The Russian-backed group is using a novel access vector to harvest victim data and compromise devices in a large-scale intelligence-gathering operation.
| LATEST SECURITY NEWS & COMMENTARY | 'Midnight Blizzard' Targets Networks With Signed RDP Files The Russian-backed group is using a novel access vector to harvest victim data and compromise devices in a large-scale intelligence-gathering operation. Vishing, Mishing Go Next-Level With FakeCall Android Malware A new variant of the sophisticated attacker tool gives cybercriminals even more control over victim devices to conduct various malicious activities, including fraud and cyber espionage. 'CrossBarking' Attack Targets Secret APIs, Exposes Opera Browser Users Using a malicious Chrome extension, researchers showed how an attacker could use a now-fixed bug to inject custom code into a victim's Opera browser to exploit special and powerful APIs, used by developers and typically saved for only the most trusted sites. Ex-Disney Employee Charged With Hacking Menu Database In a vengeful move against the happiest place on Earth, the former employee allegedly used his old credentials to make potentially deadly changes. Cybersecurity Training Resources Often Limited to Developers With a lack of cybersecurity awareness training resources for all employees, organizations are more susceptible to being breached or falling short when it comes to preventing threats. When Cybersecurity Tools Backfire Outages are inevitable. Our focus should be on minimizing their scope, addressing underlying causes, and understanding that protecting systems is about keeping bad actors out while maintaining stability and reliability. MIND Launches "Intelligent" DLP Platform The company's data loss prevention platform helps customers identify and classify data across SaaS and GenAI applications, endpoints, and emails. MORE NEWS / MORE COMMENTARY | | | | HOT TOPICS | China's 'Evasive Panda' APT Debuts High-End Cloud Hijacking A professional-grade tool set, appropriately dubbed "CloudScout," is infiltrating cloud apps like Microsoft Outlook and Google Drive, targeting sensitive info for exfiltration. FBI, Partners Disrupt RedLine, Meta Stealer Operations A collaboration with the FBI and law-enforcement agencies in Europe, the UK, and Australia, Operation Magnus has seized servers and source code related to the two malware families, which have stolen data from millions of victims worldwide. Put End-of-Life Software to Rest Relying on EOL software leaves critical systems exposed — making it a problem no business can afford to ignore. How to Find the Right CISO Great CISOs are in short supply, so choose wisely. Here are five ways to make sure you've made the right pick. MORE |
| | PRODUCTS & RELEASES | The Open Source Initiative Announces Open Source AI Definition Casap Secures $8.5M in Funding Business Email Compromise (BEC) Impersonation: The Weapon of Choice of Cybercriminals MORE PRODUCTS & RELEASES |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|