Operation Behind Predator Mobile Spyware Is 'Industrial Scale'
The Intellexa alliance has been using a range of tools for intercepting and subverting mobile and Wi-Fi technologies to deploy its surveillance tools, according to an investigation by Amnesty Internat...
https://www.darkreading.com/endpoint/operation-behind-predator-mobile-spyware-industrial-scale
Cybersecurity Talent in America: Bridging the Gap
It's past time to reimagine how to best nurture talent and expand recruiting and training to alleviate the shortage of trained cybersecurity staff. We need a diverse talent pool trained for tomorrow's...
https://www.darkreading.com/operations/cybersecurity-talent-in-america-bridging-the-gap
The Need for Speed: When Cloud Attacks Take Only 10 Minutes
Security sensors are common in the home for both prevention and response in the event something goes wrong. But in the cloud, have you taken the same approach?
https://www.darkreading.com/cloud/the-need-for-speed-when-cloud-attacks-take-only-10-minutes
Google, Yahoo Push DMARC Forcing Companies to Catch Up
The move by the two giants means that DMARC, already in use by half of enterprises, will become table stakes for anyone using email for marketing, with all users set to benefit.
https://www.darkreading.com/dr-tech/google-yahoo-push-dmarc-forcing-companies-to-catch-up
Too Rich To Ransomware? MGM Brushes Off $100M in Losses
MGM wins big bet that days of operations outages is better business than paying a ransom, following last month's data breach.
https://www.darkreading.com/attacks-breaches/too-rich-to-ransomware-mgm-brushes-off-100m-in-losses-
RIT Is the First University to Receive Support From the Google Cybersecurity Clinics Fund
WatchGuard Threat Lab Report Finds Endpoint Malware Volumes Decreasing Despite Campaigns Growing More Expansive
Predictive Analysis Can Reduce Risks Associated With Data Breaches
Cybersecurity Funding Rises by 21% in Q3 2023, Pinpoint Search Group's Report Indicates
SecTor 2023: Full Schedule Programming for Toronto Event
https://www.darkreading.com/attacks-breaches/sector-2023-full-schedule-programming-for-toronto-event
23andMe Cyberbreach Exposes DNA Data, Potential Family Ties
The information leaked in the breach involves personally identifiable information as well as genetic ancestry data, potential relatives, and geolocations.
https://www.darkreading.com/attacks-breaches/23andme-cyberbreach-exposed-dna-data-family-ties
Suspected Crime Gang Hacks Israeli President's Telegram Account
The encrypted messaging app was hacked in the wake of an online scam before access was "swiftly restored."
https://www.darkreading.com/dr-global/suspected-crime-gang-hacks-israeli-president-telegram-account
Preparing for the Unexpected: A Proactive Approach to Operational Resilience
Try these steps to create an operational resilience action plan that will satisfy financial regulators and help sustain business without disruption.
Quash EDR/XDR Exploits With These Countermeasures
With tools and hacker groups constantly evading defenses, expanding cybersecurity beyond endpoint security becomes crucial.
https://www.darkreading.com/dr-tech/quash-edr-xdr-exploits-with-these-countermeasures
Legions of Critical Infrastructure Devices Subject to Cyber Targeting
Nearly 100,000 ICS devices have been found open to the public Internet, potentially threatening physical safety globally. Here's how to quantify the risk.
https://www.darkreading.com/ics-ot/legions-critical-infrastructure-devices-open-cyber-targeting
'Operation Jacana' Reveals DinodasRAT Custom Backdoor
The previously undocumented data exfiltration malware was part of a successful cyber-espionage campaign against the Guyanese government, likely by the Chinese.
https://www.darkreading.com/threat-intelligence/operation-jacana-dinodasrat-custom-backdoor
10 Routine Security Gaffes the Feds Are Begging You to Fix
Here are the most common misconfigurations plaguing large organizations, according to a new joint cybersecurity advisory.
Madagascar Drops Predator Spyware on Citizens in Watering Hole Attack
The Predator spyware was distributed by dropping malicious links inside typosquatted facsimiles of news websites.
https://www.darkreading.com/dr-global/madagascar-predator-spyware-citizens-watering-hole-attack
Critical 'ShellTorch' Flaws Light Up Open Source AI Users, Like Google
The vulnerabilities exist in the widely used TorchServe framework, used by Amazon, Google, Walmart, and many other heavy hitters.
https://www.darkreading.com/application-security/critical-shelltorch-flaws-open-source-ai-google
Stealthy, Thieving Python Packages Slither Onto Windows Systems
A campaign that's been active since April has already racked up nearly 75,000 downloads, stealing data and cryptocurrency in the process.