Windows users are at risk for full device takeover by an emerging malicious version of the Remcos remote admin tool.
Follow Dark Reading:
 November 12, 2024
LATEST SECURITY NEWS & COMMENTARY
Revamped Remcos RAT Deployed Against Microsoft Windows Users
Windows users are at risk for full device takeover by an emerging malicious version of the Remcos remote admin tool, which is being used in an ongoing campaign exploiting a known remote code execution (RCE) vulnerability in Microsoft Office and WordPad.
Flexible Structure of Zip Archives Exploited to Hide Malware Undetected
Attackers abuse concatenation, a method that involves appending multiple zip archives into a single file, to deliver a variant of the SmokeLoader Trojan hidden in malicious attachments delivered via phishing.
Halliburton Remains Optimistic Amid $35M Data Breach Losses
Though its third-quarter earnings report confirms that the company remains on track, it's unclear how that will be affected if the threat actors commit further damage.
Open Source Security Incidents Aren't Going Away
Companies and organizations need to recognize the importance of investing in engineers who possess both the soft and hard skills required to secure open source software effectively.
Facebook Asks Supreme Court to Dismiss Cambridge Analytica Lawsuit
Meta has maintained that Facebook did not mislead investors by not including mention of the Cambridge Analytica scandal in its forward-looking risk disclosures, but the plaintiffs say it was a glaring omission.
MORE NEWS / MORE COMMENTARY
DON'T MISS OUR EVENT ON THURSDAY
Know Your Enemy: Understanding Cybercriminals and Nation-State Actors
Nov. 14, 11:00 a.m. – 5:00 p.m. ET. Who are the cyberattackers behind current attack campaigns, and what is their endgame? How could their tactics and techniques be used against your organization? In this free virtual event, learn about the latest, most prolific threat actors and their methods, and how to protect your enterprise. Register now!
LISTEN TO OUR LATEST PODCAST
Dark Reading Confidential: Quantum Has Landed, So Now What?
NIST's new post-quantum cryptography standards are here, so what comes next? This episode of Dark Reading Confidential digs into the world of quantum computing from a cybersecurity practitioner's point of view — with guests Matthew McFadden, vice president, Cyber, General Dynamics Information Technology (GDIT) and Thomas Scanlon, professor, Heinz College, Carnegie Mellon University.
MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
6 Infotainment Bugs Allow Mazdas to Be Hacked With USBs
Direct cyberattacks on vehicles are all but unheard of. In theory, though, the opportunity is there to cause real damage — data extraction, full system compromise, even gaining access to safety-critical systems.
LATEST FROM THE EDGE

What Listening to My Father Taught Me About Cybersecurity
It's polite to listen to advice that people are willing to share, but not all of it will be useful for you. Here's how to separate the wheat from the chaff.
LATEST FROM DR TECHNOLOGY

Incident Response, Anomaly Detection Rank High on Planned ICS Security Spending
Data from the "SANS State of ICS/OT Cybersecurity" report suggests organizations are going to shift spending from security technologies protecting industrial control systems and operational technology environments to non-technical activities such as training and incident response.
LATEST FROM DR GLOBAL

Gootloader Cyberattackers Target Bengal-Cat Aficionados in Oz
It's unclear what the threat actors have against this particular breed of cat, but it's taking down the kitty's enthusiasts with SEO-poisoned links and malware payloads.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.