Predator Spyware Operators Slapped With US Sanctions
The US Treasury Department sanctioned Intellexa Consortium commercial surveillance leaders in an effort to deter Predator proliferation.
https://www.darkreading.com/endpoint-security/global-commercial-spyware-operators-sanctioned-by-us
Why Criminals Like AI for Synthetic Identity Fraud
The wide availability of generative AI will make synthetic identity fraud even easier. Organizations need a multilayered defense to protect themselves.
https://www.darkreading.com/cyber-risk/why-criminals-like-ai-for-synthetic-identity-fraud
Army Vet Spills National Secrets to Fake Ukrainian Girlfriend
The retired US Army lieutenant colonel faces up to 10 years in prison if convicted of sharing secret information about the Russia-Ukraine war with a scammer posing as romantic connection.
BlackCat Goes Dark After Ripping Off Change Healthcare Ransom
Source code fire sale, stiffing affiliates — are BlackCat admins intentionally burning their RaaS business to the ground? Experts say something's up.
North Korea Hits ScreenConnect Bugs to Drop 'ToddleShark' Malware
North Korea's latest espionage tool is tough to pin down, with random generators that throw detection mechanisms off its scent. The DPRK is using the recent critical bugs in ConnectWise ScreenConnect,...
https://www.darkreading.com/remote-workforce/north-korea-screenconnect-bugs-toddleshark-malware
Improved, Stuxnet-Like PLC Malware Aims to Disrupt Critical Infrastructure
A newly developed PLC malware does not require physical access to target an ICS environment, is mostly platform neutral, and is more resilient than traditional malware aimed at critical infrastructure...
Fast-Growing RA Ransomware Group Goes Global
The rapidly evolving threat group uses high-impact tactics that include manipulating group policy to deploy payloads across environments.
https://www.darkreading.com/ics-ot-security/fast-growing-ra-ransomware-group-goes-global
Navigating Biometric Data Security Risks in the Digital Age
Biometrics is increasingly common for authentication, and organizations must make sure their data security solutions protect what may be a new goldmine for hackers.
https://www.darkreading.com/cyber-risk/navigating-biometric-data-security-risks-digital-age
GhostLocker 2.0 Haunts Businesses Across Middle East, Africa & Asia
Ransomware cybercrime gangs GhostSec and Stormous have teamed up in widespread double-extortion attacks.
Seoul Spies Say North Korea Hackers Stole Semiconductor Secrets
DPRK is using cyberattacks to steal designs and other data from South Korean microchip manufacturers, according to the National Intelligence Service.
Critical TeamCity Bugs Endanger Software Supply Chain
Customers should immediately patch critical vulnerabilities in on-prem deployments of the CI/CD pipeline tool JetBrains TeamCity that could allow threat actors to gain admin control over servers.
Zero-Click GenAI Worm Spreads Malware, Poisoning Models
35 years after the Morris worm, we're still dealing with a version of the same issue: data overlapping with control.
https://www.darkreading.com/application-security/zero-click-genai-worm-malware-poisoning-models
Amex Customer Data Exposed in Third-Party Breach
The breach occurred through a third-party service provider frequently used by the company's travel services division.
https://www.darkreading.com/cyberattacks-data-breaches/amex-customer-data-exposed-third-party-breach
Predator Spyware Alive & Well and Expanding
Mercenary spyware operator has rebuilt its network infrastructure and now operates in 11 countries, with one of the newest additions, Botswana.
https://www.darkreading.com/remote-workforce/predator-mobile-spyware-alive-and-well-and-expanding
Middle East Leads in Deployment of DMARC Email Security
Yet challenges remain as many nation's policies for the email authentication protocol remain lax and could run afoul of Google's and Yahoo's restrictions.
https://www.darkreading.com/cyber-risk/middle-east-leads-in-dmarc-deployment
Name That Edge Toon: How Charming
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
https://www.darkreading.com/ics-ot-security/name-that-edge-toon-how-charming
What Cybersecurity Chiefs Need From Their CEOs
By helping CISOs navigate the expectations being placed on their shoulders, CEOs can greatly benefit their companies.
https://www.darkreading.com/cybersecurity-operations/what-cybersecurity-chiefs-need-from-their-ceos
Millions of Malicious Repositories Flood GitHub
GitHub and cyberattackers are waging a quiet, automated war over malicious repos.
https://www.darkreading.com/application-security/millions-of-malicious-repositories-flood-github
WatchGuard Threat Lab Report Finds Endpoint Malware Volumes Decreasing Despite Campaigns Growing More Expansive
Protect Critical Infrastructure With Same Rigor as Classified Networks
Government security processes are often viewed as tedious and burdensome — but applying the lessons learned from them is imperative for private industry to counter a nation-state threat.