- [Sophos]Microsoft update breaks Calendar and Mail on Windows 10 phones
- [Trend]November Patch Tuesday Fixes Another Zero-Day Win32k Bug, Other Public Vulnerabilities
- [SecList]A new exploit for zero-day vulnerability CVE-2018-8589
- [chantal11]Windows 10 Insider Preview Build 18277 via Windows Update – canal Rapide
- [chantal11]Mise à jour cumulative KB4467708 – Windows 10 – version 1809
- [MMPC]CISO series: Lessons learned—4 priorities to achieve the largest security improvements
- [chantal11]La version 1809 – Windows 10 Octobre 2018 est de nouveau disponible
- [MMPC]The evolution of Microsoft Threat Protection, November update
- [kreb]That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards
- [Eset]Attackers exploit flaw in GDPR-themed WordPress plugin to hijack websites
- [Sophos]Google and Cloudfare traffic diverted to China… do we need to panic?
- [Sophos]WordPress GDPR compliance plugin hacked
- [Sophos]DEA and ICE hiding cameras in streetlights and traffic barrels
- [Eset]Malware of the 90s: Remembering the Michelangelo and Melissa viruses
- [Trend]Using Machine Learning to Cluster Malicious Network Flows From Gh0st RAT Variants
- [Sophos]Does wiping your iPhone count as destroying evidence?
- [AVAST]Avast Improves Phishing Detection | Avast
- [Sophos]How to fit all of Shakespeare in one tweet (and why not to do it!)
- [Sophos]Headmaster fired over cryptocoin mining on the school’s dime
- [Eset]Malware of the 90s: Remembering the Michelangelo and Melissa viruses
- [Sophos]Botnet pwns 100,000 routers using ancient security flaw
- [Eset]Google’s data charts path to avoiding malware on Android
- [Trend]Hide and Script: Inserted Malicious URLs within Office Documents’ Embedded Videos
- [Sophos]Terrorists told to hijack social media accounts to spread propaganda
- [Sophos]Microsoft mistake leaves Windows 10 users fuming
- [SecList]IT threat evolution Q3 2018. Statistics
- [SecList]IT threat evolution Q3 2018
- [Sophos]Monday review – the hot 21 stories of the week
- [Trend]Cryptocurrency Mining Malware uses Various Evasion Techniques, Including Windows Installer, as Part of its Routine
- [AVAST]How to choose the best password manager | Avast
- [AVAST]Hackers Target Bitcoins and USCYBERCOM Shares Malware | Avast
- [kreb]Bug Bounty Hunter Ran ISP Doxing Service
- [XMCO]Résumé de la semaine #45 (du 4 au 10 novembre)
- [Eset]US Air Force invites white hats to find hackable flaws, again
- [XMCO]De nouveaux dispositifs vont devoir remplacer le SMS pour sécuriser les paiements en ligne
- [Eset]Emotet launches major new spam campaign
- [Sophos]258,000 encrypted IronChat phone messages cracked by police
- [Eset]Week in security with Tony Anscombe
- [Sophos]Sent a photo to the wrong person? Facebook Messenger to let you unsend it
- [Eset]Week in security with Tony Anscombe
- [Sophos]Update now! WordPress sites vulnerable to WooCommerce plugin flaw
- [Sophos]DerpTrolling game server DDoS attacker pleads guilty
- [Eset]US Air Force invites white hats to find hackable flaws, again
- [MMPC]Attack uses malicious InPage document and outdated VLC media player to give attackers backdoor access to targets
- [Sophos]Apple 0, José 3 – Man versus Megacorp! [PODCAST]
- [Sophos]Ranting researcher publishes VM-busting zero-day without warning
- [Sophos]Closed doors are no match for a Wi‑Fi peeping tom and a smartphone
- [Eset]The cyber insurance question
- [Trend]Cryptocurrency Mining Malware uses Various Evasion Techniques, Including Windows Installer, as Part of its Routine
- [Sophos]Google warning: Fix your dodgy ads within 30 days or get banned