The malware has resurfaced, using an icon and name similar to the legitimate Google Play app MYT Music, a popular app with more than 10 million downloads.
Follow Dark Reading:
 December 22, 2022
LATEST SECURITY NEWS & COMMENTARY
Godfather Banking Trojan Masquerades as Legitimate Google Play App
The malware has resurfaced, using an icon and name similar to the legitimate Google Play app MYT Music, a popular app with more than 10 million downloads.
Ransomware Attackers Bypass Microsoft's ProxyNotShell Mitigations With Fresh Exploit
The Play ransomware group was spotted exploiting another little-known SSRF bug to trigger RCE on affected Exchange servers.
'Russian Hackers' Help Fraudsters Hijack JFK Airport's Taxi Dispatch
DoJ charges allege they hacked into the taxi dispatch system for profit, selling the ability for cab drivers to skip the line for picking up a fare at JFK terminals.
Why Security Teams Shouldn't Snooze on MFA Fatigue
Employee education, biometric and adaptive authentication, and zero trust can go a long way in strengthening security.
Name That Toon: Kiss and Tell
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Microsoft Warns on 'Achilles' macOS Gatekeeper Bypass
The latest bypass for Apple's application-safety feature could allow malicious takeover of Macs.

'Blindside' Attack Subverts EDR Platforms From Windows Kernel
The technique loads a nonmonitored and unhooked DLL, and leverages debug techniques that could allow for running arbitrary code.

Protecting Hospital Networks From 'Code Dark' Scenarios
Asset inventory, behavioral baselining, and automated response are all key to keeping patients healthy and safe.  

MORE
EDITORS' CHOICE
AWS Elastic IP Transfer Feature Gives Cyberattackers Free Range
Threat actors can take over victims' cloud accounts to steal data, or use them for command-and-control for phishing attacks, denial of service, or other cyberattacks.
LATEST FROM THE EDGE

Understanding the 3 Classes of Kubernetes Risk
The first step toward securing Kubernetes environments is understanding the risks they pose and identifying the ways in which those risks can be mitigated.
LATEST FROM DR TECHNOLOGY

How to Run Kubernetes More Securely
The open source container tool is quite popular among developers — and threat actors. Here are a few ways DevOps teams can take control.
WEBINARS
View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.