After compromising Azure and Outlook user accounts, threat actors are creating malicious apps with high privileges to conduct cryptomining, phishing, and password spraying.
| LATEST SECURITY NEWS & COMMENTARY | Attackers Target Microsoft Accounts to Weaponize OAuth Apps After compromising Azure and Outlook user accounts, threat actors are creating malicious apps with high privileges to conduct cryptomining, phishing, and password spraying. Global TeamCity Exploitation Opens Door to SolarWinds-Style Nightmare Russia's APT29 is going after a critical RCE flaw in the JetBrains TeamCity software developer platform, prompting governments worldwide to issue an urgent warning to patch. MITRE Debuts ICS Threat Modeling for Embedded Systems EMB3D, like ATT&CK and CWE, seeks to provide a common understanding of cyber-threats to embedded devices and of the security mechanisms for addressing them. Hacktivists Interrupt UAE TV Streams With a Message About Gaza The root cause may lie in set-top boxes run by a questionable service provider. Software & Security: How to Move Supply Chain Security Up the Agenda Getting more insight helps you to prioritize across all your systems, letting you drive more collaboration, real change, and real success for your teams. Ransomware Gangs Use PR Charm Offensive to Pressure Victims Threat actors are fully embracing the spin machine: rebranding, speaking with the media, writing detailed FAQs, and more, all in an effort to make headlines. (Sponsored Article) The SOC's Future Is a Security Platform SOC tools must evolve, and a unified platform with a comprehensive, proactive protection and Gen AI can tip the scales in favor of your defenders. MORE NEWS / MORE COMMENTARY | | | | HOT TOPICS | Dozens of Bugs Patched in Apple TVs and Watches, Macs, iPads, iPhones A laundry list of tweaks to Safari, Bluetooth, Accessibility, and much more. Biden's AI Exec Order Is a Start, but We Must Safeguard Innovation It's important for Congress to strengthen protections for AI and set guardrails to make sure it isn't used maliciously. Cybercrime Orgs Increasingly Use Human Trafficking to Staff Scam Mills Interpol breaks up Southeast Asian cybercrime rings, rescuing 149 victims of human trafficking, but the agency warns the human cost of cybercrime is mounting across the globe. Data's Perilous Journey & Lessons Not Learned From the Target Breach A decade after Target suffered a major security breach, are we still disregarding the gaping holes in our cyber fortifications? MORE |
| | PRODUCTS & RELEASES | Survey: 90% of IT Pros Felt Prepared for a Password-Based Cyberattack, Yet More Than Half Fell Victim to One Cloudbrink Presents Firewall-as-Service for the Hybrid Workplace ProvenRun Secures €15M Series A to Accelerate its Growth MORE PRODUCTS & RELEASES |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|