Categories: Breaking News

Security Affairs newsletter Round 29 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box.

Cisco released a tool to scan for SYNful_Knock implants
Aerospace Probes released to stratosphere for spying weapons
Last weeks cookie-vuln wont be the last, security bod says
Insult to injury: Researcher remote pwns RAT of cuffed FireEye VXer
China, US Agree To Not Conduct Cyberespionage For Economic Gain
Cyber attack overall cost suffered last year by businesses is $315b
Paranoid Android redux: going dark with Silent Circle’s Blackphone 2
#OpNimr Anonymous targets Saudi websites to stop al-Nimr’s crucifixion
Uber is facing problems with Chinese fraudsters
Saudi Arabia: They liked Hacking Team so much they tried to buy the company
Identity theft hit 7% of US population last year
Tracking Hacker Forums with Traffic Analysis
How to use GCAT backdoor with Gmail as a C&C server
Dyreza Trojan Targeting IT Supply Chain Credentials
SAP Patches 12 SQL Injection, XSS Vulnerabilities in HANA
Shifu Banking Trojan Targets UK Wealth Management Firms
UK.gov unleashes 3D virtual world to train GCHQs kiddie division
Linux XOR DDoS Botnet delivers potent DDoS attacks
Viruses, bulletins, surveys, and gender: hashtag #VB2015
The Unintended Attack Surface Of The Internet Of Things
Fiorina: I rushed out HP servers to power NSA snooping. Mwahahaha!
Monica Lewinsky lawyer named as first outsider on secret US spy court
Trump Hotels Collection confirm data breach
Linux-powered botnet lets rip on victims with 180Gbps network floods
Snowden Joins Twitter, Follows NSA
Here are the God-mode holes that gave TrueCrypt audit the slip
Deceit As A Defense Against Cyberattacks
Highly personal data for 15 million T-Mobile applicants stolen by hackers
TrueCrypt Encryption Software Has Two Critical Flaws: Its time to Move On
15 MILLION T-Mobile US customer records swiped by hackers
Profiling an insider
How to identify and thwart insider threats
Apple Working to Patch Gatekeeper Bypass Flaw
A billion Android phones are vulnerable to new Stagefright bugs
Study Analyzes Corporate Security Practices Across Industries
Apple Patches 100+ Vulnerabilities in OS X, Safari, iOS
HTTPS Available as Opt-In for Blogspot
Bringing IT and OT together
Automating Breach Detection For The Way Security Professionals Think
Six steps that can make your cyber workspace a safer place
Chinese fraudsters hitch a ride on Uber accounts
Apple iOS 9.0.2 Update Patches Lock Screen Bypass Exploit
Microsoft gaffe spooks users as weird Windows 7 update accidentally released
Stagefright 2.0 Vulnerabilities Affect 1 Billion Android Devices
Hacked Opinions: The legalities of hacking – Ian Amit
Scraping away profits
New Apple Gatekeeper bypass can allow running rouge applications
WinRAR zero-day open million users to hack
Hillary spillery finds half-hearted phishery
US Air Force Wireless hacking in Flight
Russian hacker, nabbed in Spain, cops 4+ years for Citadel botnet
Significant WinRAR vulnerability identified
Unsupported Honeywell Experion PKS Vulnerable to Public Attacks
CIA officers pulled from China because of OPM breach
The Hacking crew known as Gaza cybergang was very active in Q2 2015
New Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps
UK parents ‘want minimum age for smartphone ownership’
Microsoft Chooses Ubuntu Linux for their Cloud-based Azure HDInsight Big Data Solution
Smuggle mischievous JavaScript into WinRAR archives? Sure, why not
Does Mr. Robot’s use real Hacking Tools? Which are?
Rusky antivirus company FIRE BOMBED for research blogs
Are you still using TrueCrypt? Beware of these 2 critical flaws!
Aussie students set to hack cloud biz to hell
Raytheon: Ho hum, another day, another $1bn cyber-security contract with Uncle Sam
An Amazon employee became owner of Google.com for a few minutes
Point of view: Hacker Halted 2015
The mystery behind the Internet-of-Things vigilante malware
Apple CEO Tim Cook: Email keyword sniffing? Wed NEVER do that!
The Dridex Banking Malware is risen, British attention
A billion Android devices vulnerable to Stagefright 2.0 bugs
Experian Breach Spills Data on 15 Million T-Mobile Customers
Experian experiences T-Mobile data breach
Google Details Steps Taken to Disrupt Android Phishing Campaign
WordPress Jetpack Plugin Patched Against Stored XSS Vulnerability
Hand-cranked ‘DDoS’ floors Thai government website amid protests
Patreon crowdfunding site hacked and data leaked online
T-Mobile US hires someone other than bungling Experian to offer ID theft monitoring to hack victims
How to Freeze Credit Report To Protect Yourself Against Identity Theft
Scottrade data breach affects 4.6 Million Customers
US state police cars are vulnerable to cyberattack

Email address: Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.

Once again thank you!

Pierluigi Paganini

(Security Affairs – Newsletter, SecurityAffairs)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A flaw could allow recovery of the phone number associated with any Google account

A vulnerability could allow recovery of the phone number associated with a Google account by…

12 minutes ago

Texas Department of Transportation (TxDOT) data breach exposes 300,000 crash reports

Hackers breached Texas DOT (TxDOT), stealing 300,000 crash reports with personal data from its Crash…

11 hours ago

SAP June 2025 Security Patch Day fixed critical NetWeaver bug

SAP fixed a critical NetWeaver flaw that let attackers bypass authorization and escalate privileges. Patch…

14 hours ago

U.S. CISA adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws…

18 hours ago

Mirai botnets exploit Wazuh RCE, Akamai warned

Mirai botnets are exploiting CVE-2025-24016, a critical remote code execution flaw in Wazuh servers, Akamai…

21 hours ago

China-linked threat actor targeted +70 orgs worldwide, SentinelOne warns

China-linked threat actor targeted over 70 global organizations, including governments and media, in cyber-espionage attacks…

1 day ago