Forget temps and new employees. A new malicious campaign compromises organizations through a high risk, high reward vector: IT professionals.
| LATEST SECURITY NEWS & COMMENTARY | 'Nitrogen' Ransomware Effort Lures IT Pros via Google, Bing Ads Forget temps and new employees. A new malicious campaign compromises organizations through a high risk, high reward vector: IT professionals. 10 Free Purple Team Security Tools to Check Out Check out this curated list of cool tools and platforms for both offensive security experts and defenders, all of which will be released or demoed at Black Hat USA 2023. Patch Now: Up to 900K MikroTik Routers Vulnerable to Total Takeover Researchers have delivered working exploits for RouterOS, which when combined with default admin passwords can be a recipe for cyber disaster. Massive macOS Campaign Targets Crypto Wallets, Data Threat actors are distributing new "Realst" infostealer via fake blockchain games, researchers warn. 'FraudGPT' Malicious Chatbot Now for Sale on Dark Web The subscription-based, generative AI-driven offering joins a growing trend toward "generative AI jailbreaking" to create ChatGPT copycat tools for cyberattacks. China Propaganda Spreads via US News Sites, Freelancers, Times Square A widespread disinformation campaign aimed at Americans wasn't that effective, but it was certainly creative, even slipping in influence articles to legitimate news outlets like AZCentral.com. Attackers Exploit Citrix Zero-Day Bug to Pwn NetScaler ADC, Gateway Citrix is urging organizations to immediately patch the unauthenticated RCE vulnerability. Peloton Bugs Expose Enterprise Networks to IoT Attacks Hackers have three key pathways — the OS, apps, and malware — for leveraging the popular home fitness equipment as initial access for data. compromise, ransomware, and more. Google Categorizes 6 Real-World AI Attacks to Prepare for Now The models powering generative AI like ChatGPT are open to several common attack vectors that organizations need to understand and get ready for, according to Google's dedicated AI Red Team. Kubernetes and the Software Supply Chain Trusted content is paramount in securing the supply chain. Designing a Security Strategy for Defending Multicloud Architectures Complex security issues arise when different clouds and computing models interact. Cybercrime as a Public Health Crisis The impact of fraud on a victim's health and well-being can be more painful than the financial loss. MORE NEWS / MORE COMMENTARY | |
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|