Akira Ransomware Mutates to Target Linux Systems, Adds TTPs
The newly emerged ransomware actively targets both Windows and Linux systems with a double-extortion approach.
NFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII
The league is working with more than 100 partners to workshop responses to a host of hypothetical cyberattacks on the upcoming Big Game in Las Vegas.
https://www.darkreading.com/ics-ot/nfl-cisa-intercept-cyber-threats-super-bowl-lviii
MGM, Caesars Cyberattack Responses Required Brutal Choices
Tens of millions in losses later, the MGM and Caesars systems are back online following dual cyberattacks by the same threat actor — here's what experts say about their incident responses.
Apple Fixes 3 More Zero-Day Vulnerabilities
All of the security bugs are under active attacks, but the extent of their exploitation is unknown.
https://www.darkreading.com/application-security/apple-fixes-3-more-zero-day-vulnerabilities
Bot Swarm: Attacks From Middle East & Africa Are Notably Up
Most automated attacks from the regions were against e-commerce and telecommunications organizations.
https://www.darkreading.com/dr-global/bot-attacks-from-middle-east-and-africa-increased-last-year
ASPM Is Good, But It's Not a Cure-All for App Security
What application security posture management does, it does well. But you'll still need to fill in some holes, especially concerning API security.
https://www.darkreading.com/dr-tech/aspm-is-good-but-not-complete
Guardians of the Cyberverse: Building a Resilient Security Culture
Whether achieved through AI-enabled automation, proactive identification and resolution of issues, or the equitable distribution of risk management responsibilities, the goal must be resilience.
Cisco Moves into SIEM with $28B Deal to Acquire Splunk
Cisco's surprise agreement could reshape secure information and event management (SIEM) and extended detection and response (XDR) markets.
https://www.darkreading.com/operations/cisco-moves-into-siem-with-28b-deal-to-acquire-splunk
Secure Browser Tech Is Having a Moment
Cloud adoption is driving secure browsers' moment in the sun as rumors fly that Palo Alto Networks is looking to snap up Talon.
https://www.darkreading.com/dr-tech/secure-browser-tech-is-having-a-moment
Mysterious 'Sandman' APT Targets Telecom Sector With Novel Backdoor
The Sandman group's main malware is among the very few that use the Lua scripting language and its just-in-time compiler.
Salvador Technologies Wins Funding for $2.2M Cybersecurity Project From BIRD Foundation
What Does Socrates Have to Do With CPM?
It's time to focus on the "P" in cybersecurity performance management.
https://www.darkreading.com/edge-ask-the-experts/what-does-socrates-have-to-do-with-cpm-
'Gold Melody' Access Broker Plays on Unpatched Servers' Strings
A financially motivated threat actor uses known vulnerabilities, ordinary TTPs, and off-the-shelf tools to exploit the unprepared, highlighting the fact that many organizations still don't focus on th...
https://www.darkreading.com/threat-intelligence/-gold-melody-access-broker-unpatched-servers
T-Mobile Racks Up Third Consumer Data Exposure of 2023
The mobile company states that the issue was due to a glitch that occurred in an update.
https://www.darkreading.com/application-security/t-mobile-third-consumer-data-exposure-2023
OPSWAT-Sponsored SANS 2023 ICS/OT Cybersecurity Report Reveals Vital Priorities to Mitigate Ongoing Threats
MGM Restores Casino Operations 10 Days After Cyberattack
The lost revenue due to downtime for gaming and hotel bookings is difficult to ballpark.
https://www.darkreading.com/endpoint/mgm-restores-casino-operations-10-days-after-cyberattack
Growing Chinese Tech Influence in Africa Spurs 'Soft Power' Concerns
A working group is rolling out in developing parts of the world, in response to concerns about the amount of technology being rolled out and across Africa by Chinese companies.
https://www.darkreading.com/dr-global/chinese-tech-influence-africa-soft-power-concerns
Mastering Defense-In-Depth and Data Security in the Cloud Era
Though widely used in many organizations, the concept still requires adaptation when aimed at protecting against new types of attacks.
https://www.darkreading.com/cloud/mastering-defense-in-depth-and-data-security-in-the-cloud-era
Hikvision Intercoms Allow Snooping on Neighbors
The intercoms are used in thousands of apartments and offices across the world, and they can be used to spy on targets through the other devices they connect to.
https://www.darkreading.com/iot/hikvision-intercoms-snooping-neighbors
BBTok Banking Trojan Impersonates 40+ Banks to Hijack Victim Accounts
Attackers use convincing fake website interfaces and sophisticated geo-fencing to target users exclusively in Mexico and Brazil with a new variant of the malware.