Security Affairs newsletter Round 24 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box.

Who are the Ashley Madison users?
Hacking the Iridium network could be very easy
Amazon to trash Flash, as browsers walk away
Keyless Cars: A New Frontier For Bug Bounties?
How to reclaim your privacy in Windows 10, piece by piece
Zero-Day Flaws Found in Dolphin, Mercury Browsers for Android
How does facial recognition technology work?
Chinese spies target US intellectual property
Hack Codegen – Facebook Open-Sources Code That Writes Code
New Android Vulnerable Lets Hackers Take Over Your Phone
Hacker slaps Dolphin, Mercury browsers, squirts zero day
Ashley Madison hack linked to suicide, spam, and public outrage
Even super hackers leave entries in logs, so prepare to drown in data
Thousands Britons’s hard drives easy to hack with Shodan info
Yammer security sub-standard says US Veterans Affairs Dept
Cyber espionage campaign targets India and Tibetan activists
AlienSpy RAT Resurfaces as JSocket
When car hacking has become a scaring reality
Dyre Trojan Uses Semi-Random File Names to Evade Detection
Sexy Girl Devises a 3D Printed High-Heeled Shoes with Hacking Tools Inside
Samsung smart fridge opens Gmail login to hack
Carders fleece $4.2 million from Victorias MyKi transport agency
Ashley Madison offers a $500,000 reward for the culprits
Russian Lawyers want ban Windows 10 from govt offices
Sven Sakkov Appointed Director of NATO CCDCOE
Were Looking at Information Sharing The Wrong Way
Security Stands As Top Factor In Digital Brand Confidence
LG phones most exposed to new Certifi-gate vulnerability
Google Pulls App Exploiting Certifi-Gate Vulnerability
Wyndham vs. FTC: Corporate security pros need to lawyer up about data breach protection, experts say
An Ashley Madison response plan: does your company have one?
Major Android remote-access vulnerability is now being exploited [Updated]
Devs are SHEEP. Which is good when the leader writes secure code
GitHub wobbles under DDOS attack
Ashley Madison hacked potential competitor, leaked emails suggest
4 security metrics that matter
iOS Sandbox Vulnerability Puts Enterprise Data at Risk
Aviva phone hacker jailed for 18 months over revenge attack
Most corporate risk due to just 1% of employees
Kellys Glimpse Of Black Hat
Researchers Uncover New Italian RAT uWarrior
When to host your Websites security
GitHub Again Hit by DDoS Cyberattack
Sphinx, a new variant of Zeus available for sale in the underground
PayPal critical Flaw allows to steal all your funds
Be aware enterprises, it’s time to block Tor network
GitHub Again Hit by a new DDoS attack
Malware menaces poison ads as Google, Yahoo! look away
Ciscos RAT-catchers spot sysadmin-targeted phish
FireEye intern VXer pleads guilty for Darkode droid RAT ruse
Why is the smart home insecure? Because almost nobody cares
CERT warns of hard-coded credentials in home routers
British-born ISIS Hacker Killed in US Drone Strike in Syria
More than 80% of healthcare IT leaders say their systems have been compromised
Consumers Want Password Alternatives
AT&T Wi-Fi hotspot caught injecting ads into web pages
Apple iOS Jailbreak Tweaks Have Backdoors; 220,000 iCloud Accounts Hacked
Ashley Madison, who hacked it? The Krebs’s opinion
BitTorrent patched against flaw that allowed crippling DoS attacks
Vote now: Who can solve a problem like Ashley Madison?
Adobe Hotfix Patches XXE Vulnerability in ColdFusion
German Spy-Agency Trades Citizens Metadata in Exchange for NSAs Xkeyscore
Scanner Finds Malicious Android Apps at Scale
BitTorrent patches flaw that could amplify distributed denial-of-service attacks
The US government created new rules for Cloud Providers
Endress+Hauser Patches Vulnerability in ICS Products
RiskIQs Arian Evans Talks Up Hunting Down Digital Assets
Adobe Releases Hotfix to Patch ColdFusion Vulnerability
Malvertising maniac messes MSN, serves corrupted creative
Google makes it official: Chrome will freeze Flash ads on sight from Sept 1
BitTorrent kills bug that turns networks into a website-slaying weapon
Google tells iOS 9 app devs: Switch off HTTPS if you want that sweet sweet ad money from us
FBI: Social Engineering, Hacks Lead to Millions Lost to Wire Fraud
Spaniard claims WWII WAR HERO pigeon code crack. Explain please
NCA arrests six Lizard Squad users after gaming firms, retailers targetted
iOS vulnerability Ins0mnia fixed by Apple
Disgusting! Ashley Madison was Building an App – Whats your Wife Worth?
Xkeyscore: the secret Germany’s deal with the NSA
Spooks, plod and security industry join to chase bank hacker
Symantec discovered 49 New Modules of the Regin espionage platform
How Hackers Could takeover Facebook business pages
Uber hires researchers who hacked Chrysler Uconnect
Amazon dumps Flash, and the Web is better off
FBI warns that Business Email Scams are raising
The 7 Most Common RATS In Use Today
Uber pulls up to the bumper, ropes in Jeep hackers
Google Chrome will freeze Flash content and ads from Sept 1st
Alleged Russian hackers behind the EFF Spear phishing Scam

Email address: Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.

Once again thank you!

Pierluigi Paganini

(Security Affairs – Newsletter, SecurityAffairs)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

9 hours ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

14 hours ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

19 hours ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

21 hours ago

Linux variant of Cerber ransomware targets Atlassian servers

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…

1 day ago

Ivanti fixed two critical flaws in its Avalanche MDM

Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…

2 days ago

This website uses cookies.