E6F5 4D49 5B3F 4783 DEF1 1494 6199 BFDA 457D 1C5F

  1. Zim hacker granted bail to attend Swiss hackathon [Samuel Mungadze, IT Web]
  2. Swiss Govt Says Ransomware Victims Ignored Warnings, Had Poor Security [Sergiu Gatlan, Bleeping Computer]
    - see also: Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
  3. 8.4 million: Number of DDoS attacks researchers saw last year alone [Help Net Security]
  4. 5 Strategies to Secure Cloud Operations Against Today’s Cyber Threats [Chris Christou and Brad Beaulieu, Dark Reading]
  5. Admins beware! Microsoft gives heads-up for ‘disruptive’ changes to authentication in Office 365 email service [Tim Anderson, The Register]
  6. Are CISOs ready for zero trust architectures? [Vladimir Jirasek, Foresight Cyber / Help Net Security]
    - see also: To Rank or Not to Rank Should Never Be a Question
  7. Top 10 web hacking techniques of 2019 [James Kettle, PortSwigger Research]
  8. Whodat? Enumerating Who “owns” a Workstation for IR [Rob VandenBrink, SANS ISC]
  9. The Ecosystem of Phishing: From Minnows to Marlins [Photon Research Team / Digital Shadows]
  10. Up close and personal with Linux malware [Tomáš Foltýn, WeLiveSecurity / ESET]
    - see also: The Linux Foundation identifies most important open-source software components and their problems
  11. Cybersecurity alliance launches first open source messaging framework for security tools [Charlie Osborne, Zero Day]
  12. New Mozart Malware Gets Commands, Hides Traffic Using DNS [Lawrence Abrams, Bleeping Computer]
  13. Is your phone listening to you? [Jake Moore, WeLiveSecurity / ESET]]
  14. Data Encryption on Android with Jetpack Security [Jon Markoff, Google Security Blog]
  15. Jon Callas: Encryption is a technology that rearranges power [Mirko Zorz, Help Net Security]