The latest threat to Citrix NetScaler, CVE-2023-4966, was exploited as a zero-day bug for months before a patch was issued. Researchers expect exploitation efforts to surge.
| LATEST SECURITY NEWS & COMMENTARY | Critical Citrix Bug Exploited as a Zero-Day, 'Patching Is Not Enough' The latest threat to Citrix NetScaler, CVE-2023-4966, was exploited as a zero-day bug for months before a patch was issued. Researchers expect exploitation efforts to surge. D-Link Confirms Breach, Rebuts Hacker's Claims About Scope The router specialist says the attacker's claims to have heisted millions and millions of records are significantly overblown. But an incident did happen, stemming from a successful phish. FBI: Hackers Are Extorting Plastic Surgery Providers, Patients The sensitive nature of medical records, combined with providers' focus on patient care, make small doctor's offices ideal targets for cyber extortion. EPA Turns Off Taps on Water Utility Cyber Regulations Facing a potential cascade of legal challenges from industry groups and state attorneys general, the EPA has rescinded its cyber-rules. But where does that leave local water safety? The Most Popular IT Admin Password Is Totally Depressing Analysis of more than 1.8 million admin portals reveals IT leaders, with the highest privileges, are just as lazy about passwords as everyone else. North Korea's Kimsuky Doubles Down on Remote Desktop Control The sophisticated APT employs various tactics to abuse Windows and other built-in protocols with both custom and public malware to take over victim systems. Pro-Iranian Hacktivists Set Sights on Israeli Industrial Control Systems The hacktivists known as SiegedSec identify ICS targets, but there's no evidence of attacks yet. Jupyter Notebook Ripe for Cloud Credential Theft, Researchers Warn If not correctly locked down, Jupyter Notebook offers a novel initial access vector that hackers can use to compromise enterprise cloud environments, as seen in a recent hacking incident. The Most Popular IT Admin Password Is Totally Depressing Analysis of more than 1.8 million admin portals reveals IT leaders, with the highest privileges, are just as lazy about passwords as everyone else. The Need for a Cybersecurity-Centric Business Culture Building a culture of cybersecurity is achievable by acknowledging its importance and consistently reinforcing that message. (Sponsored Article) Why Zero Trust Is the Cloud Security Imperative The security principle of zero trust is the cornerstone of robust cloud security. MORE NEWS / MORE COMMENTARY | |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|