What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
SecurityAffairs.webp 2022-06-02 17:09:12 Conti leaked chats confirm that the gang\'s ability to conduct firmware-based attacks (lien direct) The analysis of the internal chats of the Conti ransomware group revealed the gang was working on firmware attack techniques. The analysis of Conti group’s chats, which were leaked earlier this year, revealed that the ransomware gang has been working on firmware attack techniques. An attack against firmware could give threat actors significant powers, they are hard to […] Ransomware Threat
SecurityAffairs.webp 2022-05-31 14:28:17 SideWinder carried out over 1,000 attacks since April 2020 (lien direct) >SideWinder, an aggressive APT group, is believed to have carried out over 1,000 attacks since April 2020, Kaspersky reported. Researchers from Kaspersky have analyzed the activity of an aggressive threat actor tracked as SideWinder (aka RattleSnake and T-APT-04). The group stands out for the high frequency and persistence of its attacks, researchers believe that the […] Threat APT-C-17
SecurityAffairs.webp 2022-05-30 14:49:23 A new WhatsApp OTP scam could allow the hijacking of users\' accounts (lien direct) Experts warn of a new ongoing WhatsApp OTP scam that could allow attackers to hijack users' accounts through phone calls. Recently CloudSEK founder Rahul Sasi warned of an ongoing WhatsApp OTP scam that could allow threat actors to hijack users' accounts through phone calls. The fraudulent scheme is simple, threat actors make a phone call […] Threat
SecurityAffairs.webp 2022-05-30 11:20:08 GoodWill Ransomware victims have to perform socially driven activities to decryption their data (lien direct) >Researchers discovered a new ransomware family called GoodWill that asks victims to donate the ransom for social causes. CloudSEK's Threat Intelligence Research team has disclosed a new ransomware strain called GoodWill, that demands victims the payment of a ransom through donations for social causes and financially helping people in need. “The ransomware group propagates very unusual demands in […] Ransomware Threat ★★★
SecurityAffairs.webp 2022-05-28 15:55:27 Experts believe that Russian Gamaredon APT could fuel a new round of DDoS attacks (lien direct) >360 Qihoo reported DDoS attacks launched by APT-C-53 (aka Gamaredon) conducted through the open-source DDoS Trojan program LOIC. Researchers at 360 Qihoo observed a wave of DDoS attacks launched by Russia-linked APT-C-53 (aka Gamaredon) and reported that the threat actors also released as open-source the code of a DDoS Trojan called LOIC. The instances of the malware spotted by the experts […] Malware Threat
SecurityAffairs.webp 2022-05-28 13:30:21 Reuters: Russia-linked APT behind Brexit leak website (lien direct) >Russia-linked threat actors are behind a new website that published leaked emails from leading proponents of Britain’s exit from the EU, the Reuters reported. According to a Google cybersecurity official and the former head of UK foreign intelligence, the “Very English Coop d’Etat” website was set up to publish private emails from Brexit supporters, including […] Threat Guideline
SecurityAffairs.webp 2022-05-28 11:01:18 GitHub: Nearly 100,000 NPM Users\' credentials stolen in the April OAuth token attack (lien direct) GitHub provided additional details into the theft of its integration OAuth tokens that occurred in April, with nearly 100,000 NPM users’ credentials. GitHub provided additional details about the incident that suffered in April, the attackers were able to steal nearly 100K NPM users’ credentials. In April, GitHub uncovered threat actors using stolen OAuth user tokens to gain […] Threat
SecurityAffairs.webp 2022-05-27 13:22:16 FBI: Compromised US academic credentials available on various cybercrime forums (lien direct) >The FBI warns organizations in the higher education sector of credentials sold on cybercrime forums that can allow threat actors to access their networks. The FBI issued an alert to inform the higher education sector about the availability of login credentials on dark web forums that can be used by threat actors to launch attacks […] Threat
SecurityAffairs.webp 2022-05-27 05:58:22 Experts released PoC exploit code for critical VMware CVE-2022-22972 flaw (lien direct) >Security researchers released PoC exploit code for the critical authentication bypass vulnerability CVE-2022-22972 affecting multiple VMware products. Horizon3 security researchers have released a proof-of-concept (PoC) exploit and technical analysis for the critical authentication bypass vulnerability CVE-2022-22972 affecting multiple VMware products. The virtualization giant recently warned that a threat actor can exploit the CVE-2022-22972 flaw (CVSSv3 base score of 9.8) […] Vulnerability Threat
SecurityAffairs.webp 2022-05-26 20:40:28 Exposed: the threat actors who are poisoning Facebook (lien direct) >An investigation of the infamous “Is That You?” video scam led Cybernews researchers into exposing threat actors who are poisoning Facebook Original post @ https://cybernews.com/security/exposed-the-threat-actors-who-are-poisoning-facebook/ An investigation of the infamous “Is That You?” video scam has led Cybernews researchers to a cybercriminal stronghold, from which threat actors have been infecting the social media giant with […] Threat
SecurityAffairs.webp 2022-05-26 09:13:55 Italy announced its National Cybersecurity Strategy 2022/26 (lien direct) >Italy announced its National Cybersecurity Strategy for 2022/26, a crucial document to address cyber threats and increase the resilience of the country. Italy presented its National Cybersecurity Strategy for 2022/26 and reinforce the government’s commitment to addressing cyber threats and increasing the resilience of the country to cyber attacks. The strategy is aligned with the […] Threat
SecurityAffairs.webp 2022-05-25 22:36:59 Unknown APT group is targeting Russian government entities (lien direct) >An unknown APT group is targeting Russian government entities since the beginning of the Russian invasion of Ukraine. Researchers from Malwarebytes observed an unknown Advanced Persistent Threat (APT) group targeting Russian government entities with at least four separate spear-phishing campaigns since the beginning of the Russian invasion of Ukraine. The threat actors behind the attacks […] Threat
SecurityAffairs.webp 2022-05-24 18:18:56 Trend Micro addressed a flaw exploited by China-linked Moshen Dragon APT (lien direct) >Trend Micro addressed a DLL hijacking issue in Trend Micro Security actively exploited by a China-linked threat group to deploy malware. Trend Micro addressed a DLL hijacking flaw in Trend Micro Security that a China-linked threat actor actively exploited to deploy malware. In early May, SentinelOne researchers observed a China-linked APT group, tracked as Moshen […] Threat
SecurityAffairs.webp 2022-05-24 13:16:01 Microsoft warns of new highly evasive web skimming campaigns (lien direct) >Threat actors behind web skimming campaigns are using malicious JavaScript to mimic Google Analytics and Meta Pixel scripts to avoid detection. Microsoft security researchers recently observed web skimming campaigns that used multiple obfuscation techniques to avoid detection. The threat actors obfuscated the skimming script by encoding it in PHP, which, in turn, was embedded in […] Threat
SecurityAffairs.webp 2022-05-23 22:03:19 Russia-linked Turla APT targets Austria, Estonia, and NATO platform (lien direct) >Russia-linked APT group Turla was observed targeting the Austrian Economic Chamber, a NATO eLearning platform, and the Baltic Defense College. Researchers from SEKOIA.IO Threat & Detection Research (TDR) team have uncovered a reconnaissance and espionage campaign conducted by Russia-linked Turla APT aimed at the Baltic Defense College, the Austrian Economic Chamber (involved in government decision-making such as economic sanctions) and NATO's […] Threat
SecurityAffairs.webp 2022-05-23 17:17:24 Russia-linked Fronton botnet could run disinformation campaigns (lien direct) >Researchers warn that the Fronton botnet was used by Russia-linked threat actors for coordinated disinformation campaigns. Fronton is a distributed denial-of-service (DDoS) botnet that was used by Russia-linked threat actors for coordinated disinformation campaigns. In March 2020, the collective of hacktivists called “Digital Revolution” claimed to have hacked a subcontractor to the Russian FSB. The […] Threat
SecurityAffairs.webp 2022-05-23 09:04:29 Cytrox\'s Predator spyware used zero-day exploits in 3 campaigns (lien direct) Google’s Threat Analysis Group (TAG) uncovered campaigns targeting Android users with five zero-day vulnerabilities. Google’s Threat Analysis Group (TAG) researchers discovered three campaigns, between August and October 2021, targeting Android users with five zero-day vulnerabilities. The attacks aimed at installing the surveillance spyware Predator, developed by the North Macedonian firm Cytrox. The five 0-day vulnerabilities […] Threat
SecurityAffairs.webp 2022-05-23 06:56:23 Threat actors target the infoSec community with fake PoC exploits (lien direct) >Researchers uncovered a malware campaign targeting the infoSec community with fake Proof Of Concept to deliver a Cobalt Strike beacon. Researchers from threat intelligence firm Cyble uncovered a malware campaign targeting the infoSec community. The expert discovered a post where a researcher were sharing a fake Proof of Concept (POC) exploit code for an RPC Runtime Library […] Malware Threat
SecurityAffairs.webp 2022-05-22 15:48:25 North Korea-linked Lazarus APT uses Log4J to target VMware servers (lien direct) >North Korea-linked Lazarus APT is exploiting the Log4J remote code execution (RCE) in attacks aimed at VMware Horizon servers. North Korea-linked group Lazarus is exploiting the Log4J RCE vulnerability (CVE-2021-44228) to compromise VMware Horizon servers. Multiple threat actors are exploiting this flaw since January, in January VMware urged customers to patch critical Log4j security vulnerabilities impacting Internet-exposed […] Vulnerability Threat APT 38
SecurityAffairs.webp 2022-05-21 11:14:50 Cisco fixes an IOS XR flaw actively exploited in the wild (lien direct) >Cisco addressed a medium-severity vulnerability affecting IOS XR Software, the company warns that the flaw is actively exploited in the wild. Cisco released security updates to address a medium-severity vulnerability affecting IOS XR Software, tracked as CVE-2022-20821 (CVSS score: 6.5), that threat actors are actively exploiting in attacks in the wild. The flaw resides in […] Vulnerability Threat
SecurityAffairs.webp 2022-05-20 14:36:00 The activity of the Linux XorDdos bot increased by 254% over the last six months (lien direct) >Microsoft researchers have observed a spike in the activity of the Linux bot XorDdos over the last six months. XORDDoS, also known as XOR.DDoS, first appeared in the threat landscape in 2014 it is a Linux Botnet that was employed in attacks against gaming and education websites with massive DDoS attacks that reached 150 gigabytes per second […] Threat
SecurityAffairs.webp 2022-05-18 21:29:54 VMware fixed a critical auth bypass issue in some of its products (lien direct) >VMware addressed a critical authentication bypass vulnerability “affecting local domain users” in multiple products. The virtualization giant warns that a threat actor can exploit the flaw, tracked as CVE-2022-22972 (CVSSv3 base score of 9.8), to obtain admin privileges and urges customers to install patches immediately. “This critical vulnerability should be patched or mitigated immediately per the […] Vulnerability Threat
SecurityAffairs.webp 2022-05-18 20:04:37 Microsoft warns of attacks targeting MSSQL servers using the tool sqlps (lien direct) >Microsoft warns of brute-forcing attacks targeting Microsoft SQL Server (MSSQL) database servers exposed online. Microsoft warns of a new hacking campaign aimed at MSSQL servers, threat actors are launching brute-forcing attacks against poorly protected instances. The attacks are using the legitimate tool sqlps.exe, a sort of SQL Server PowerShell file, as a LOLBin (short for living-off-the-land binary). Microsoft warned of […] Tool Threat
SecurityAffairs.webp 2022-05-18 14:37:54 Microsoft warns of the rise of cryware targeting hot wallets (lien direct) >Microsoft researchers warn of the rising threat of cryware targeting non-custodial cryptocurrency wallets, also known as hot wallets. Microsoft warns of the rise of cryware, malicious software used to steal info an dfunds from non-custodial cryptocurrency wallets, also known as hot wallets. Data stolen from this kind of malware includes private keys, seed phrases, and […] Malware Threat
SecurityAffairs.webp 2022-05-18 07:41:40 Experts spotted a new variant of UpdateAgent macOS malware dropper written in Swift (lien direct) >Researchers spotted a new variant of the UpdateAgent macOS malware dropper that was employed in attacks in the wild. Researchers from the Jamf Threat Labs team have uncovered a new variant of the UpdateAgent macOS malware dropper. The new version is written in Swift and relies on the AWS infrastructure to host its malicious payloads.  […] Malware Threat
SecurityAffairs.webp 2022-05-17 19:10:57 Venezuelan cardiologist accused of operating and selling Thanos ransomware (lien direct) >The U.S. Justice Department accused a 55-year-old Venezuelan cardiologist of operating and selling the Thanos ransomware. The U.S. Justice Department accused Moises Luis Zagala Gonzalez, a 55-year-old cardiologist from Venezuela, of operating and selling the Thanos ransomware. Thanos ransomware (a.k.a. Hakbit ransomware) has been developed by Nosophoros (aka Aesculapius, and Nebuchadnezzar), a threat actor offering for sale the malware […] Ransomware Malware Threat
SecurityAffairs.webp 2022-05-17 05:19:04 A custom PowerShell RAT uses to target German users using Ukraine crisis as bait (lien direct) >Researchers spotted a threat actor using a custom PowerShell RAT targeting German users to gain intelligence on the Ukraine crisis. Malwarebytes experts uncovered a campaign that targets German users with custom PowerShell RAT targeting. The threat actors attempt to trick victims into opening weaponized documents by using the current situation in Ukraine as bait. The […] Threat
SecurityAffairs.webp 2022-05-16 05:28:25 Eternity Project: You can pay $260 for a stealer and $490 for a ransomware (lien direct) >Researchers from threat intelligence firm Cyble analyzed the Eternity Project Tor website which offers any kind of malicious code. Researchers at cybersecurity firm Cyble analyzed a Tor website named named 'Eternity Project’ that offers for sale a broad range of malware, including stealers, miners, ransomware, and DDoS Bots. The experts discovered the marketplace during a […] Ransomware Threat
SecurityAffairs.webp 2022-05-15 11:25:31 Sysrv-K, a new variant of the Sysrv botnet includes new exploits (lien direct) >Microsoft reported that the Sysrv botnet is targeting Windows and Linux servers exploiting flaws in the Spring Framework and WordPress. Microsoft Security Intelligence team Microsoft reported that a new variant of the Sysrv botnet, tracked as Sysrv-K, now includes exploits for vulnerabilities in the Spring Framework and WordPress. Threat actors use the botnet in a cryptomining campaign targeting Windows […] Threat
SecurityAffairs.webp 2022-05-13 06:52:53 Iran-linked COBALT MIRAGE group uses ransomware in its operations (lien direct) Iranian group used Bitlocker and DiskCryptor in a series of attacks targeting organizations in Israel, the US, Europe, and Australia. Researchers at Secureworks Counter Threat Unit (CTU) are investigating a series of attacks conducted by the Iran-linked COBALT MIRAGE APT group. The threat actors have been active since at least June 2020 and are linked […] Ransomware Threat APT 15 APT 15 ★★★★
SecurityAffairs.webp 2022-05-10 06:41:59 Threat actors are actively exploiting CVE-2022-1388 RCE in F5 BIG-IP (lien direct) Threat actors are exploiting critical F5 BIG-IP flaw CVE-2022-1388 to deliver malicious code, cybersecurity researchers warn. Threat actors started massively exploiting the critical remote code execution vulnerability, tracked as CVE-2022-1388, affecting F5 BIG-IP. Last week security and application delivery solutions provider F5 released its security notification to inform customers that it has released security updates from tens of vulnerabilities in its […] Threat ★★★★
SecurityAffairs.webp 2022-05-06 10:02:23 Vulnerable Docker Installations Are A Playhouse for Malware Attacks (lien direct) Uptycs researchers identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API. The Uptycs Threat Research team has identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API port 2375. The attacks are related to crypto miners and reverse shells on the vulnerable servers using base64-encoded commands in the cmdline, built […] Malware Threat
SecurityAffairs.webp 2022-05-03 23:21:00 China-linked APT Curious Gorge targeted Russian govt agencies (lien direct) China-linked Curious Gorge APT is targeting Russian government agencies, Google Threat Analysis Group (TAG) warns. Google Threat Analysis Group (TAG) reported that an APT group linked to China’s People’s Liberation Army Strategic Support Force (PLA SSF), tracked as Curious Gorge, is targeting Russian government agencies. The Google TAG team published a report focused on cybersecurity […] Threat
SecurityAffairs.webp 2022-05-01 13:13:29 Hackers stole +80M from DeFi platforms Rari Capital and Fei Protocol (lien direct) Threat actors exploited a bug in the Fuse protocol used by DeFi platforms Rari Capital and Fei Protocol and stole more than $80 million. Threat actors stole more than $80 million from the decentralized finance (DeFi) platforms Rari Capital and Fei Protocol on Saturday. Researchers from smart contract analysis firm Block Sec reported that attackers […] Threat
SecurityAffairs.webp 2022-04-30 17:27:35 Emotet tests new attack chain in low volume campaigns (lien direct) Emotet operators are testing new attack techniques in response to Microsoft’s move to disable Visual Basic for Applications (VBA) macros by default. The operators of the infamous Emotet botnet are testing new attack techniques in response to Microsoft’s move to disable Visual Basic for Applications (VBA) macros by default. The threat actors are adopting the […] Threat
SecurityAffairs.webp 2022-04-28 14:49:32 Bumblebee, a new malware loader used by multiple crimeware threat actors (lien direct) Threat actors have replaced the BazaLoader and IcedID malware with a new loader called Bumblebee in their campaigns. Cybercriminal groups that were previously using the BazaLoader and IcedID as part of their malware campaigns seem to have adopted a new loader called Bumblebee. The loader appears to be under development and is a highly sophisticated […] Malware Threat
SecurityAffairs.webp 2022-04-28 04:36:37 Russia-linked threat actors launched hundreds of cyberattacks on Ukraine (lien direct) Microsoft revealed that Russia launched hundreds of cyberattacks against Ukraine since the beginning of the invasion. Microsoft states that at least six separate Russia-linked threat actors launched more than 237 operations against Ukraine starting just before the invasion. The cyber attacks included destructive wipers that were used to target critical infrastructure in a hybrid war […] Threat
SecurityAffairs.webp 2022-04-27 07:15:07 Conti ransomware operations surge despite the recent leak (lien direct) Conti ransomware gang continues to target organizations worldwide despite the massive data leak has shed light on its operations. Researchers from Secureworks state that the Conti ransomware gang, tracked as a Russia-based threat actor Gold Ulrick, continues to operate despite the recent data leak on its internal activities. The group’s activity returned to the levels […] Ransomware Threat
SecurityAffairs.webp 2022-04-25 08:09:22 Experts warn of a surge in zero-day flaws observed and exploited in 2021 (lien direct) The number of zero-day vulnerabilities exploited in cyberattacks in the wild exploded in the last years, security firm report. Google and Mandiant have published two reports that highlight a surge in the discovery of zero-day flaws exploited by threat actors in attacks in the wild. Google's Project Zero researchers reported that 58 zero-day were discovered […] Threat
SecurityAffairs.webp 2022-04-24 13:57:11 Atlassian addresses a critical Jira authentication bypass flaw (lien direct) Atlassian fixed a critical flaw in its Jira software, tracked as CVE-2022-0540, that could be exploited to bypass authentication. Atlassian has addressed a critical vulnerability in its Jira Seraph software, tracked as CVE-2022-0540 (CVSS score 9.9), that can be exploited by an unauthenticated attacker to bypass authentication. A threat actor could trigger the vulnerability by […] Vulnerability Threat
SecurityAffairs.webp 2022-04-21 07:15:37 US, Australia, Canada, New Zealand, and the UK warn of Russia-linked threat actors\' attacks (lien direct) Cybersecurity agencies of the Five Eyes intelligence alliance warn of cyberattacks conducted by Russia-linked threat actors on critical infrastructure. Cybersecurity agencies of the Five Eyes intelligence alliance (United States, Australia, Canada, New Zealand, and the United Kingdom) issued a joint advisory warning of cyber attacks on critical infrastructure conducted by Russia-linked threat actors and criminal cyber threats. […] Threat
SecurityAffairs.webp 2022-04-20 19:30:08 Russian Gamaredon APT continues to target Ukraine (lien direct) Russia-linked threat actor Gamaredon targets Ukraine with new variants of the custom Pterodo backdoor. Russia-linked Gamaredon APT group (a.k.a. Armageddon, Primitive Bear, and ACTINIUM) continues to target Ukraine and it is using new variants of the custom Pterodo backdoor (aka Pteranodon). The cyberespionage group is behind a recent series of spear-phishing attacks targeting Ukrainian entities and organizations related to Ukrainian […] Threat
SecurityAffairs.webp 2022-04-19 10:03:43 NSO Group Pegasus spyware leverages new zero-click iPhone exploit in recent attacks (lien direct) Researchers reported that threat actors leveraged a new zero-click iMessage exploit to install NSO Group Pegasus on iPhones belonging to Catalans. Researchers from Citizen Lab have published a report detailing the use of a new zero-click iMessage exploit, dubbed HOMAGE, to install the NSO Group Pegasus spyware on iPhones belonging to Catalan politicians, journalists, academics, and activists. […] Threat
SecurityAffairs.webp 2022-04-18 17:46:46 Experts spotted Industrial Spy, a new stolen data marketplace (lien direct) A new marketplace named Industrial Spy that focuses on the sale of stolen data appeared in the threat landscape. Malware HunterTeam and Bleeping Computer reported the born of a new marketplace called Industrial Spy that sells stolen data and offers free stolen data to its members. MalwareHunterTeam researchers spotted malware samples [1, 2] that drop the […] Malware Threat
SecurityAffairs.webp 2022-04-17 17:53:00 Enemybot, a new DDoS botnet appears in the threat landscape (lien direct) Enemybot is a DDoS botnet that targeted several routers and web servers by exploiting known vulnerabilities. Researchers from Fortinet discovered a new DDoS botnet, tracked as Enemybot, that has targeted several routers and web servers by exploiting known vulnerabilities. The botnet targets multiple architectures, including arm, bsd, x64, and x86. The researchers attribute the botnet […] Threat
SecurityAffairs.webp 2022-04-17 14:58:53 Stolen OAuth tokens used to download data from dozens of organizations, GitHub warns (lien direct) GitHub reported that threat actors used stolen OAuth user tokens to exfiltrate private data from several organizations. GitHub uncovered threat actors using stolen OAuth user tokens to gain access to their repositories and download private data from several organizations. Threat actors abused stolen OAuth user tokens issued to two third-party OAuth integrators, Heroku and Travis-CI, […] Threat
SecurityAffairs.webp 2022-04-16 11:49:34 Threat actors target the Ukrainian gov with IcedID malware (lien direct) Threat actors are targeting Ukrainian government agencies with phishing attacks delivering the IcedID malware. The Ukrainian Computer Emergency Response Team (CERT-UA) uncovered new phishing campaigns aimed at infecting systems of Ukrainian government agencies with the IcedID malware. IcedID banking trojan first appeared in the threat landscape in 2017, it has capabilities similar to other financial threats […] Malware Threat
SecurityAffairs.webp 2022-04-15 22:13:40 Threat actors use Zimbra exploits to target organizations in Ukraine (lien direct) Threat actors are targeting Ukrainian government organizations with exploits for XSS vulnerabilities in Zimbra Collaboration Suite (CVE-2018-6882). Ukraine’s CERT (CERT-UA) warns of threat actors that are targeting government organizations with exploits for XSS vulnerabilities in Zimbra Collaboration Suite (CVE-2018-6882). “Cross-site scripting (XSS) vulnerability in the ZmMailMsgView.getAttachmentLinkHtml function in Zimbra Collaboration Suite (ZCS) before 8.7 Patch […] Vulnerability Threat
SecurityAffairs.webp 2022-04-15 14:37:07 ZingoStealer crimeware released for free in the cybercrime ecosystem (lien direct) A new powerful crimeware called ZingoStealer was released for free by a threat actor known as Haskers Gang. ZingoStealer is a new information-stealer developed by a threat actor known as Haskers Gang who released it for free after they attempted to sell the source code for $500. The threat actors were also offering their own crypter, dubbed […] Threat
SecurityAffairs.webp 2022-04-15 10:25:30 Google fixed third zero-day in Chrome since the start of 2022 (lien direct) Google Chrome 100.0.4896.127 addresses a new high-severity zero-day vulnerability tracked as CVE-2022-1364, actively exploited by threat actors in the wild. Google has released Chrome 100.0.4896.127 for Windows, Mac, and Linux to address a high-severity zero-day, tracked as CVE-2022-1364, that is actively exploited by threat actors in attacks. The CVE-2022-1364 zero-day is a type confusion issue […] Vulnerability Threat
Last update at: 2024-05-10 14:08:03
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter