Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

Infrastructure Cyberattacks, AI-Powered Threats Pummel Africa

Convincing phishing emails, synthetic identities, and deepfakes all have been spotted in cyberattacks on the continent.

https://www.darkreading.com/vulnerabilities-threats/ai-powered-threats-cyberattacks-on-infrastructure-pummel-africa

Cloud Apps Make the Case for Pentesting-as-a-Service

Applications are increasingly distributed, expanding companies' cloud attack surfaces, and requiring regular testing to find and fix vulnerabilities — else companies risk a growing sprawl of services.

https://www.darkreading.com/application-security/pentesting-as-a-service-cloud-applications

Microsoft Zero Day Used by Lazarus in Rootkit Attack

North Korean state actors Lazarus Group used a Windows AppLocker zero day, along with a new and improved rootkit, in a recent cyberattack, researchers report.

https://www.darkreading.com/vulnerabilities-threats/microsoft-zero-day-used-by-lazarus-in-rootkit-attack

FBI, CISA Release IoCs for Phobos Ransomware

Threat actors using the malware have infected systems within government, healthcare, and other critical infrastructure organizations since at least 2019.

https://www.darkreading.com/cyberattacks-data-breaches/fbi-cisa-release-iocs-for-phobos-ransomware

Chinese APT Developing Exploits to Defeat Already Patched Ivanti Users

More bad news for Ivanti customers: soon, even if you've patched, you still might not be safe from relentless attacks from high-level Chinese threat actors.

https://www.darkreading.com/endpoint-security/chinese-apt-exploits-defeat-patched-ivanti-users

Biden Administration Unveils Data Privacy Executive Order

The presidential move orders a variety of different departments and organizations to regulate personal data better and provide clear, high standards to prevent foreign access.

https://www.darkreading.com/cyber-risk/biden-administration-unveils-data-privacy-executive-order

MITRE Rolls Out 4 Brand-New CWEs for Microprocessor Security Bugs

Goal is to give chip designers and security practitioners in the semiconductor space a better understanding of major microprocessor flaws like Meltdown and Spectre.

https://www.darkreading.com/endpoint-security/four-new-cwes-released-for-microprocessor-architectures

Hugging Face AI Platform Riddled With 100 Malicious Code-Execution Models

The finding underscores the growing risk of weaponizing publicly available AI models and the need for better security to combat the looming threat.

https://www.darkreading.com/application-security/hugging-face-ai-platform-100-malicious-code-execution-models

MTTR: The Most Important Security Metric

Measuring and tracking your mean time to remediate shows whether vulnerability management is reducing risk and closing opportunities for adversaries.

https://www.darkreading.com/cyberattacks-data-breaches/mttr-most-important-security-metric

Ransomware-as-a-Service Spawns Wave of Cyberattacks in Middle East & Africa

Experts advise organizations in the region to refuse to pay ransom demands.

https://www.darkreading.com/cyberattacks-data-breaches/ransomware-as-a-service-spawns-widespread-cyberattacks-in-mea

Echoes of SolarWinds in New 'Silver SAML' Attack Technique

A successor to the "Golden SAML" tactic used in the SolarWinds campaign, this new technique taps SAML response forgery to gain illegitimate access to apps and services.

https://www.darkreading.com/cyber-risk/researchers-release-details-on-new-silver-saml-attack-technique

US Government Expands Role in Software Security

The White House Office of the National Cyber Director puts software developers on notice, calling for a move to memory-safe programming languages and the development of security metrics.

https://www.darkreading.com/application-security/us-government-taking-bigger-role-in-software-security

Meet 'XHelper,' the All-in-One Android App for Global Money Laundering

User-friendly apps allow anybody to serve as traffickers for cybercrime syndicates.

https://www.darkreading.com/threat-intelligence/xhelper-all-in-one-android-app-global-money-laundering

'Voltzite' Zaps African Utilities as Part of Volt Typhoon's Onslaught

The China-backed APT that's been trying to set itself up inside US critical infrastructure for the purpose of disrupting physical processes is deploying a similar playbook in Africa.

https://www.darkreading.com/vulnerabilities-threats/voltzite-zaps-african-utilities-volt-typhoon-onslaught

Cyberattackers Lure EU Diplomats With Wine-Tasting Offers

A targeted attack aiming to exploit geopolitical relations between India and Europe delivers previously undocumented, uniquely evasive backdoor malware.

https://www.darkreading.com/cyberattacks-data-breaches/cyberattackers-lure-eu-diplomats-wine-tasting-offers

Converging State Privacy Laws and the Emerging AI Challenge

It's time for companies to look at what they're processing, what types of risk they have, and how they plan to mitigate that risk.

https://www.darkreading.com/cyber-risk/converging-state-privacy-laws-emerging-ai-challenge