Hacking, AppSec, and Bug Bounty newsletter
2018-09-05 | If the TTPs fit, NIST kicks off privacy framework discussion, and The URL is so 1999
Wednesday, September 5
If the TTP’s fit: IBM’s X-Force IRIS says FIN6 group is using the FrameworkPOS and GratefulPOS malware to harvest payment card data from point-of-sale (POS) systems in 2017 and 2018.
TWEET OF THE DAY
It is crazy that the cutting-edge approach to computer security is to build isolated virtual environments to contain other isolated virtual environments that contain still more isolated virtual environments. - @matthew_d_green
OTHER ARTICLES WE’RE READING
Google: The URL is so 1999.
Hey, you’re not the CEO, be gone. Senate committee not happy that Google tried to send a top lawyer, instead of Larry or Sundar to today’s hearing.
CrowdStrike report links APT10, aka Stone Panda, with MSS, China’s equivalent of the NSA
Email security for campaigns not improved says Maciej Ceglowski in a Washington Post article.
mSpy data leak, part 2: reported by Brian Krebs
Those Chrome extensions though: Mega.nz steals passwords and cryptocurrency private keys reports ZDNet.
NIST kicking off discussion on a privacy framework
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: email@example.com
“When it comes to cyber, the job of diplomats is to prevent war and conclude peace."
David Martinon, France’s ambassador for digital affairs