Attackers could abuse the vanity subdomains of popular cloud services such as Box.com, Google, and Zoom to mask attacks in phishing campaigns.
Follow Dark Reading:
 May 12, 2022
LATEST SECURITY NEWS & COMMENTARY
Vanity URLs Could Be Spoofed for Social Engineering Attacks
Attackers could abuse the vanity subdomains of popular cloud services such as Box.com, Google, and Zoom to mask attacks in phishing campaigns.
Cyber-Espionage Attack Drops Post-Exploit Malware Framework on Microsoft Exchange Servers
IceApple's 18 separate modules include those for data exfiltration, credential harvesting, and file and directory deletion, CrowdStrike warns.
On Air With Dark Reading News Desk at Black Hat Asia 2022
This year's Black Hat Asia is hybrid, with some sessions broadcast on the virtual platform and others live on stage in Singapore. News Desk is available on-demand with prerecorded interviews.
Microsoft Simplifies Security Patching Process for Exchange Server
Delivering hotfixes and system updates separately will allow manual patching without requiring elevated permissions, Microsoft said.
NSA Warns Managed Service Providers Are Now Prime Targets for Cyberattacks
International cybersecurity authorities issue guidance to help information and communications service providers secure their networks.
The Danger of Online Data Brokers
Enterprises should consider online data brokers as part of their risk exposure analysis if they don't already do so.
Breaking Down the Strengthening American Cybersecurity Act
New federal cybersecurity rules will set timelines for critical infrastructure sector organizations — those in chemical, manufacturing, healthcare, defense contracting, energy, financial, nuclear, or transportation — to report ransomware payments and cyberattacks to CISA. All parties have to comply for it to work and help protect assets.
Novel Nerbian RAT Lurks Behind Faked COVID Safety Emails
Malicious emails with macro-enabled Word documents are spreading a never-before-seen remote-access Trojan, researchers say.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers
Microsoft's May 2022 Patch Tuesday contains several bugs in ubiquitous software that could affect millions of machines, researchers warn.

Mastering the New CISO Playbook
How can you safeguard your organization amid global conflict and uncertainty?

NFTs Emerge as the Next Enterprise Attack Vector
Cybersecurity has to be a top priority as enterprises begin incorporating the use of nonfungible tokens into their business strategies, brand-awareness campaigns, and employee-communication efforts, experts say.

MORE
EDITORS' CHOICE

Top 6 Security Threats Targeting Remote Workers
Remote work is here to stay, which means security teams must ensure that security extends beyond corporate devices and protects employees wherever they are.
LATEST FROM THE EDGE

Threat Actors Are Stealing Data Now to Decrypt When Quantum Computing Comes
The technique, called store-now, decrypt later (SNDL), means organizations need to prepare now for post-quantum cryptography.
LATEST FROM DR TECHNOLOGY

Nokia Opens Cybersecurity Testing Lab
The end-to-end cybersecurity 5G testing lab will help identify and prevent cyberattacks on 5G networks.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Harnessing the Power of Security Automation

    With many organizations pinched for both dollars and manpower, security and IT teams are turning to a new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. How can companies truly unleash the potential ...

  • The Value Drivers of Attack Surface Management, Revealed

    The value of modern ASM extends beyond the security benefits. It can save money as well through prevention, lower cyber insurance costs, lower human effort, and higher operational efficiency. Join to find out how modern attack surfaces have changed, why ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.