Theoretical technique to abuse EMV cards detected used in the real world
https://www.zdnet.com/article/theoretical-technique-to-abuse-emv-cards-detected-used-in-the-real-world/#ftag=RSSbaffb68
https://www.zdnet.com/article/theoretical-technique-to-abuse-emv-cards-detected-used-in-the-real-world/#ftag=RSSbaffb68
https://www.zdnet.com/article/multiple-tor-security-issues-disclosed-more-to-come/#ftag=RSSbaffb68
https://www.webroot.com/blog/2020/07/30/cyber-news-rundown-wastelocker-ransomware/
https://www.darkreading.com/threat-intelligence/dark-web-travel-fraudsters-left-hurting-from-lockdowns/d/d-id/1338505?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
https://www.darkreading.com/careers-and-people/5-tips-for-optimizing-your-companys-cyber-crisis-preparedness/a/d-id/1338452?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
https://www.zdnet.com/article/eu-sanctions-china-russia-and-north-korea-for-past-hacks/#ftag=RSSbaffb68
https://www.techrepublic.com/article/how-to-add-fingerprint-authentication-to-your-windows-10-computer/#ftag=RSS56d97e7
https://krebsonsecurity.com/2020/07/is-your-chip-card-secure-much-depends-on-where-you-bank/
https://www.darkreading.com/attacks-breaches/using-the-attack-cycle-to-up-your-security-game/a/d-id/1338434?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
https://www.darkreading.com/attacks-breaches/black-hat-virtually-an-important-time-to-come-together-as-a-community/a/d-id/1338478?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple