Emsisoft Decryptor for HildaCrypt
https://www.emsisoft.com/ransomware-decryption-tools/hildacrypt

Emsisoft Decryptor for Muhstik
https://www.emsisoft.com/ransomware-decryption-tools/muhstik

The October Security Update Review
https://www.zerodayinitiative.com/blog/2019/10/8/the-october-security-update-review

SafeBreach Discovers New Critical Vulnerability In HP Touchpoint Analytics
https://safebreach.com/Post/SafeBreach-Discovers-New-Critical-Vulnerability-In-HP-Touchpoint-Analytics
https://safebreach.com/Post/HP-Touchpoint-Analytics-DLL-Search-Order-Hijacking-Potential-Abuses-CVE-2019-6333

Apple Zero-Day Exploited in New BitPaymer Campaign
https://blog.morphisec.com/apple-zero-day-exploited-in-bitpaymer-campaign

DNS-over-HTTPS causes more problems than it solves, experts say
https://www.zdnet.com/article/dns-over-https-causes-more-problems-than-it-solves-experts-say/

Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices
https://www.princeton.edu/~pmittal/publications/tv-tracking-ccs19.pdf

Vulnerability Spotlight: Multiple remote code execution bugs in NitroPDF
https://blog.talosintelligence.com/2019/10/vuln-spotlight-Nitro-PDF-RCE-bugs-sept-19.html

OnionShare 2 now enables users to put anonymous websites online.
Websites that cannot be censored.
https://blog.torproject.org/new-version-onionshare-makes-it-easy-anyone-publish-anonymous-uncensorable-websites-0

Not encouraging anyone to do this, but good to know about it,
as there are ‘certain parties’ that frown upon the use of tor and related services to say the least.

polonus

Analysis-Report “Study the Great Nation” 08.-09.2019
https://cure53.de/analysis_report_sgn.pdf

OSX/Shlayer new Shurprise… unveiling OSX/Tarmac
https://blog.confiant.com/osx-shlayer-new-shurprise-unveiling-osx-tarmac-f965a32de887

Malicious Payloads - Hiding Beneath the WAV
https://threatvector.cylance.com/en_us/home/malicious-payloads-hiding-beneath-the-wav.html

Cryptocurrency Miners Now Using Evasive Tactics to Exploit Airport Resources
https://www.cyberbit.com/blog/endpoint-security/cryptocurrency-miners-exploit-airport-resources/

Operation Ghost: The Dukes aren’t back – they never left
https://www.welivesecurity.com/2019/10/17/operation-ghost-dukes-never-left/
https://www.welivesecurity.com/wp-content/uploads/2019/10/ESET_Operation_Ghost_Dukes.pdf

Fake UpdraftPlus Plugins
https://blog.sucuri.net/2019/10/fake-updraftplus-plugins.html

Smart Spies: Alexa and Google Home expose users to vishing and eavesdropping
https://srlabs.de/bites/smart-spies/

Ha and they are only getting wise to this, what the hell took so long.

Recently in the papers, it suggested would you be required to warn visitors that you have one of these devices as they constantly monitor. Just turn the damn things off.

Avast fights off cyber-espionage attempt, Abiss
https://blog.avast.com/ccleaner-fights-off-cyberespionage-attempt-abiss

Hacking the hackers: Russian group hijacked Iranian spying operation, officials say
https://www.reuters.com/article/us-russia-cyber/hacking-the-hackers-russian-group-hijacked-iranian-spying-operation-officials-say-idUSKBN1X00AK

Does it really matter which bad actor is doing the hacking? :slight_smile: