Dark Reading

LockBit 3.0: Significantly Improved Ransomware Helps the Gang Stay on Top

07/26/2022
Just ahead of its headline-grabbing attack on the Italian tax agency, the infamous ransomware group debuted an improved version of the malware featuring parts from Egregor and BlackMatter.

Microsoft Tops Brands Phishers Prefer

07/26/2022
Wide use of Microsoft 365 applications by business lets phishers easily launch data theft, BEC, ransomware, and other attacks, new report finds.

Economic Downturn Raises Risk of Insiders Going Rogue

07/26/2022
Insiders could become more vulnerable to cybercrime recruitment efforts, new report says.

AI Can Help Fintechs Fight Fraud-as-a-Service

07/26/2022
Artificial intelligence tools can help companies strike the right balance between preventing financial crime and maintaining customer service and satisfaction.

Discord, Telegram Services Hijacked to Launch Array of Cyberattacks

07/26/2022
Attackers are easily turning popular messaging apps and their associated services — like bots, cloud infrastructure, and CDNs — against users, researchers warn.

Flying Blind in Security Operations

07/26/2022
Too many organizations are STILL getting breached. Every day across large and small organizations, intrusions and breaches happen.

How Risk-Based Vulnerability Management Has Made Security Easier

07/26/2022
Trying to remediate everything was never a winning strategy. RBVM is an approach that gets organizations better results with less effort.

Ducktail Spear-Phishing Campaign Uses LinkedIn to Hijack Facebook Business Accounts

07/26/2022
Ducktail targets marketing and HR professionals through LinkedIn to hijack Facebook accounts and run malvertising schemes.

The Beautiful Lies of Machine Learning in Security

07/26/2022
Machine learning should be considered an extension of — not a replacement for — existing security methods, systems, and teams.

Siemens Energy Takes Next Step to Protect Critical Infrastructure

07/26/2022
Company joins AWS Partner Network to provide customers with industrial cybersecurity solution to ensure reliable electricity and fuel supplies.

OpenFHE Brings New Encryption Tools to Developers

07/25/2022
The open source fully homomorphic encryption library from Duality Technologies is intended to help developers build their own FHE-enabled applications.

Rare 'CosmicStrand' UEFI Rootkit Swings into Cybercrime Orbit

07/25/2022
The firmware threat offers ultimate stealth and persistence — and may be distributed via tainted firmware components in a supply chain play, researchers theorize.

Supercharged Version of Amadey Infostealer & Malware Dropper Bypasses AVs

07/25/2022
Several threat actors used Amadey Bot previously to steal information and distribute malware such as the GandCrab ransomware and the FlawedAmmy RAT.

T-Mobile Pitches $4-Per-Customer Settlement for Data Leak Impacting 80M People

07/25/2022
After leaking 80 million US customer data records in a cyberattack last summer, T-Mobile offers to settle a wide-ranging class action suit for just $350 million.

Why Layer 8 Is Great

07/25/2022
To help discern legitimate traffic from fraud, it helps to understand user intent as shown through their behavior.

Qakbot Is Back With a New Trick: DLL Sideloading

07/25/2022
In the latest iteration, Qakbot operators are using DLL sideloading to deliver malware, a technique that places legitimate and malicious files together in a common directory to avoid detection.

Aqua Launches Out-of-the-Box Runtime Security with Advanced Protection against the Most Sophisticated Threats

07/25/2022
Security professionals can now achieve real-time protection for their workloads in minutes.

Getting Ahead of Supply Chain Attacks

07/25/2022
Attackers are willing to replicate entire networks, purchase domains, and persist for months, not to mention spend significantly to make these campaigns successful.

Critical Filewave MDM Vulnerabilities Allow Attackers Full Mobile Device Control

07/25/2022
Two previously unknown critical vulnerabilities within FileWave’s multiplatform MDM system could grant malicious actors access to the platform's most privileged user account.

Understanding Proposed SEC Rules Through an ESG Lens

07/22/2022
Cyber threats are putting environmental, social, and governance discussions at the forefront of board meetings and C-suite discussions around the globe.