Deepfake-Generating Apps Explode, Allowing Multimillion-Dollar Corporate Heists
Deepfakes are fast becoming more realistic, and access to them more democratic, enabling even ordinary attackers to enact major fraud. What's the most effective way to fight back?
AnyDesk Compromised, Passwords Revoked
Production systems at the remote access company were breached, leading AnyDesk to revoke code signing certificate and reset Web portal credentials as part of its incident response.
https://www.darkreading.com/endpoint-security/anydesk-compromised-passwords-revoked
Pegasus Spyware Targets Jordanian Civil Society in Wide-Ranging Attacks
As the Middle East nation enforces strict cybercrime laws, citizens face crackdowns on free speech with nearly three dozen journalists and lawyers targeted with the NSO Group's spyware.
https://www.darkreading.com/vulnerabilities-threats/pegasus-spyware-targets-jordanian-civil-society
Nigerian President Dismisses Nation's 'Cybercrime Haven' Image
President Bola Tinubu says country is not a nation of cybercriminals, despite being the originator of the infamous "Nigerian Prince" scam.
https://www.darkreading.com/endpoint-security/nigerian-president-dismisses-cybercrime-haven-image
African Cybersecurity: Facing 2024's Biggest Hurdles
Key trends in African information security this year will include biometric deployments and privacy concerns, and the rise of misinformation.
Name That Edge Toon: The Great Escape
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
https://www.darkreading.com/endpoint-security/name-that-edge-toon-the-great-escape
Teens Committing Scary Cybercrimes, What's Behind the Trend?
Crypto theft, sextortion tactics, swattings, and ransomware: teenagers are increasingly taking up cybercrime for fun and profit — and experts credit an array of contributing factors.
https://www.darkreading.com/threat-intelligence/teens-committing-scary-cybercrimes-trend
How the SEC's Rules on Cybersecurity Incident Disclosure Are Exploited
Cyber hygiene is no longer a nice-to-have but necessary for organizations that want to survive the relentless barrage of cyberattacks being unleashed daily.
Forget Deepfakes or Phishing: Prompt Injection is GenAI's Biggest Problem
With prompt injection, AI puts new spin on an old security problem
CISO Corner: Gen Z Challenges, CISO Liability & Cathay Pacific Case Study
Dark Reading's roundup of strategic cyber-operations insights for chief information security officers.
Myanmar Hands Over Mob Bosses in Cyber-Fraud Bust
Heads of top crime syndicates extradited to China are implicated in pig-butchering "fraud dens," but four individuals on China's most-wanted list still remain at large.
https://www.darkreading.com/threat-intelligence/myanmar-hands-over-10-suspects-cyber-fraud-bust
macOS Malware Campaign Showcases Novel Delivery Technique
Threat actor behind the Activator macOS backdoor is using pirated apps to distribute the malware in what could be a botnet-building operation.
Interpol's 'Synergia' Op Nabs Dozens of Cybercriminals, Zaps Global C2s
The largest number of takedowns in Africa were in South Sudan and Zimbabwe.
South African Railways Lost Over $1M in Phishing Scam
Just over half of the stolen funds have been recovered.
https://www.darkreading.com/endpoint-security/south-african-railways-reports-1m-phishing
Google Play Used to Spread 'Patchwork' APT's Espionage Apps
The Indian state-sponsored cyberattackers lurked in Google's official app store, distributing a new RAT and spying on Pakistanis.
https://www.darkreading.com/endpoint-security/google-play-spread-patchwork-apt-espionage-apps
Why Gen Z Is the New Force Reshaping OT Security
Modernizing legacy operational technology (OT) systems to align with younger workers' technology habits, skills, and expectations can enhance security and resiliency.
https://www.darkreading.com/ics-ot-security/why-genz-new-force-reshaping-ot-security
Cloudflare Falls Victim to Okta Breach, Atlassian Systems Cracked
The cyberattackers, believed to be state sponsored, didn't get far into Cloudflare's global network, but not for lack of trying.
New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol
CISA Orders Ivanti VPN Appliances Disconnected: What to Do
US federal agencies have to disconnect, rebuild, and reconfigure all Ivanti Connect Secure and Policy Secure VPN appliances. This Tech Tip lists all the steps that need to happen.
ProcessUnity Introduces Industry's All-In-One Third-Party Risk Management Platform