05/17

Hacker and Ransomware Designer Charged for Use and Sale of Ransomware, and Profit Sharing Arrangements with Cybercriminals | USAO-EDNY | Department of Justice

https://www.justice.gov/usao-edny/pr/hacker-and-ransomware-designer-charged-use-and-sale-ransomware-and-profit-sharing
Hacker and Ransomware Designer Charged for Use and Sale of Ransomware, and Profit Sharing Arrangements with Cybercriminals | USAO-EDNY | Department of Justice

http://go.usa.gov/xutwJ

http://go.usa.gov/xutwJ

Hacking Swagger-UI - from XSS to account takeovers

https://www.vidocsecurity.com/blog/hacking-swagger-ui-from-xss-to-account-takeovers/#newsletter
Hacking Swagger-UI - from XSS to account takeovers

Nighthawk 0.2 - Catch Us If you Can - MDSec

https://www.mdsec.co.uk/2022/05/nighthawk-0-2-catch-us-if-you-can/
Nighthawk 0.2 - Catch Us If you Can - MDSec

NSA, Allies Issue Cybersecurity Advisory on Weaknesses that Allow Initial Access > National Security Agency/Central Security Service > Article

https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3033563/nsa-allies-issue-cybersecurity-advisory-on-weaknesses-that-allow-initial-access/
NSA, Allies Issue Cybersecurity Advisory on Weaknesses that Allow Initial Access > National Security Agency/Central Security Service > Article

Data Marketplace Selling Info About Who Uses Period Tracking Apps

https://www.vice.com/en/article/v7d9zd/data-marketplace-selling-clue-period-tracking-data
Data Marketplace Selling Info About Who Uses Period Tracking Apps

CVE-2022-22675: AppleAVD Overflow in AVC_RBSP::parseHRD | 0-days In-the-Wild

https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2022/CVE-2022-22675.html
CVE-2022-22675: AppleAVD Overflow in AVC_RBSP::parseHRD | 0-days In-the-Wild

Blackhoodie at ReCon 2022 - Blackhoodie

https://blackhoodie.re/ReCon_Montreal/
Blackhoodie at ReCon 2022 - Blackhoodie

Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks – NCC Group Research

https://research.nccgroup.com/2022/05/15/technical-advisory-tesla-ble-phone-as-a-key-passive-entry-vulnerable-to-relay-attacks/
Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks – NCC Group Research

Mapping MITRE ATT&CK with Window Event Log IDs - Security Investigation

https://www.socinvestigation.com/mapping-mitre-attck-with-window-event-log-ids/
Mapping MITRE ATT&CK with Window Event Log IDs - Security Investigation

Fake Mobile Apps Steal Facebook Credentials, Cryptocurrency-Related Keys

https://www.trendmicro.com/en_us/research/22/e/fake-mobile-apps-steal-facebook-credentials--crypto-related-keys.html
Fake Mobile Apps Steal Facebook Credentials, Cryptocurrency-Related Keys

Hackers can steal your Tesla Model 3, Y using new Bluetooth attack

https://www.bleepingcomputer.com/news/security/hackers-can-steal-your-tesla-model-3-y-using-new-bluetooth-attack/
Hackers can steal your Tesla Model 3, Y using new Bluetooth attack

ICCL report on the scale of Real-Time Bidding data broadcasts in the U.S. and Europe - Irish Council for Civil Liberties

https://www.iccl.ie/digital-data/iccl-report-on-the-scale-of-real-time-bidding-data-broadcasts-in-the-u-s-and-europe/
ICCL report on the scale of Real-Time Bidding data broadcasts in the U.S. and Europe - Irish Council for Civil Liberties

UpdateAgent Returns with New macOS Malware Dropper Written in Swift

https://thehackernews.com/2022/05/updateagent-returns-with-new-macos.html
UpdateAgent Returns with New macOS Malware Dropper Written in Swift

New Sysrv Botnet Variant Hijacking Windows and Linux with Crypto Miners

https://thehackernews.com/2022/05/new-sysrv-botnet-variant-hijacking.html
New Sysrv Botnet Variant Hijacking Windows and Linux with Crypto Miners

The invaders destroyed the National Gene Bank of Plants of Ukraine | odessa-journal.com

https://odessa-journal.com/the-invaders-destroyed-the-national-gene-bank-of-plants-of-ukraine/
The invaders destroyed the National Gene Bank of Plants of Ukraine | odessa-journal.com