Listen

Description

Phishing 101: why depend on one suspicious message subject when you can use many

https://isc.sans.edu/forums/diary/Phishing+101+why+depend+on+one+suspicious+message+subject+when+you+can+use+many/27842/

PrintNightmare Fix Breaks Network Printing

https://www.bleepingcomputer.com/news/security/new-windows-security-updates-break-network-printing/

Malware Taking Advantage of Linux Subsystem for Windows

https://blog.lumen.com/no-longer-just-theory-black-lotus-labs-uncovers-linux-executables-deployed-as-stealth-windows-loaders/

Travis CI Patch

https://travis-ci.community/t/security-bulletin/12081

IBM System x IMM Vulnerability

https://support.lenovo.com/es/en/product_security/len-66347

Fake iTerm installing Malware on OS X

https://objective-see.com/blog/blog_0x66.html