One South Korean victim gave up $3 million to cybercriminals, thanks to convincing law-enforcement impersonation scams that combine both psychology and technology.
| LATEST SECURITY NEWS & COMMENTARY | Sophisticated Vishing Campaigns Take World by Storm One South Korean victim gave up $3 million to cybercriminals, thanks to convincing law-enforcement impersonation scams that combine both psychology and technology. Typosquatting Wave Shows No Signs of Abating A spate of recent typosquatting attacks shows the scourge of this type of attack is still very much with us, even after decades of cyber defender experience with it. Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update Microsoft has disclosed fewer flaws and zero-days in the first three months of 2024 compared with the first quarter of the prior four years. The CISO Role Is Changing. Can CISOs Themselves Keep Up? What happens to security leaders that don't communicate security well enough? "Ask SolarWinds." Russia-Sponsored Cyberattackers Infiltrate Microsoft's Code Base The Midnight Blizzard APT is mounting a sustained, focused cyber campaign against the computing kahuna, using secrets it stole from emails back in January. 'The Weirdest Trend in Cybersecurity': Nation-States Returning to USBs USBs are fetch again, as major APTs from Russia, China, and beyond are turning to them for BYOD cyberattacks. Stealth Bomber: Atlassian Confluence Exploits Drop Web Shells In-Memory The proof-of-concept exploits for Atlassian Confluence would enable arbitrary code execution without requiring file system access. Japan Blames North Korea for PyPI Supply Chain Cyberattack Open source software ecosystem compromise leaves developers in Asia and around the globe at risk. Broke Cyber Pros Flock to Cybercrime Side Hustles Burned-out cybersecurity professionals dealing with layoffs and stressful working conditions are increasingly finding a better way to earn a buck: cybercrime. How Not to Become the Target of the Next Microsoft Hack The alarming number of cyber threats targeting Microsoft cloud applications shows cybersecurity needs an overhaul. The Ongoing Struggle to Protect PLCs A decade after Stuxnet, vulnerabilities in OT systems and programmable logic controllers remain exposed. How to Identify a Cyber Adversary: Standards of Proof Identifying the who, what, and how behind a cyberattack is crucial for preventing future strikes. MORE NEWS / MORE COMMENTARY | | | PRODUCTS & RELEASES | Codezero Raises $3.5M Seed Funding From Ballistic Ventures to Secure Multicloud Application Development Claroty Launches Advanced Anomaly Threat Detection for Medigate IT-Harvest Reaches Milestone With Ingestion of 10K Cybersecurity Products Into Dashboard Claroty Team82: 63% of Known Exploited Vulnerabilities Tracked by CISA Are on Healthcare Organization Networks Silence Laboratories Raises $4.1M Funding to Enable Privacy Preserving Collaborative Computing Bipartisan Members of Congress Introduce Enhanced Cybersecurity for SNAP Act to Secure Food Benefits Against Hackers and Thieves MORE PRODUCTS & RELEASES |
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|