A Brief History of ICS-Tailored Attacks
It's on the cyber defenders to learn from the past and make industrial control system networks hostile to attackers.
https://www.darkreading.com/attacks-breaches/brief-history-of-ics-tailored-attacks
Adversaries Ride RocketMQ Bug to DreamBus Bot Resurgence
Last seen in 2021, DreamBus Monero crypto bot is back and finding new life on vulnerable RocketMQ servers.
Chinese Group Spreads Android Spyware Via Trojan Signal, Telegram Apps
Thousands of devices have become infected with "BadBazaar," malware previously used to spy on Uyghur and Turkic ethnic minorities in China.
APT Attacks From 'Earth Estries' Hit Gov't, Tech With Custom Malware
A sophisticated threat actor managed to fly under the radar for three years, despite flexing serious muscle.
New York Times Spoofed to Hide Russian Disinformation Campaign
"Operation Doppelganger" has convincingly masqueraded as multiple news sites with elaborate fake stories containing real bylines of journalists, blasting them out on social media platforms.
4 Strategies to Safeguard the Finance Industry Against Deepfake Onslaught
Through strategic measures and a united front, the finance industry can overcome the looming threat of deepfakes.
Performance-Enhanced Android MMRat Scurries onto Devices Via Fake App Stores
The stealthy Trojan targets users in Southeast Asia, allowing attackers to remotely control devices to commit bank fraud.
Should Senior IT Professionals Be Accountable for Professional Decisions?
Everyone makes mistakes — but what if your mistakes risk the security of millions of people?
In Airbnb, Cybercriminals Find a Comfortable Home for Fraud
The popular travel rental site is an ideal destination for cybercrooks bent on taking over accounts and bookings.
https://www.darkreading.com/threat-intelligence/airbnb-cybercriminals-comfortable-home-fraud
6 Ways AI Can Revolutionize Digital Forensics
Artificial intelligence tools can automate the analysis of logs, video, and other important but tedious aspects of investigations.
https://www.darkreading.com/dr-tech/6-ways-ai-can-revolutionize-digital-forensics
Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and Cyber Resilience
Delinea Research Reveals a Cyber Insurance Gap
https://www.darkreading.com/operations/delinea-research-reveals-a-cyber-insurance-gap
Unpatched Citrix NetScaler Devices Targeted by Ransomware Group FIN8
Citrix issued a patch for the critical remote code execution bug in July for its NetScaler devices.
SPHERE Appoints Former Johnson & Johnson CISO Marene Allison to Board of Directors
PurFoods Mom's Meals Reports Data Breach Exposing Social Security Numbers of Over 1.2 Million Consumers
Meta Cripples China's Signature 'Spamouflage' Influence Op
The social media giant is taking on Dragonbridge, the "largest known cross-platform covert influence operation in the world."
Sprawling Qakbot Malware Takedown Spans 700,000 Infected Machines
"Operation Duck Hunt" is not likely to eliminate the initial access botnet forever, but the proactive removal of the malware from victim machines by law enforcement is one of the largest and most sign...
MOVEit Was a SQL Injection Accident Waiting to Happen
SQL injection and its ilk will stop being "a thing" only after organizations focus on security by construction.
https://www.darkreading.com/edge-articles/moveit-was-a-sql-injection-accident-waiting-to-happen
Somalia Orders ISPs to Block Telegram and TikTok
Officials said the apps were used to "spread horrific content and misinformation to the public."
https://www.darkreading.com/dr-global/somalia-orders-isps-to-block-access-to-telegram-and-tiktok
South African Department of Defence Denies Stolen Data Claims
Attackers leaked 1.6TB of stolen data, which government officials dismissed as "fake news."
https://www.darkreading.com/dr-global/south-african-department-of-defence-denies-stolen-data-claims