A widespread disinformation campaign aimed at Americans wasn't that effective, but it was certainly creative, even slipping in influence articles to legitimate news outlets like AZCentral.com.
| LATEST SECURITY NEWS & COMMENTARY | China Propaganda Spreads via US News Sites, Freelancers, Times Square A widespread disinformation campaign aimed at Americans wasn't that effective, but it was certainly creative, even slipping in influence articles to legitimate news outlets like AZCentral.com. KillNet's Kremlin Connection Unclear as the Cybercrime Collective Grows KillNet is amassing members, capabilities, and know-how, as it looks to consolidate cybercrime power under its own umbrella. North Korean Cyberspies Target GitHub Developers The North Korean APT is setting up legitimate accounts on GitHub and social media platforms to pose as developers or recruiters — ultimately to fool targets into loading npm repositories with malicious code. Orgs Face Record $4.5M Per Data Breach Incident Cl0p stands to make $100M on the MOVEit campaign, and according to a just-released survey, more than half of businesses are willing to pass data breach costs onto customers. Atlassian RCE Bugs Plague Confluence, Bamboo The security vulnerabilities allow full takeover of Atlassian instances, so admins should patch now. Designing a Security Strategy for Defending Multicloud Architectures Complex security issues arise when different clouds and computing models interact. (Sponsored Article) Why Hybrid Work Has Made Secure Access So Complicated Employees now have the freedom to work wherever they want, which brings new challenges for security teams trying to protect data. MORE NEWS / MORE COMMENTARY | |
| | WEBINARS | Best Practices and Tools for OT and IT Security For years, information technology and operations technology systems have existed in parallel, but that is no longer the case. As the attack against Colonial Pipeline illustrated, attacks against IT can potentially impact OT, and vice versa. OT environments have their ... Finding a Backup Strategy That Works For You You've been hit with a ransomware, DDoS, natural disaster, or destructive cyberattack. One of the first questions: can we get our data back? Good back-ups are key to business continuity and disaster recovery, but backing up your data in preparation ... | View More Dark Reading Webinars >> | |
| |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|