast
- Did you know that 1 in 131 emails contains malware? In honor of #NCSAM, secure your spot for #RiskSec, expand
- New KONNI Malware Attacking Eurasia and Southeast Asia
- Google Taking New Steps To Prevent Malicious Chrome Extensions
- 3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
- Network Outage at Some Recipe Unlimited Locations Caused by Malware
- Labeless Part 6: How to Resolve Obfuscated API Calls in the Ngioweb Proxy Malware
- Banking trojans, not #ransomware, are the biggest threat to the enterprise now.
- Labeless Part 5: How to Decrypt Strings in Boleto Banking Malware Without Reconstructing Decryption Algorithm.
- Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
- Ransomware operators breach 40.000+ records from Fetal Diagnostic Institute of the Pacific
- New Danabot Banking Malware campaign now targets banks in the U.S.
- Zoho domains central to keylogger, data theft campaigns worldwide
- Recipe Unlimited denies ransomware attack, despite alleged ransom note
- Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data
- IDG Contributor Network: Will your company be valued by its price-to-data ratio?
- Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
- Introducing...
THE HUNT: A Cyber Attack in the Process Industry
- Researchers associated the recently discovered NOKKI Malware to North Korean APT
- Changes to #Sanny #malware delivery method attacks were recently discovered by @FireEye researches. Learn who is at risk and how
- Ransomware Hits Port of San Diego
- An extremely high number of keylogger #phishing campaigns have been seen tied to the Zoho online office suite software:
- Z-LAB Report – Analyzing the GandCrab v5 ransomware
- Preventing and Detecting Malicious Insiders
- In 1999, AV-TEST reported that there were 98,428 total unique malware samples.
Today, AV-TEST registers over 350,000 new pieces of
- Cheap Android Phones and Poor Quality Control Leads to Malware Surprise
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
EXPLOIT
- TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
- TA18-276A: Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
- Heipparallaa! Uudessa jaksossamme sivuutamme ajankohtaiset aiheet ja keskitymme puhumaan @japi999 ja @ekoivune kanssa tietoturva-asiantuntijuudesta. Bonusvieraana tällä kertaa OpSecin sijaan @Larppa1337!
VULNERABILITY
- Virus Bulletin 2018: macOS Flaw Allows Attackers to Hijack Installed Apps
- [SingCERT] Alert on 47 Critical Vulnerabilities in Adobe Acrobat and Adobe Reader
- Mozilla Firefox Releases 62.0.3 & Security Updates for 2 High Critical Vulnerabilities
- Women in Information Security: Pam Armstrong
- Vulnerability Spotlight: Google PDFium JBIG2 Image ComposeToOpt2WithRect Information Disclosure Vulnerability
- Foxit patches 118 vulnerabilities in popular PDF reader
- Experts found 9 NAS flaws that expose LenovoEMC, Iomega Devices to hack
- The one serious MacBook Pro security flaw that nobody is talking about
- Update now: Adobe fixes 85 serious flaws in Acrobat and Reader
- 18 Vulnerabilities Found in Foxit PDF Reader
- 18 Vulnerabilities Found in Foxit PDF Reader
- Marine Corps bug bounty program finds 150 vulnerabilities
- TP-Link router vulnerable to remote takeover flaw
- Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
- Adobe update cleans up 86 bugs in Acrobat and Reader, many critical
- Facebook Reveals That Trio of Bugs Led to Data Breach
- TP-Link router vulnerable to remote takeover flaw
- Adobe update cleans up 86 bugs in Acrobat and Reader, many critical
- The Intel Management Engine exposes a new vulnerability
- How an improper #authentication flaw affects
- Vulnerability Spotlight: Google PDFium JBIG2 Image ComposeToOpt2WithRect Information Disclosure Vulnerability
- CyberSecurity Asean security alert on A Vulnerability in Microsoft Windows JET Database Engine Could Allow for Remote Code Execution
- Vulnerabilities expose Iomega and LenovoEMC NAS devices to attacks
- Estonia sues Gemalto for €152M for the flaws in the identification cards issued by the company
- Scanning for OWASP Top 10 Vulnerabilities with Metasploit for the Web(w3af)
- Mozilla Firefox 62.0.3 releases: Fixed hangs on macOS Mojave & security bugs
- Apple iOS 12 Texting Bug Sends Messages To Wrong Contacts
ASIA
- Hidden Cobra APT used the new ATM cash-out scheme FASTCash to hit banks worldwide
- FakeSpy Is Back as Part of New SmiShing Campaign, Adds New Features
- DHS aware of ongoing APT attacks on cloud service providers
- 3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
- FireEye unmasks a new North Korean threat group
- Hacker Defacing 11,000 US Websites Faces 10 Years behind Bars
- APT38: Details on New North Korean Regime-Backed Threat Group
- Vietnam-Born Worker in U.S Intelligence Ordered Prison over Data Theft and Leakage
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks
- Zoho domains central to keylogger, data theft campaigns worldwide
- GhostDNS hijacked 100,000 router traffic directed to phishing sites
- Researchers associated the recently discovered NOKKI Malware to North Korean APT
- Bank Servers Hacked to Trick ATMs into Spitting Out Millions in Cash
- North Korean HIDDEN COBRA Hackers Using New Attack Called “FASTCash” to Cash-out From ATM Machine
- Enormous botnet used to hijack traffic destined for Brazilian banks
OCEANIA
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks
- New Danabot Banking Malware campaign now targets banks in the U.S.
NORTH AMERICA
- Hidden Cobra APT used the new ATM cash-out scheme FASTCash to hit banks worldwide
- Malware Outbreak Causes Disruptions, Closures at Canadian Restaurant Chain
- 3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
- FireEye unmasks a new North Korean threat group
- Hacker Defacing 11,000 US Websites Faces 10 Years behind Bars
- APT38: Details on New North Korean Regime-Backed Threat Group
- TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
- #DanaBot Observed in Large Campaign Targeting U.S. Organizations
- Ransomware operators breach 40.000+ records from Fetal Diagnostic Institute of the Pacific
- Vietnam-Born Worker in U.S Intelligence Ordered Prison over Data Theft and Leakage
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks
- New Danabot Banking Malware campaign now targets banks in the U.S.
- Hacker faces jail time after defacing US military academy, NYC sites
- GhostDNS hijacked 100,000 router traffic directed to phishing sites
- See clearly, decide wisely with visibility and management
- Researchers associated the recently discovered NOKKI Malware to North Korean APT
- Ransomware Hits Port of San Diego
- Bank Servers Hacked to Trick ATMs into Spitting Out Millions in Cash
- Vulnerabilities expose Iomega and LenovoEMC NAS devices to attacks
- Facebook faces legal actions after data breach
- 100,000 routers hijacked by GhostDNS, traffic directed to phishing sites
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
SOUTH AMERICA
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks
- 100,000-Plus Home Routers Hijacked in Campaign to Steal Banking Credentials
- GhostDNS hijacked 100,000 router traffic directed to phishing sites
- Enormous botnet used to hijack traffic destined for Brazilian banks
EUROPE
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks
- New Danabot Banking Malware campaign now targets banks in the U.S.
- The Intel Management Engine exposes a new vulnerability
- Researchers associated the recently discovered NOKKI Malware to North Korean APT
- Z-LAB Report – Analyzing the GandCrab v5 ransomware
- Estonia sues Gemalto for €152M for the flaws in the identification cards issued by the company
AFRICA
Nothing to report
HEALTHCARE
- Women in Information Security: Pam Armstrong
- Gwinnett Medical Center Investigates Possible Data Breach
- Gwinnett Medical Center investigates possible data breach
- TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
- Ransomware operators breach 40.000+ records from Fetal Diagnostic Institute of the Pacific
TRANSPORT
- Ransomware Hits Port of San Diego
BANKING & FINANCE
- Hidden Cobra APT used the new ATM cash-out scheme FASTCash to hit banks worldwide
- 3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
- FireEye unmasks a new North Korean threat group
- APT38: Details on New North Korean Regime-Backed Threat Group
- Banking trojans, not #ransomware, are the biggest threat to the enterprise now.
- Labeless Part 5: How to Decrypt Strings in Boleto Banking Malware Without Reconstructing Decryption Algorithm.
- TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
- Ransomware operators breach 40.000+ records from Fetal Diagnostic Institute of the Pacific
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks
- New Danabot Banking Malware campaign now targets banks in the U.S.
- 100,000-Plus Home Routers Hijacked in Campaign to Steal Banking Credentials
- GhostDNS hijacked 100,000 router traffic directed to phishing sites
- Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data
- IDG Contributor Network: Will your company be valued by its price-to-data ratio?
- Z-LAB Report – Analyzing the GandCrab v5 ransomware
- Bank Servers Hacked to Trick ATMs into Spitting Out Millions in Cash
- North Korean HIDDEN COBRA Hackers Using New Attack Called “FASTCash” to Cash-out From ATM Machine
- New Betabot campaign under the microscope
- Enormous botnet used to hijack traffic destined for Brazilian banks
- BYOB – Build Your Own Botnet
- What is the future of authentication? Hint: It’s not passwords, passphrases or MFA
- Norton by Symantec Urges Consumers to Help Protect Their Personal Data
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
INFORMATION & TELECOMMUNICATION
- Virus Bulletin 2018: Microsoft’s Lambert on How Cloud is Changing Security
- The ultimate fallout from the Facebook data breach could be massive
- Phishing gets more complex as decoy PDF pops up with Microsoft-issued SSL certificate
- Instagram accounts frozen with ransomware | Avast
- Instagram accounts frozen with ransomware | Avast
- Vulnerability Spotlight: Google PDFium JBIG2 Image ComposeToOpt2WithRect Information Disclosure Vulnerability
- Do you know the top myths and facts of #mobile #phishing? If not, don't worry, we've compiled a list of
- Google Taking New Steps To Prevent Malicious Chrome Extensions
- Instagram Used as Marketplace to Sell Stolen Fortnite Accounts and Botnets
- 18 Vulnerabilities Found in Foxit PDF Reader
- Phishing Attack Impersonates Law Firm
- Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft
- Hacked Fortnite accounts and rent-a-botnet being pushed on Instagram
- 18 Vulnerabilities Found in Foxit PDF Reader
- TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
- Phishing Attack Impersonates Law Firm
- TA18-276A: Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
- Facebook Reveals That Trio of Bugs Led to Data Breach
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks
- New Danabot Banking Malware campaign now targets banks in the U.S.
- GhostDNS hijacked 100,000 router traffic directed to phishing sites
- Recipe Unlimited denies ransomware attack, despite alleged ransom note
- IDG Contributor Network: Will your company be valued by its price-to-data ratio?
- Introducing...
THE HUNT: A Cyber Attack in the Process Industry
- Vulnerability Spotlight: Google PDFium JBIG2 Image ComposeToOpt2WithRect Information Disclosure Vulnerability
- Researchers associated the recently discovered NOKKI Malware to North Korean APT
- .@Lookout’s @VijayaKaza is at @FedNewsRadio’s studio recording with @gschumm!
- Hackers Use Instagram For Selling Stolen ‘Fortnite’ Accounts And Botnets
- CyberSecurity Asean security alert on A Vulnerability in Microsoft Windows JET Database Engine Could Allow for Remote Code Execution
- Preventing and Detecting Malicious Insiders
- Facebook faces legal actions after data breach
- Enormous botnet used to hijack traffic destined for Brazilian banks
- The @activereach guide to #DDoS, is aimed at technically aware business people who do not necessarily have a background in
- Norton by Symantec Urges Consumers to Help Protect Their Personal Data
- In 1999, AV-TEST reported that there were 98,428 total unique malware samples.
Today, AV-TEST registers over 350,000 new pieces of
- Heipparallaa! Uudessa jaksossamme sivuutamme ajankohtaiset aiheet ja keskitymme puhumaan @japi999 ja @ekoivune kanssa tietoturva-asiantuntijuudesta. Bonusvieraana tällä kertaa OpSecin sijaan @Larppa1337!
FOOD
Nothing to report
WATER
Nothing to report
ENERGY
- TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks
GOVERNMENT & PUBLIC SERVICE
Nothing to report
ASIA
- Hidden Cobra APT used the new ATM cash-out scheme FASTCash to hit banks worldwide
- FakeSpy Is Back as Part of New SmiShing Campaign, Adds New Features
- DHS aware of ongoing APT attacks on cloud service providers
- 3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
- FireEye unmasks a new North Korean threat group
- Hacker Defacing 11,000 US Websites Faces 10 Years behind Bars
- APT38: Details on New North Korean Regime-Backed Threat Group
- Vietnam-Born Worker in U.S Intelligence Ordered Prison over Data Theft and Leakage
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks
- Zoho domains central to keylogger, data theft campaigns worldwide
- GhostDNS hijacked 100,000 router traffic directed to phishing sites
- Researchers associated the recently discovered NOKKI Malware to North Korean APT
- Bank Servers Hacked to Trick ATMs into Spitting Out Millions in Cash
- North Korean HIDDEN COBRA Hackers Using New Attack Called “FASTCash” to Cash-out From ATM Machine
- Enormous botnet used to hijack traffic destined for Brazilian banks
WORLD
- Hidden Cobra APT used the new ATM cash-out scheme FASTCash to hit banks worldwide
- Malware Outbreak Causes Disruptions, Closures at Canadian Restaurant Chain
- 3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
- FireEye unmasks a new North Korean threat group
- Hacker Defacing 11,000 US Websites Faces 10 Years behind Bars
- APT38: Details on New North Korean Regime-Backed Threat Group
- TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
- #DanaBot Observed in Large Campaign Targeting U.S. Organizations
- Ransomware operators breach 40.000+ records from Fetal Diagnostic Institute of the Pacific
- Vietnam-Born Worker in U.S Intelligence Ordered Prison over Data Theft and Leakage
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks
- New Danabot Banking Malware campaign now targets banks in the U.S.
- Hacker faces jail time after defacing US military academy, NYC sites
- 100,000-Plus Home Routers Hijacked in Campaign to Steal Banking Credentials
- GhostDNS hijacked 100,000 router traffic directed to phishing sites
- The Intel Management Engine exposes a new vulnerability
- See clearly, decide wisely with visibility and management
- Researchers associated the recently discovered NOKKI Malware to North Korean APT
- Ransomware Hits Port of San Diego
- Z-LAB Report – Analyzing the GandCrab v5 ransomware
- Bank Servers Hacked to Trick ATMs into Spitting Out Millions in Cash
- Vulnerabilities expose Iomega and LenovoEMC NAS devices to attacks
- Facebook faces legal actions after data breach
- Estonia sues Gemalto for €152M for the flaws in the identification cards issued by the company
- Enormous botnet used to hijack traffic destined for Brazilian banks
- 100,000 routers hijacked by GhostDNS, traffic directed to phishing sites
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
ATTACKS
- Phishing 101: Protection for Everyone
- FakeSpy Is Back as Part of New SmiShing Campaign, Adds New Features
- How to use the Firefox Master Password
- The ultimate fallout from the Facebook data breach could be massive
- Phishing gets more complex as decoy PDF pops up with Microsoft-issued SSL certificate
- LastPass study shines new light on global password security practices
- Do you know the top myths and facts of #mobile #phishing? If not, don't worry, we've compiled a list of
- Hacker Faces Jail Time After Defacing West Point, NYC Sites
- Gwinnett Medical Center Investigates Possible Data Breach
- Torii Botnet - Definitely Not a Mirai Wannabe
- Instagram Used as Marketplace to Sell Stolen Fortnite Accounts and Botnets
- Hacker Defacing 11,000 US Websites Faces 10 Years behind Bars
- Phishing Attack Impersonates Law Firm
- Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft
- Hacked Fortnite accounts and rent-a-botnet being pushed on Instagram
- Gwinnett Medical Center investigates possible data breach
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
- GhostDNS hijacking campaign steps up attacks on Brazilians; 100K+ devices compromised
- Phishing Attack Impersonates Law Firm
- #DanaBot Observed in Large Campaign Targeting U.S. Organizations
- Ransomware operators breach 40.000+ records from Fetal Diagnostic Institute of the Pacific
- Facebook Reveals That Trio of Bugs Led to Data Breach
- Vietnam-Born Worker in U.S Intelligence Ordered Prison over Data Theft and Leakage
- New Danabot Banking Malware campaign now targets banks in the U.S.
- Hacker faces jail time after defacing US military academy, NYC sites
- Zoho domains central to keylogger, data theft campaigns worldwide
- Password-sharing is still prevalent in the workplace – although 45 percent of businesses do now use multifactor authentication:
- 100,000-Plus Home Routers Hijacked in Campaign to Steal Banking Credentials
- GhostDNS hijacked 100,000 router traffic directed to phishing sites
- Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data
- .@Lookout’s @VijayaKaza is at @FedNewsRadio’s studio recording with @gschumm!
- How Ashley Madison Recovered From Its Massive Data Breach
- Hackers Use Instagram For Selling Stolen ‘Fortnite’ Accounts And Botnets
- An extremely high number of keylogger #phishing campaigns have been seen tied to the Zoho online office suite software:
- New Betabot campaign under the microscope
- CyberSecurity Asean security alert on A Vulnerability in Microsoft Windows JET Database Engine Could Allow for Remote Code Execution
- Facebook faces legal actions after data breach
- Enormous botnet used to hijack traffic destined for Brazilian banks
- BYOB – Build Your Own Botnet
- The @activereach guide to #DDoS, is aimed at technically aware business people who do not necessarily have a background in
- What is the future of authentication? Hint: It’s not passwords, passphrases or MFA
- Norton by Symantec Urges Consumers to Help Protect Their Personal Data
- 100,000 routers hijacked by GhostDNS, traffic directed to phishing sites
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
THREATS
- Windows 10 October 2018 Update refines ransomware protection
- Virus Bulletin 2018: macOS Flaw Allows Attackers to Hijack Installed Apps
- Virus Bulletin 2018: Microsoft’s Lambert on How Cloud is Changing Security
- [SingCERT] Alert on 47 Critical Vulnerabilities in Adobe Acrobat and Adobe Reader
- Malware Outbreak Causes Disruptions, Closures at Canadian Restaurant Chain
- Mozilla Firefox Releases 62.0.3 & Security Updates for 2 High Critical Vulnerabilities
- Betabot - An Example of Cheap Modern Malware Sophistication
- Instagram accounts frozen with ransomware | Avast
- Instagram accounts frozen with ransomware | Avast
- Did you know that 1 in 131 emails contains malware? In honor of #NCSAM, secure your spot for #RiskSec, expand
- Women in Information Security: Pam Armstrong
- Vulnerability Spotlight: Google PDFium JBIG2 Image ComposeToOpt2WithRect Information Disclosure Vulnerability
- New KONNI Malware Attacking Eurasia and Southeast Asia
- Google Taking New Steps To Prevent Malicious Chrome Extensions
- Foxit patches 118 vulnerabilities in popular PDF reader
- 3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
- Experts found 9 NAS flaws that expose LenovoEMC, Iomega Devices to hack
- Network Outage at Some Recipe Unlimited Locations Caused by Malware
- The one serious MacBook Pro security flaw that nobody is talking about
- Update now: Adobe fixes 85 serious flaws in Acrobat and Reader
- Labeless Part 6: How to Resolve Obfuscated API Calls in the Ngioweb Proxy Malware
- 18 Vulnerabilities Found in Foxit PDF Reader
- Banking trojans, not #ransomware, are the biggest threat to the enterprise now.
- Labeless Part 5: How to Decrypt Strings in Boleto Banking Malware Without Reconstructing Decryption Algorithm.
- 18 Vulnerabilities Found in Foxit PDF Reader
- TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
- Marine Corps bug bounty program finds 150 vulnerabilities
- TP-Link router vulnerable to remote takeover flaw
- Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
- Adobe update cleans up 86 bugs in Acrobat and Reader, many critical
- Ransomware operators breach 40.000+ records from Fetal Diagnostic Institute of the Pacific
- TA18-276A: Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
- Facebook Reveals That Trio of Bugs Led to Data Breach
- TP-Link router vulnerable to remote takeover flaw
- Adobe update cleans up 86 bugs in Acrobat and Reader, many critical
- New Danabot Banking Malware campaign now targets banks in the U.S.
- Zoho domains central to keylogger, data theft campaigns worldwide
- Recipe Unlimited denies ransomware attack, despite alleged ransom note
- The Intel Management Engine exposes a new vulnerability
- How an improper #authentication flaw affects
- Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data
- IDG Contributor Network: Will your company be valued by its price-to-data ratio?
- Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
- Introducing...
THE HUNT: A Cyber Attack in the Process Industry
- Vulnerability Spotlight: Google PDFium JBIG2 Image ComposeToOpt2WithRect Information Disclosure Vulnerability
- Researchers associated the recently discovered NOKKI Malware to North Korean APT
- Changes to #Sanny #malware delivery method attacks were recently discovered by @FireEye researches. Learn who is at risk and how
- Ransomware Hits Port of San Diego
- An extremely high number of keylogger #phishing campaigns have been seen tied to the Zoho online office suite software:
- Z-LAB Report – Analyzing the GandCrab v5 ransomware
- CyberSecurity Asean security alert on A Vulnerability in Microsoft Windows JET Database Engine Could Allow for Remote Code Execution
- Preventing and Detecting Malicious Insiders
- Vulnerabilities expose Iomega and LenovoEMC NAS devices to attacks
- Estonia sues Gemalto for €152M for the flaws in the identification cards issued by the company
- Scanning for OWASP Top 10 Vulnerabilities with Metasploit for the Web(w3af)
- Mozilla Firefox 62.0.3 releases: Fixed hangs on macOS Mojave & security bugs
- In 1999, AV-TEST reported that there were 98,428 total unique malware samples.
Today, AV-TEST registers over 350,000 new pieces of
- Apple iOS 12 Texting Bug Sends Messages To Wrong Contacts
- Heipparallaa! Uudessa jaksossamme sivuutamme ajankohtaiset aiheet ja keskitymme puhumaan @japi999 ja @ekoivune kanssa tietoturva-asiantuntijuudesta. Bonusvieraana tällä kertaa OpSecin sijaan @Larppa1337!
- Cheap Android Phones and Poor Quality Control Leads to Malware Surprise
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
CRIME
- Hidden Cobra APT used the new ATM cash-out scheme FASTCash to hit banks worldwide
- 3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
- FireEye unmasks a new North Korean threat group
- Hacker Defacing 11,000 US Websites Faces 10 Years behind Bars
- APT38: Details on New North Korean Regime-Backed Threat Group
- Banking trojans, not #ransomware, are the biggest threat to the enterprise now.
- Labeless Part 5: How to Decrypt Strings in Boleto Banking Malware Without Reconstructing Decryption Algorithm.
- TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
- TA18-276A: Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
- Vietnam-Born Worker in U.S Intelligence Ordered Prison over Data Theft and Leakage
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks
- New Danabot Banking Malware campaign now targets banks in the U.S.
- Zoho domains central to keylogger, data theft campaigns worldwide
- 100,000-Plus Home Routers Hijacked in Campaign to Steal Banking Credentials
- GhostDNS hijacked 100,000 router traffic directed to phishing sites
- Recipe Unlimited denies ransomware attack, despite alleged ransom note
- Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data
- Ransomware Hits Port of San Diego
- Z-LAB Report – Analyzing the GandCrab v5 ransomware
- Bank Servers Hacked to Trick ATMs into Spitting Out Millions in Cash
- North Korean HIDDEN COBRA Hackers Using New Attack Called “FASTCash” to Cash-out From ATM Machine
- New Betabot campaign under the microscope
- Facebook faces legal actions after data breach
- Estonia sues Gemalto for €152M for the flaws in the identification cards issued by the company
- Enormous botnet used to hijack traffic destined for Brazilian banks
- BYOB – Build Your Own Botnet
- What is the future of authentication? Hint: It’s not passwords, passphrases or MFA
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
POLITICS
- Hidden Cobra APT used the new ATM cash-out scheme FASTCash to hit banks worldwide
- DHS aware of ongoing APT attacks on cloud service providers
- 3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
- FireEye unmasks a new North Korean threat group
- Hacker Defacing 11,000 US Websites Faces 10 Years behind Bars
- TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
- TA18-276A: Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
- Weekly Threat Briefing: Cobalt Threat Group Serves Up SpicyOmelette Fresh Bank Attacks