- Updates on the Experian Data Leak
- Data from SA’s massive info breach is ‘on the internet’, Experian now admits [Business Insider SA]
- Data from Experian breach dumped on the Internet [Admire Moyot, ITWeb]
- Data breach: Experian identifies files, criminal case under investigation [Ernest Mabuza, Times Live]
- More Revelations Regarding Alleged Airtime Theft
- MTN security flaw allows “secret” airtime theft – Industry insider [MyBroadband]
- Big development in Vodacom airtime theft case [MyBroadband]
- An Insightful Article Regarding the State of South African Cyber Attacks
- Other Data Breaches and Leaks
- Unknown commercial entity blamed for NSW driver’s licence data breach [Rootdaemon]
- Details of millions of U.S. Voters leaked to Russia’s Dark Web forum [Pierluigi Paganini, Security Affairs]
- AusCERT says alleged DoE hack came from a third-party [Catalin Cimpanu, ZDNet]
- The Snowden Leaks Revisited
- NSA call records collection ruled illegal by US appeals court [Zack Whittaker, TechCrunch]
- The 2 Types of Insider Threat
- Are employees the weakest link in your security strategy? Train them! [Joyce Huang, TrendMicro]
- Ex-Cisco Employee Pleads Guilty to Deleting 16K Webex Teams Accounts [Lindsey O’Donnell, ThreatPost]
- Apple Notarized Malware
- Apple Signs Shlayer, Legitimizes Malware [Dark Reading]
- Apple-notarized malware foils macOS defenses [Zeljka Zorz, Help Net Security]
- Exploits in the Wild
- Hackers actively exploiting severe bug in over 300K WordPress sites [Sergiu Gatlan, Bleeping Computer]
- Hackers are backdooring QNAP NAS devices with 3-year old RCE bug [Sergiu Gatlan, Bleeping Computer]
- Attackers abuse Google DNS over HTTPS to download malware [Ax Sharma, Bleeping Computer]
- Cisco fixes critical code execution bug in Jabber for Windows [Sergiu Gatlan, Bleeping Computer]
- Microsoft Warns of New ‘Anubis’ Info-Stealer Distributed in the Wild [Eduard Kovacs, Security Week]
- Cetus: Cryptojacking Worm Targeting Docker Daemons [Aviv Sasson, Palo Alto Networks]
- Other (General)
- Can Vulnerability Scanning Replace Penetration Testing? [Waqas, HackRead]
- Hypothesis: Cyber Attackers Are After Your Scientific Research [Curtis Franklin Jr, Dark Reading]
- The Life Cycle of a Compromised (Cloud) Server [Bob McArdle, TrendMicro]
- Safe domain: How to protect your enterprise from DNS hijacking [Vincent D’Angelo, HelpNet Security]
C410 A2BE CB73 EF77 746E 9682 E2C4 91CE D20D 800F