- [ThreatPost]Microsoft Responds to IE Zero Day Used in CFR Watering Hole Attack
- [ThreatPost]Tool Aids in Cracking Mysterious Gauss Malware Encryption
- [Trend]What Kind of Targeted Attacks Will We See in 2013?
- [ThreatPost]Council on Foreign Relations Website Hit by Watering Hole Attack, IE Zero-Day Exploit
- [ThreatPost]Nvidia Display Driver Service Attack Escalates Privileges on Windows Machines
- [Eset]Phishing and the Smile on the Face of the Tiger
- [MMPC]Update signature definitions to resolve performance issues in definitions starting with 1.141.2400.0
- [Krebs] Exploring the Market for Stolen Passwords
- [Krebs] Attackers Target Internet Explorer Zero-Day Flaw
- [Malekal] Phishing via un ransomware Hadopi
- [SecList]Descriptions: Trojan-Downloader.Win32.Genome.bxzy
- [SecList]Descriptions: Trojan-Downloader.Win32.VB.ahql
- [SecList]Descriptions: Trojan-Downloader.Win32.Agent.gdmw
- [SecList]Descriptions: Trojan-Downloader.Java.Agent.mm
- [SecList]Descriptions: Exploit.JS.Agent.bgz
- [SecList]Descriptions: Trojan-Downloader.JS.Agent.egv
- [SecList]Descriptions: Trojan-Downloader.Java.Agent.kj
- [SecList]Descriptions: Trojan-Downloader.HTML.Agent.wp
- [SecList]Descriptions: Trojan.Win32.Reboot.h
- [SecList]Descriptions: Trojan.VBS.StartPage.hw
- [SecList]Blog: Malware in the Amazon App Store
- [Trend]Mobile Ad Networks: How Do They Operate?
- [SecList]Descriptions: Trojan.BAT.KillWin.gh
- [Technet]Daily Update, Dec. 21st ? More Must-Have Apps and Special Holiday Offers
- [Trend]The Trends in Targeted Attacks of 2012
- [SecList]Descriptions: Trojan.BAT.KillWin.gg
- [Technet]Weekend Reading: Dec. 21st Edition ? Bing Puts the Spotlight on Images, Xbox Windows Phone Favorites on Sale and the Year in Review on MSN
- [Trend]Backdoor Disguised as Java Server Page Targets Web-hosting Servers
- [SecList]Descriptions: Trojan-Downloader.HTML.Agent.ry
- [Technet]Daily Update, Dec. 20th ? On the First Day of Christmas, the Windows Store Gave to Me?Twelve Apps for the Holidays
- [Trend]New Gadget + the Internet = New Threat
- [SecList]Analysis: Spam in November 2012
- [Technet]Daily Update, Dec. 19th ? Better Watch Out, Better Not Cry? Microsoft Works with NORAD to Track Santa on Christmas Eve
- [Trend][INFOGRAPHIC] Windows 8 Steps Up with Security Features
- [SecList]Descriptions: Exploit.Win32.Pidief.ddn
- [Technet]The Midweek Download: Dec. 19th Edition ? Microsoft Researcher Makes Forbes Magazine?s 30 Under 30 List
- [ThreatPost]Senate Reauthorizes FISA, Rejects Proposed Privacy Amendments
- [ThreatPost]Changes to Mozilla Security Program Foster Open Source Security Tool Development
- [Trend]New Police Ransomware Claims Fake Treaty Among AV Vendors and Police
- [SecList]Analysis: Kaspersky Security Bulletin 2012. Cyber Weapons
- [Technet]Daily Update, Dec. 18th ? Check Out these Slick New Windows 8 Pro Devices
- [ThreatPost]Regulator Warns Banks About DDoS Attacks, Encourages Information Sharing
- [ThreatPost]WordPress W3 Total Cache Misconfiguration Leaves Some Blogs Vulnerable
- [Trend][Infographic] Unwrapping Mobile Security During the Holidays
- [SecList]Blog: GrooveMonitor: Another Wiper Copycat?
- [Technet]Daily Update, Dec. 17th ? Introducing New Xbox SmartGlass Experiences for Sports Fans
- [ThreatPost]Nvidia Display Driver Service Attack Escalates Privileges on Windows Machines
- [ThreatPost]University of Michigan Health Systems Admits Patient Data Stolen
- [Trend]Infostealer Dexter Targets Checkout Systems
- [SecList]Descriptions: Exploit.JS.Pdfka.egr