- [Trend]The Russian Underground, Revisited
- [Sophos]SSCC 145 ? Zero-days x2, fixing Heartbleed x2, and security-by-design [PODCAST]
- [SecList]Blog: New Flash Player 0-day (CVE-2014-0515) used in watering-hole attacks
- [Technet]FansChoice.tv and Ooyala choose Microsoft to help them deliver content to anyone, on any device
- [ThreatPost]Windows XP Systems Also Get Out-of-Band IE Zero-Day Patch
- [ThreatPost]Facebook Enhances Privacy Settings with Anonymous Login
- [Eset]?Virus Shield? app is top-selling hit ? but does absolutely nothing
- [Trend]Internet Explorer Zero-Day Hits All Versions In Use
- [Sophos]Apple fixes hole that leaked employees? and developers? personal info
- [SecListe]Securmatica XXV.
- [FireEye]The FireEye Advanced Threat Report 2013: European Edition
- [SecList]Analysis: Spam report: March 2014
- [Technet]Weekend Reading: April 4th Edition ? Cortana coming to Windows Phone 8.1 and Microsoft creates a cloud portal
- [ThreatPost]Google Fixes XSS Flaw in Search Appliance
- [ThreatPost]Bug Bounties Expanding to Individual Developers
- [Eset]Two-thirds of parents spy ?regularly? on children?s social media accounts
- [Trend]AOL Mail Service Hacked, Compromised Emails Used To Send Spam
- [Sophos]Apple fixes hole that leaked employees' and developers' personal info
- [SecListe]CODEGATE 2014
- [SecList]Blog: Changing characters: something exotic in place of regular Latin script
- [Technet]Microsoft announces new cloud experience and tools to deliver the cloud without complexity
- [ThreatPost]Vishing Attacks Targeting Dozens of Banks
- [ThreatPost]Senate Draft Bill to Protect Threat Information Sharing
- [Eset]?Domestic spyware? apps increasingly precursor to violence ? or murder
- [Trend]Number of Sites Vulnerable to Heartbleed Plunges by Two-Thirds
- [Sophos]Big data can be used to discriminate, says government review
- [SecListe]New Flash Player 0-day (CVE-2014-0515) used in watering-hole attacks
- [FireEye]The FireEye Advanced Threat Report 2013: UK & Ireland Edition
- [FireEye]The Road to Resilience: How Cybersecurity is Moving from the Back Office to the Boardroom
- [SecList]Blog: CeCOS VIII - Hong Kong
- [Technet]Microsoft to developers at Build: You have the power
- [ThreatPost]Volume of NTP Amplification Attacks Getting Louder
- [ThreatPost]The White House and Zero Day Sleight of Hand
- [Eset]Surveillance cameras hijacked to mine Bitcoin while watching you
- [Trend]Cybercriminals Take Advantage Of Heartbleed With Spam
- [Sophos]Monday review - the hot 26 stories of the week
- [SecListe]Changing characters: something exotic in place of regular Latin script
- [FireEye]New Zero-Day Exploit targeting Internet Explorer Versions 9 through 11 Identified in Targeted Attacks
- [FireEye]Zero-Day Attacks are not the same as Zero-Day Vulnerabilities
- [SecList]Blog: Easter bunnies for all occasions
- [Technet]Microsoft unveils updates to Windows and Windows Phone at Build 2014
- [ThreatPost]Click-Fraud Sefnit Variant Shuns Tor for SSH
- [ThreatPost]Google Removes Bitcoin Mining Android Malware from Play
- [Eset]With just days to go, just how many PCs are still running Windows XP?
- [Trend]The Timely Tale of Tax-related Threat Troubles
- [Sophos]Microsoft acknowledges ?in the wild? Internet Explorer zero-day
- [SecListe]CeCOS VIII - Hong Kong
- [FireEye]NGOs: Fighting Human Rights Violations and, Now, Cyber Threat Groups
- [FireEye]If an Android Has a Heart, Does It Bleed?
- [SecList]Blog: An SMS Trojan with global ambitions