Unleash The Hash - ShadowHammer MAC Address List
https://skylightcyber.com/2019/03/28/unleash-the-hash-shadowhammer-mac-list/
https://skylightcyber.com/2019/03/28/unleash-the-hash-shadowhammer-mac-list/list.txt
https://skylightcyber.com/2019/03/28/unleash-the-hash-shadowhammer-mac-list/extended_list.txt

Zero-Day TP-Link SR20 Router Vulnerability Disclosed by Google Dev
https://www.bleepingcomputer.com/news/security/zero-day-tp-link-sr20-router-vulnerability-disclosed-by-google-dev/

Ironically, Phishing Kit Hosted on Nigerian Government Site
https://www.bleepingcomputer.com/news/security/ironically-phishing-kit-hosted-on-nigerian-government-site/

The perfect place for hosting that Malware. The Nigerian Scam is still very much alive.

Unpatched Zero-Days in Microsoft Edge and IE Browsers Disclosed Publicly
https://thehackernews.com/2019/03/microsoft-edge-ie-zero-days.html

When big fish get caught with big bait
https://blog.avast.com/millions-of-attacks-on-fake-iot-devices

Losing Face: Two More Cases of Third-Party Facebook App Data Exposure
https://www.upguard.com/breaches/facebook-user-data-leak

https://blog.avast.com/540m-facebook-records-exposed-on-amazon-servers

Fake Nike deal spreading on Facebook
https://blog.avast.com/how-to-identify-an-online-scam

Abuse of hidden “well-known” directory in HTTPS sites
https://www.zscaler.com/blogs/research/abuse-hidden-well-known-directory-https-sites

Hiding in Plain Sight
https://blog.talosintelligence.com/2019/04/hiding-in-plain-sight.html

I’m totally amazed at what goes on on these so called social networks. I have thought them suspect from day one and haven’t signed up to a single social networking site.

You’re a member of the Evangelists’ Corner Café so you at least subscribe to one of these social networks. :slight_smile: :slight_smile: :slight_smile:

Definitely not in the same league as these rogues. The other slightly different aspect, you can’t just join :wink:

Not any more. There was a time when posting enough nonsense earned you that right. :slight_smile:
We also need to realize that even the most careful person can have their information hacked simply by belonging
to a site or forum at the wrong time. If the site or forum are hacked, many times so is the information of those that belong to that forum.
We’ve all gone through that.

Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware
https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html

Big change in the plague of Blackmail, Sextortion Scam attempts
https://myonlinesecurity.co.uk/big-change-in-the-plague-of-blackmail-sextortion-scam-attempts/

Mobile Malware Analysis : Tricks used in Anubis
https://eybisi.run/Mobile-Malware-Analysis-Tricks-used-in-Anubis/

Tech support scams: Tips to protect yourself
https://blog.avast.com/tech-support-scams

The April 2019 Security Update Review
https://www.zerodayinitiative.com/blog/2019/4/9/the-april-2019-security-update-review