A new group of hackers is encrypting data in virtual machines, leaving ransom notes, and calling it a day.
| LATEST SECURITY NEWS & COMMENTARY | 'Fog' Ransomware Rolls in to Target Education, Recreation Sectors A new group of hackers is encrypting data in virtual machines, leaving ransom notes, and calling it a day. Hijacking Scheme Takes Over High-Profile TikTok Accounts Hijacking malware gets spread through TikTok's direct messaging and doesn't require the victim to click links or download anything. Ticketmaster Breach Showcases SaaS Data Security Risks MFA and other mechanisms are critical to protect against unauthorized access to data in cloud application environments, but businesses still fall down on the job. RansomHub Actors Exploit ZeroLogon Vuln in Recent Ransomware Attacks CVE-2020-1472 is a privilege escalation flaw that allows an attacker to take over an organization's domain controllers. Ticketmaster Confirms Cloud Breach, Amid Murky Details Ticketmaster parent Live Nation has filed a voluntary SEC data breach notification, while one of its cloud providers, Snowflake, also confirmed targeted cyberactivity against some of its customers. Atlassian Confluence High-Severity Bug Allows Code Execution Because of the role the Confluence Server plays in managing documentation and knowledge data bases, the researchers recommend users upgrade to patch CVE-2024-21683 as soon as possible. CISO Corner: Federal Cyber Deadlines Loom; Private Chatbot Danger Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: fighting cybersecurity burnout; BlackSuit ransomware; the SEC breach rules and risk management. Flawed AI Tools Create Worries for Private LLMs, Chatbots Companies are looking to large language models to help their employees glean information from unstructured data, but vulnerabilities could lead to disinformation and, potentially, data leaks. OpenAI Disrupts 5 AI-Powered, State-Backed Influence Ops Most of the operations were feckless efforts with little impact, but they illustrate how AI is changing the game for inauthentic content on both the adversary and defense sides. Europol's Hunt Begins for Emotet Malware Mastermind International law enforcement Operation Endgame shifts its crackdown to focus on individual adversaries. Okta Warns Once Again of Credential-Stuffing Attacks This time it's the identity management service provider's cross-origin authentication feature that's being targeted by adversaries. CISA's Secure by Design Initiative at 1: A Report Card There is more that needs to be done, but, so far, the initiative is a success. Perfecting the Proactive Security Playbook It's more important than ever for organizations to prepare themselves and their cybersecurity postures against known and unknown threats. MORE NEWS / MORE COMMENTARY | | | PRODUCTS & RELEASES | ISC2 Provides Opportunity for Employers to Connect With Cybersecurity Job Seekers Cloud Security Alliance Survey Finds 70% of Organizations Have Established Dedicated SaaS Security Teams EV Manufacturer BYD Selects Karamba Security to Meet Global Automotive Cybersecurity Regulations Portkey Announces Integration of Zero-Knowledge Proofs for Enhanced Identity Management and Security KnowBe4 and MobileMind Collaborate to Provide Cybersecurity Training for K12 School Districts Ockam and Redpanda Partner to Launch Zero-Trust Streaming Data Platform Notable Capital Launches Rising in Cyber to Spotlight Promising Cybersecurity Startups MORE PRODUCTS & RELEASES |
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|