homethehackernews.comFlaw in Elementor and Beaver Addons Let Anyone Hack WordPress SitesRussian Police Raided NGINX Moscow Office, Detained Co-FoundersNew Zeppelin Ransomware Targeting Tech and Health CompaniesNew PlunderVolt Attack Targets Intel SGX Enclaves by Tweaking CPU VoltageLatest Microsoft Update Patches New Windows 0-Day Under Active AttackAdobe Releases Patches for 'Likely Exploitable' Critical Vulnerabilitiessciencedaily.comStoring data in everyday objectsMobile devices blur work and personal privacy raising cyber risksNeed to safeguard drones and robotic cars against cyber attacksDesign flaw could open Bluetooth devices to hackingIn classical and quantum secure communication practical randomness is incompleteQuantum chip 1,000 times smaller than current setupswired.com5G Is More Secure Than 4G and 3G—Except When It’s Not15 Million Iranian Bank Accounts Were BreachedWhy Ring Doorbells Perfectly Exemplify the IoT Security CrisisToys “R” Us Is Back—Now With More Surveillance\!This Alleged Bitcoin Scam Looked a Lot Like a Pyramid SchemeVoltage Hacking, Big Tech's 'Green' Data Score Card, and More Newssecurityfocus.comVuln: Jenkins Credentials Binding Plugin CVE-2019-1010241 Information Disclosure VulnerabilityVuln: Qualcomm Components CVE-2019-2307 Integer Underflow VulnerabilityVuln: LibreOffice Remote Code Execution and Unauthorized Access VulnerabilitiesVuln: KDE KAuth CVE-2017-8422 Local Privilege Escalation VulnerabilityBugtraq: [SECURITY] [DSA 4269-1] postgresql-9.6 security updateBugtraq: [SECURITY] [DSA 4268-1] openjdk-8 security updatebleepingcomputer.comThe Week in Ransomware - December 13th 2019 - Data ExtortionNew Orleans Suffers Ransomware Attack, Emergency Services IntactAttackers Terrify Homeowners After Hacking Ring DevicesAttackers Steal Credit Cards in Rooster Teeth Data BreachApple to Fix Bug That Bypasses Communication Controls for KidsGoogle Now Bans Some Linux Web Browsers From Their Servicesitpro.co.ukNine tips to improve your disaster recovery strategyDead Netflix accounts reactivated by hackersSecurity flaws prevalent in applications produced by software vendorsHow to build an effective cyber resilience strategyGitGuardian, the security startup hunting down online secrets to keep companies safe from hackersAdobe discloses Magento Marketplace data breachcsoonline.comThe CSO guide to top security conferences, 20192020 cybersecurity trends: 9 threats to watchWhat it takes to become a CISOBest antivirus software: 12 top toolsHow to secure your DNS traffic under WindowsRemote hackers can modify CPU voltage to steal secrets from Intel SGX enclavesreddit.com/r/securityBest “Security for the Less Tech/Security Savvy” resources49% of workers, when forced to update their password, reuse the same one with just a minor changeEnabling Cloud Threat Defense with RedLock[QUESTION] How to encrypt my backups to store in the cloud ?Critical Bug in WordPress Plugins Open Sites to Hacker TakeoversWhat? Even Journalists Are Not Safe!reddit.com/r/netsecThe /r/netsec Monthly Discussion Thread - December 2019/r/netsec's Q4 2019 Information Security Hiring ThreadExploiting an out-of-bounds read/write on Chrome's v8Hack The Box - Smasher2 Write-up by 0xRickThe 2019 Holiday Hack Challenge - Elf UniversityWhat I Learned from Reverse Engineering Windows Containersreddit.com/r/websecSecure authentication using JWTExploiting TWIG SSTI with WAFHow Does IoT (Internet of Things) Security Relate to Web Security?What Type of SSL Certificate Does Your Website Actually Need?Ok Google! Please reveal everyone’s public calendar.reddit.com/r/InfoSecNewsNew Orleans hit by ransomware, US cities continues to be under attackMirai Variant ECHOBOT Resurfaces with 13 Previously Unexploited VulnerabilitiesRooster Teeth Productions suffered a payment card breachSEC Charges Shopin Founder with fraud over unregistered $42M ICOFlaws in Siemens SPPA-T3000 control system expose power plants to hackVISA warns of cyber attacks on PoS systems of fuel dispenser merchantskrebsonsecurity.comThe Great $50M African IP Address HeistPatch Tuesday, December 2019 EditionCISO MAG Honors KrebsOnSecurityRansomware at Colorado IT Provider Affects 100+ Dental OfficesApple Explains Mysterious iPhone 11 Location RequestsThe iPhone 11 Pro’s Location Data Puzzlerdarkreading.comVisa Warns of Targeted PoS Attacks on Gas Station Merchants'Motivating People Who Want the Struggle': Expert Advice on InfoSec LeadershipFortinet Buys CyberSponse for SOAR CapabilitiesEndpoint Protection: Dark Reading Caption Contest WinnersLessons Learned from 7 Big Breaches in 2019Android App Analysis Uncovers Seasonal Shopping Riskthreatpost.comGitLab Doles Out Half a Million Bucks to White HatsPairing Privacy and Security with Digital Identities in RetailElegant sLoad Carries Out Spying, Payload Delivery in BITSCritical Bug in WordPress Plugins Open Sites to Hacker TakeoversFIN8 Targets Card Data at Fuel PumpsCritical Remote Code-Execution Bugs Threaten Global Power Plantswelivesecurity.comWeek in security with Tony Anscombe2FA: Double down on your securityChrome now warns you if your password has been stolenData leak exposes 750,000 birth certificate applicationsCybersecurity Trends 2020: Technology is getting smarter – are we?5 scam prevention tips for seniorsscmagazine.comVisa warns against new POS attacks, Fin8 fingered as the culpritDread Zeppelin: Ransomware targets health care and IT sectors in U.S., EuropeMaze ransomware possibly behind Southwire attackA hard truth: The lessons we never learn during National Cybersecurity Awareness Month – but shouldMaze behind Pensacola ransomware attackhelpnetsecurity.comWeek in review: AD password reset best practices, new issue of (IN)SECUREThe importance of proactive patch managementNew infosec products of the week: December 13, 2019Will quantum computing overwhelm existing security tech in the near future?As malware and network attacks increase in 2019, zero day malware accounts for 50% of detectionstrendmicro.comThis Week in Security News: December Patch Tuesday Updates and Retail Cyberattacks Set to Soar 20 Percent During 2019 Holiday SeasonThis Week in Security News: Trend Micro Selected as Launch Partner for AWS Ingress Routing Service and Stalkerware on the RiseYou’re In Safe Hands with Trend Micro Home Network SecurityNetwork security simplified with Amazon VPC Ingress Routing and Trend MicroWhat Worries CISOs Most In 2019securityweek.comCyberattack on New Orleans City Computers Called 'Minimal'Iran Says It's Defused 2nd Cyberattack in Less Than a WeekLarge Hospital System Hit by Ransomware AttackCyberattack, Ransomware Hobbles New Orleans City GovernmentSuspected Cyberattack Hobbles New Orleans City Governmentsiliconrepublic.comNutanix‘s Wendy Pfeiffer: ‘CIOs are now more focused on business strategy’UK-US data sharing agreement to fight spread of child sex abuse imageryWhy 2020 will need more cybersecurity professionalsDBIC Ventures and EI launch €23m investment fund for Irish techDublin automation start-up Tines adds $11m to its Series A fundingnakedsecurity.sophos.comFacebook will target ads based on your Oculus VR dataYouTube bans malicious insults, veiled threats, harassmentJack Dorsey wants a decentralised TwitterWeak account checks earn company $10.5 million privacy fineFacebook refuses to break end-to-end encryptionsecurityintelligence.com RSS Error: This XML document is invalid, likely due to invalid characters. XML error: Reserved XML Name at line 2, column 39securityboulevard.comThe Top 20 Security Predictions for 2020DEF CON 27, Social Engineering Village, ‘Chris Kirsch’s ‘Psychic Cold Reading Techniques’XKCD, Timeline of the UniverseIdaptive Release 19.6 is Now AvailableDEF CON 27, Social Engineering Village, Chris Hadnagy’s ‘SEVillage 10 Year Anniversary: A Look Back’grahamcluley.comWaco water bill attack just the latest in a wave of Click2Gov breachesSmashing Security #158: The man behind The Missing Cryptoqueen1&1 Telecom GmbH hit by almost €10 million GDPR fine over poor security at call centre49% of workers, when forced to update their password, reuse the same one with just a minor changeSnatch ransomware reboots Windows in Safe Mode to bypass anti-virus protectioncyberdefensemagazine.comWhy Outsmart Cyber Attackers When You Can Remove Them Entirely?Visibility and Anomaly Detection in The Age of IotMicrosoft fixes CVE-2019-1458 Windows Zero-Day exploited in NK-Linked attacks2020 – The Year of The Weaponized InternetAdobe Offers CCF – an Open Source InfoSec Standard