Security Affairs newsletter Round 249

Pierluigi Paganini February 02, 2020

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs

Authorities arrest 3 Indonesian hackers behind many Magecart attacks
City of Potsdam offline following a cyberattack
A new piece of Ryuk Stealer targets government, military and finance sectors
Aggah: How to run a botnet without renting a Server (for more than a year)
Did H&M spy on its German employees? Privacy watchdog opens an investigation
Mozilla banned hundreds of malicious Firefox add-ons over the last weeks
Operation Night Fury: Group-IB helps take down a cybergang behind the infection of hundreds of websites all over the world
Which was the most common threat to macOS devices in 2019? Shlayer malware
A new piece of Snake Ransomware targets ICS processes
Attacks on Citrix servers increase after the release of CVE-2019-19781 exploits
Cyber Threat Trends Dashboard
Fortinet removed hardcoded SSH keys and database backdoors from FortiSIEM
A vulnerability in Zoom platform allowed miscreants to join Zoom meetings
CVE-2020-7247 RCE flaw in OpenSMTPD library affects many BSD and Linux distros
Magento 2.3.4 addresses three critical Code execution flaws
Phantom of the ADAS – Phantom Attacks Against Advanced Driving Assistance Systems
Wawa card breach: 30 million card records for sale in the dark web
Check Point detailed two flaws in Microsoft Azure that could have allowed taking over cloud servers
Cisco Small Business Switches affected by DoS and information disclosure flaws
Leaked confidential report states United Nations has been hacked
Over 200K WordPress sites potentially exposed to hack due to Code Snippets flaw
US Govn contractor Electronic Warfare Associates infected with Ryuk ransomware
Hackers penetrated NEC defense business division in 2016
Iran-linked APT34 group is targeting US federal workers
NIST Tests Forensic Methods for Getting Data From Damaged Mobile Phones
Report: Threat of Emotet and Ryuk
US continues to press UE members to ban Huawei and Chinese 5G technologies
Crooks start exploiting Coronavirus as bait to spread malware
Winnti APT Group targeted Hong Kong Universities

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – newsletter, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]



you might also like

leave a comment