Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

Akira Ransomware Mutates to Target Linux Systems, Adds TTPs

The newly emerged ransomware actively targets both Windows and Linux systems with a double-extortion approach.

https://www.darkreading.com/attacks-breaches/akira-ransomware-mutates-to-target-linux-systems-adds-ttps

NFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII

The league is working with more than 100 partners to workshop responses to a host of hypothetical cyberattacks on the upcoming Big Game in Las Vegas.

https://www.darkreading.com/ics-ot/nfl-cisa-intercept-cyber-threats-super-bowl-lviii

MGM, Caesars Cyberattack Responses Required Brutal Choices

Tens of millions in losses later, the MGM and Caesars systems are back online following dual cyberattacks by the same threat actor — here's what experts say about their incident responses.

https://www.darkreading.com/application-security/mgm-caesars-incident-responses-required-brutal-choices

Apple Fixes 3 More Zero-Day Vulnerabilities

All of the security bugs are under active attacks, but the extent of their exploitation is unknown.

https://www.darkreading.com/application-security/apple-fixes-3-more-zero-day-vulnerabilities

Bot Swarm: Attacks From Middle East & Africa Are Notably Up

Most automated attacks from the regions were against e-commerce and telecommunications organizations.

https://www.darkreading.com/dr-global/bot-attacks-from-middle-east-and-africa-increased-last-year

ASPM Is Good, But It's Not a Cure-All for App Security

What application security posture management does, it does well. But you'll still need to fill in some holes, especially concerning API security.

https://www.darkreading.com/dr-tech/aspm-is-good-but-not-complete

Guardians of the Cyberverse: Building a Resilient Security Culture

Whether achieved through AI-enabled automation, proactive identification and resolution of issues, or the equitable distribution of risk management responsibilities, the goal must be resilience.

https://www.darkreading.com/vulnerabilities-threats/guardians-of-the-cyberverse-building-a-resilient-security-culture

Cisco Moves into SIEM with $28B Deal to Acquire Splunk

Cisco's surprise agreement could reshape secure information and event management (SIEM) and extended detection and response (XDR) markets.

https://www.darkreading.com/operations/cisco-moves-into-siem-with-28b-deal-to-acquire-splunk

Secure Browser Tech Is Having a Moment

Cloud adoption is driving secure browsers' moment in the sun as rumors fly that Palo Alto Networks is looking to snap up Talon.

https://www.darkreading.com/dr-tech/secure-browser-tech-is-having-a-moment

Mysterious 'Sandman' APT Targets Telecom Sector With Novel Backdoor

The Sandman group's main malware is among the very few that use the Lua scripting language and its just-in-time compiler.

https://www.darkreading.com/attacks-breaches/mysterious-sandman-apt-targets-telecom-sector-with-novel-backdoor

What Does Socrates Have to Do With CPM?

It's time to focus on the "P" in cybersecurity performance management.

https://www.darkreading.com/edge-ask-the-experts/what-does-socrates-have-to-do-with-cpm-

'Gold Melody' Access Broker Plays on Unpatched Servers' Strings

A financially motivated threat actor uses known vulnerabilities, ordinary TTPs, and off-the-shelf tools to exploit the unprepared, highlighting the fact that many organizations still don't focus on th...

https://www.darkreading.com/threat-intelligence/-gold-melody-access-broker-unpatched-servers

T-Mobile Racks Up Third Consumer Data Exposure of 2023

The mobile company states that the issue was due to a glitch that occurred in an update.

https://www.darkreading.com/application-security/t-mobile-third-consumer-data-exposure-2023

MGM Restores Casino Operations 10 Days After Cyberattack

The lost revenue due to downtime for gaming and hotel bookings is difficult to ballpark.

https://www.darkreading.com/endpoint/mgm-restores-casino-operations-10-days-after-cyberattack

Growing Chinese Tech Influence in Africa Spurs 'Soft Power' Concerns

A working group is rolling out in developing parts of the world, in response to concerns about the amount of technology being rolled out and across Africa by Chinese companies.

https://www.darkreading.com/dr-global/chinese-tech-influence-africa-soft-power-concerns

Mastering Defense-In-Depth and Data Security in the Cloud Era

Though widely used in many organizations, the concept still requires adaptation when aimed at protecting against new types of attacks.

https://www.darkreading.com/cloud/mastering-defense-in-depth-and-data-security-in-the-cloud-era

Hikvision Intercoms Allow Snooping on Neighbors

The intercoms are used in thousands of apartments and offices across the world, and they can be used to spy on targets through the other devices they connect to.

https://www.darkreading.com/iot/hikvision-intercoms-snooping-neighbors

BBTok Banking Trojan Impersonates 40+ Banks to Hijack Victim Accounts

Attackers use convincing fake website interfaces and sophisticated geo-fencing to target users exclusively in Mexico and Brazil with a new variant of the malware.

https://www.darkreading.com/endpoint/bbtok-banking-trojan-impersonates-40-banks-to-hijack-victim-accounts