A threat you've never heard of is using double extortion attacks on mom-and-pop shops around the globe.
| LATEST SECURITY NEWS & COMMENTARY | Emerging Ransomware Group 8Base Doxxes SMBs Globally A threat you've never heard of is using double extortion attacks on mom-and-pop shops around the globe. 2 More Apple Zero-Days Exploited in Ongoing iOS Spy Campaign The zero-day security bugs are being used to deploy the sophisticated but "odd" TriangleDB spying implant on targeted iOS devices. SMB Edge Devices Walloped With Asus, Zyxel Patch Warnings A slew of critical advisories this week showcase an exploding edge device attack surface for SMBs, which have limited cybersecurity protection, visibility, and maintenance available. 20-Year-Old Chinese APT15 Finds New Life in Foreign Ministry Attacks The notorious APT15 used common malware tools and a third-generation custom 'Graphican' backdoor to continue its information gathering exploits, this time against foreign ministries. 'Muddled Libra' Uses Oktapus-Related Smishing to Target Outsourcing Firms The emerging cyber-threat group is unusually persistent and nimble, bypassing MFA, stealing data, and using compromised environments for downstream customer attacks. Avast, Norton Parent Latest Victim of MOVEit Data Breach Attacks Gen Digital, the parent company of the security companies, is the latest victim in a rash of Cl0p attacks on the bug in the MOVEit transfer software, leading to employee data being revealed. Ransomware Misconceptions Abound, to the Benefit of Attackers It's time to update what we think we understand about ransomware, including new defensive measures and how fast the attack response should be. Placing People & Realism at the Center of Your Cybersecurity Strategy While it's impossible for an organization to be completely secure, there's no reason to be defenseless. New DoJ Cyber Prosecution Team Will Go After Nation-State Threat Actors The US Department of Justice adds litigators under its National Security Division to take on sophisticated cyber threats from adversarial nation-states. Cyberattacks on OT, ICS Lay Groundwork for Kinetic Warfare Organizations need to start taking critical infrastructure threats seriously, as they could be a precursor to future, hybrid cyber-kinetic warfare attacks, experts warn. (Sponsored Article) How AI Can Help Organizations Adapt and Recover From Cyberattacks Incident response playbooks and frameworks are leaving defenders ill-equipped to recover from the increasing number of successful cyberattacks. Developments in AI offer a new way for stretched teams to manage security incidents and heal swiftly. MORE NEWS / MORE COMMENTARY | |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|