Threat actors are distributing new "Realst" infostealer via fake blockchain games, researchers warn.
| LATEST SECURITY NEWS & COMMENTARY | Massive macOS Campaign Targets Crypto Wallets, Data Threat actors are distributing new "Realst" infostealer via fake blockchain games, researchers warn. Peloton Bugs Expose Enterprise Networks to IoT Attacks Hackers have three key pathways — the OS, apps, and malware — for leveraging the popular home fitness equipment as initial access for data. compromise, ransomware, and more 'Nitrogen' Ransomware Effort Lures IT Pros via Google, Bing Ads Forget temps and new employees. A new malicious campaign compromises organizations through a high risk, high reward vector: IT professionals. SEC Adopts New Rule on Cybersecurity Incident Disclosure Requirements Boards must now file notice of a "material incident" within four business days, although questions remain. Thales Agrees to Buy App Security Vendor Imperva in $3.6B Deal The deal is expected to give the French vendor a larger presence in the application and API security markets, as well as in North America. Kubernetes and the Software Supply Chain Trusted content is paramount in securing the supply chain. Cybercrime as a Public Health Crisis The impact of fraud on a victim's health and well-being can be more painful than the financial loss. Former NSA-er Harry Coker Nominated National Cyber Director The potential nominee is coming in with a model resume and background in cyberspace, as well as strong political support from the Hill. (Sponsored Article) How to Use Log Management to Retrace Your Digital Footsteps Log management tools help IT and security teams monitor and improve a system's performance by identifying bugs, cybersecurity breaches, and other issues that can create outages or compliance problems. MORE NEWS / MORE COMMENTARY | |
| | WEBINARS | Best Practices and Tools for OT and IT Security For years, information technology and operations technology systems have existed in parallel, but that is no longer the case. As the attack against Colonial Pipeline illustrated, attacks against IT can potentially impact OT, and vice versa. OT environments have their ... Finding a Backup Strategy That Works For You You've been hit with a ransomware, DDoS, natural disaster, or destructive cyberattack. One of the first questions: can we get our data back? Good back-ups are key to business continuity and disaster recovery, but backing up your data in preparation ... | View More Dark Reading Webinars >> | |
| |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|