State-sponsored actors continue to exploit CVE-2023-23397, a dangerous no-interaction vulnerability in Microsoft's Outlook email client that was patched in March, in a widespread global campaign.
| LATEST SECURITY NEWS & COMMENTARY | Russian Espionage Group Hammers Zero-Click Microsoft Outlook Bug State-sponsored actors continue to exploit CVE-2023-23397, a dangerous no-interaction vulnerability in Microsoft's Outlook email client that was patched in March, in a widespread global campaign. Apple: 2.5B Records Exposed, Marking Staggering Surge in Data Breaches Data breaches are rapidly accelerating, according to a number-crunching report from Apple this week — heightening the need to finally implement end-to-end data encryption. Municipalities Face a Constant Battle as Ransomware Snowballs As record-breaking volumes of ransomware hit cities, towns, and counties this year, municipalities remain easy targets that pay, and there's no end of the attacks in sight. ALPHV/BlackCat Takedown Appears to Be Law Enforcement Related Threat intel sources confirm the ransomware group's site has been shuttered by law enforcement. Increased Cyber Regulation in the Offing as Attacks Mount Cybersecurity could be heading for a Sarbanes Oxley-type of regulation in light of escalating attacks, but the devil is in the details. Kenyan Digital Identity System Shelved Over Data Protection Concerns Privacy concerns see the proposed digital identity system paused until February. The 3 Most Prevalent Cyber Threats of the Holidays Chaos and volume of holiday season sales make a perfect storm of threat opportunity. Companies need to prepare — and practice! — action plans, identify key stakeholders, and consider cyber insurance. MORE NEWS / MORE COMMENTARY | | | PRODUCTS & RELEASES | CISOs See Software Supply Chain Security As Bigger Blind Spot Than GenAI: Cycode Cybersixgill Announces Identity Intelligence Module for Threat Analysis ProvenRun Secures €15M Series A to Accelerate its Growth Foresite Cybersecurity Partners With Crowdstrike MORE PRODUCTS & RELEASES |
| | | | | FEATURED REPORTS | The State of Supply Chain Threats What Ransomware Groups Look for in Enterprise Victims Ransomware attackers cast a wide net -- they just care about causing damage, making money, and gaining new victims. That means no organization is automatically immune to attack just because of its size or industry. Organizations need to take steps ... How to Use Threat Intelligence to Mitigate Third-Party Risk The report discusses the various steps of a continuous third-party intelligence lifecycle: Data collection, Data classification, Data storage, Data analysis, reporting, dissemination, continuous monitoring, data governance, and choosing the right technology stack. The report also includes information about how attackers ... | View More Dark Reading Reports >> |
|
|
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|