The best news of the week with Security Affairs.
First of all, let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog
|· Facebook dismantled a huge spam campaign leveraging bogus accounts|
|· Security Affairs newsletter Round 107 – News of the week|
|· Callisto APT Group exploited Hacking Team surveillance tools to hack Government targets|
|· Flaws in the Bosch Drivelog Connector dongle could allow hackers to halt the engine|
|· Terror EK rising in the threat landscape while Sundown EK drops|
|· Microsoft biannual transparency report – US foreign intelligence surveillance requests more than doubled|
|· The failure of the missile launch by North Korea may have been caused by US cyber attack|
|· Windows attacks via CVE-2017-0199 – Practical exploitation! (PoC)|
|· Who is offering the CradleCore Ransomware as source code?|
|· The alleged link between the Shadow Brokers data leak and the Stuxnet cyber weapon|
|· Moving threat landscape: The reality beyond the cyberwarfare|
|· Karmen Ransomware, a cheap RaaS service that implements anti-analysis features|
|· InterContinental Hotels Group, the international hotel chain confirmed a second credit card breach|
|· Homograph Phishing Attacks are almost impossible to detect on major browsers|
|· Critical vulnerability in Drupal References Module opens 120,000 Sites to hack|
|· Oracle patch update for April 2017 also fixed Struts and Shadow Brokers exploits|
|· Symantec is monitoring the Hajime IoT malware, is it the work of vigilante hacker?|
|· Vulnerabilities in Linksys routers allow attackers to hijack dozens of models|
|· Exfiltrating data from laptop and smartphones via ambient light sensors|
|· Introduction to the NIST CyberSecurity Framewor for a Landscape of Cyber Menaces|
|· Anatomy of Cybercriminal Communications: Why do crooks prefer Skype|
|· The RawPOS PoS Malware also scans for drivers license data|
|· The Stuxnet vulnerability is still one of the most exploited flaws in the wild by hackers|
|· WikiLeaks published the user guide for the CIA Weeping Angel, the Samsung Smart TV Hacking Tool|
|· Chinese APTs targeted the South Korean THAAD anti-missile systems|
|· Hackers compromised thousands of Windows boxes using leaked NSA hack tools DOUBLEPULSAR and ETERNALBLUE|
|· US Court sentenced Russian hacker Roman Seleznev to 27 years in jail for hacking|
Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.I desire to inform you that Security Affairs is now open to sponsored content.
I’ll offer the opportunity to:
• Insert banners of various sizes in all the posts on Security Affairs.
• Publish sponsored posts written by the customers that can include any kind of commercial reference.
• Arrange a monthly/quarterly/annual campaign (for big customers) to advertise customers’ activities and discoveries.
For more info contact me at pierluigi.paganini@
Thanks for supporting Security Affairs.
Once again thank you!
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.