- [Sophos]Coinming frenzy is making it hard for us to find aliens
- [chantal11]Windows 10 Insider Preview Build 17101 via Windows Update – canal Rapide
- [Sophos]Watch our ads or we’ll use your CPU for cryptomining
- [Trend]February Patch Tuesday Is a Bouquet of Fixes for Privilege Escalation Vulnerabilities
- [Sophos]Watch our ads or we’ll use your CPU for cryptomining
- [Trend]Deciphering Confucius’ Cyberespionage Operations
- [Trend]New AndroRAT Exploits Dated Permanent Rooting Vulnerability, Allows Privilege Escalation
- [Sophos]Cryptojacking: the crooks get the money, but you pay the bill [PODCAST]
- [Trend]Attack Using Windows Installer msiexec.exe leads to LokiBot
- [Sophos]When crooks mine cryptocoins, but you pay [Naked Security Podcast 1]
- [MMPC]How artificial intelligence stopped an Emotet outbreak
- [Eset]Patch now! Microsoft fixes over 50 serious security flaws
- [Trend]Detecting New Threats via Contextual Information and Reputation
- [Sophos]Bitcoin mining to zap more energy than households in Iceland this year
- [Eset]How safe are you around your smart TV?
- [Trend]Malicious Chrome Extensions Found in Chrome Web Store, Form Droidclub Botnet
- [Sophos]New AI technology used by UK government to fight extremist content
- [Trend]Digital Extortion: A Forward-looking View
- [Sophos]Cryptocurrency startup LoopX exit scams with $4.5M in ICO
- [Trend]Hacking Group Spies on Android Users in India Using PoriewSpy
- [SecList]Bingo, Amigo! Jackpotting: ATM malware from Latin America to the World
- [Trend]Malvertising Campaign Abuses Google’s DoubleClick to Deliver Cryptocurrency Miners
- [Trend]Lazarus Campaign Targeting Cryptocurrencies Reveals Remote Controller Tool, an Evolved RATANKBA, and More
- [Trend]Understanding Motivations and Methods of Web Defacement
- [AVAST]Avast Android App Report reveals: These apps crush your phone’s battery
- [AVAST]Password leak on the dark web: 7 tips to strengthen your password security
- [kreb]Microsoft Patch Tuesday, February 2018 Edition
- [Sophos]Would you allow Facebook into your home?
- [Eset]Blockchain Hardened devices: Can they restore privacy with security by design?
- [Trend]Deciphering Confucius’ Cyberespionage Operations
- [Sophos]Did the NSA really use Twitter to send coded messages to a Russian?
- [Sophos]Facebook’s privacy settings are illegal, says court
- [Sophos]Beware the ‘celebrities’ offering you free cryptocoins on Twitter
- [SecList]Zero-day vulnerability in Telegram
- [Trend]New AndroRAT Exploits Dated Permanent Rooting Vulnerability, Allows Privilege Escalation
- [AVAST]Worried about net neutrality? Consider a VPN.
- [MMPC]Cyber resilience for the modern enterprise
- [XMCO][PATCH][ADOBE] Prise de contrôle via 2 vulnérabilités au sein d’Adobe Flash Player (APSB18-03)
- [Eset]US and UK government websites hijacked to mine cryptocurrency on visitors’ machines
- [Sophos]Google-Nest merger reawakens privacy worries
- [Sophos]You have five months to switch your website to HTTPS
- [kreb]Domain Theft Strands Thousands of Web Sites
- [Sophos]Facebook is not testing a dislike button, except for the one it’s testing
- [Eset]All HTTP websites to soon be marked as “not secure” by Google Chrome
- [Sophos]Monday review – the hot 25 stories of the week
- [Sophos]Cryptomining script poisons government websites – What to do
- [FireEye]ReelPhish: A Real-Time Two-Factor Phishing Tool
- [FireEye]Microsoft Office Vulnerabilities Used to Distribute Zyklon Malware in
Recent Campaign
- [Sophos]Winter Olympics network outages blamed on unexplained cyberhack
- [FireEye]Trojan.APT.Seinup Hitting ASEAN