VECTOR NEWS - Web-Security News Items
Eavesdropping on Phone Taps from Voice Assistants
Russian State-Sponsored Actors Exploiting Vulnerability in VMWare Workspace ONE Access Using Compromised Credentials
NSA on (Solar Winds Related) Authentication Hacks
How China Uses Stolen US Personnel Data
Government Assessment of Solar Winds Breach
FireEye Discovers Solar Winds Breach While Researching Internal Compromised Systems
Microsoft Scrutinized for Role in Solar Winds Breach
Adobe Flash Support Terminated
Zero Logon Vulnerability Exposes Windows Domain Controllers to Ransomware Attacks
Cyberattacks Targeting Triconex Industrial Control Systems' Legacy Flaws - Private Critical Infrastructure Response Weak - Warns NSA, Homeland Security
All the Ways Your Wi-Fi Router Can Spy on You
Digital Shadows Weekly Podcast Roundup Discusses Ransomware Landscape
Understanding NIST SP 800-207 - Zero Trust Security Architecture for Industrial Control Settings
International Maritime Organization Hacked
Wordpress Flaw Leverages Zerologon to attack Domain Controllers
HEH Botnet Wipes/Bricks Devices
Kraken Fileless Attack Exploits Windows Error Reporting
Attack of the Coffee Makers... lol
Chinese hackers have stolen information from Spanish laboratories working on a vaccine for COVID19, El Pais newspaper revealed
US DoJ charges Iranian hackers for attacks on US satellite companies
Russian Actors Use Fake N.A.T.O. Credentials to Hack Foreign Governments
Brighter Bulbs on the Amazon Christmas Tree - Drivers Hacking Trees for Better Routes
Who's Watching YOUR Six? Cryptocurrency Fraud By Russian Hackers..
What's the Fight Really About? U.S. Economic Warfare and Likely Foreign Defenses
The Real Scoop on Five Eyes, Nine Eyes, and 14 Eyes Surveillance Alliances
California Court Issues Chilling Ruling Concerning CFAA (Computer Fraud and Abuse Act)
Are VPN's Lying About Logs?
Homeland Security Spying on Journalists Reporting on Portland Protests
Threat Intel Feed Summary from Digital Shadows
Digital Shadows Reviews Threat Model of the Remote Worker
Zero Trust - My Paradigm Exactly - U.S. Navy Finally Graduates to the Pros
Another Zero-Day from hacktress sandboxescaper!!
Hackers Weaponizing AI
US Cyberconference AI Malware Discussion
AI Malware Considered
Business Bigwigs Fear Hackers with AI Tools
AI Malware with Superpowers...lol
LATEST NEWS ON JULIAN ASSANGE FROM BRITAIN'S "Independent"
Excellent Review of Current State of Cyberwarfare
Japanese Cybercrime Underground On The Rise
OOOhhh.... Hexane Moves In for the Big Kill...
Captital One Data Breach...Unknown if This Data Was Actually Leaked!
Court Blabs About NSA Hacking of Foreign Governments... Then Jails Contractor for Hacking NSA
Wired Magazine takes a look at Hacker Group APT32, aka OceanLotus
Trump Orders Cyberattack Against Iranian Missile Sites
Triada Backdoor to Root Control Built Into Android Devices at Factories
Hacker GnosticPlayers: Passwords for Sale
Hackers Get Hacked! (It's About Time....)
Assange Charged in U.S.
Intezer Gets The Scoop on Hidden Wasp Linux Malware
Germany Demands an End to Working Cryptography
China APT Activity Review from US-CERT.gov
Great Scholarly Contribution from bunnie and Ed (Snowden) on Hardware Vulnerability Mitigation
Thangrycat Harware Vulnerability Compromises Cisco Trustchain at it's Root
SeedWorm APT fortifies BlackWater phishing campaign with clever anti-detection methods
Israel Responds to Hamas Cyber Attack with Lethal Military Force
(YOUR) Instagram Private Data Dumped on Public Database
Stack OVerflow's Production Servers Hacked!
Mystery Hackers Hit MegaRich Corporations
China-linked Cyber Espionage Group Targets Naval Adversaries
Israeli Prime Minister Lead Challenging Candidate Hacked By Iranian Intelligence
SimBad Malware Spreading Via Google Play Store
NSA Hacks American Router Hardware
NSA's "Boundless Informant"
Thomas Drake Comments on PRISM
Der Speigel: NSA mass surveillance of German citizens
Researchers at Microsoft warn of damages caused by cyber operations conducted by Iran-linked cyberespionage groups.
Modular Cryptojacking malware uses worm abilities to spread
(UPDATED):DoD CyberSecurity Report Summary 2017-2018
Wikileaks Dictionary of Military Terminology
The NSA's Plan to own the Internet
Advance Persistent Threat (APT) News Blog
Great Cybercrime News Blog
Click Here to Kill Everybody
(Messy) Link Archive -- Stay Tuned