Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

Predator Spyware Operators Slapped With US Sanctions

The US Treasury Department sanctioned Intellexa Consortium commercial surveillance leaders in an effort to deter Predator proliferation.

https://www.darkreading.com/endpoint-security/global-commercial-spyware-operators-sanctioned-by-us

Why Criminals Like AI for Synthetic Identity Fraud

The wide availability of generative AI will make synthetic identity fraud even easier. Organizations need a multilayered defense to protect themselves.

https://www.darkreading.com/cyber-risk/why-criminals-like-ai-for-synthetic-identity-fraud

Army Vet Spills National Secrets to Fake Ukrainian Girlfriend

The retired US Army lieutenant colonel faces up to 10 years in prison if convicted of sharing secret information about the Russia-Ukraine war with a scammer posing as romantic connection.

https://www.darkreading.com/cyber-risk/air-force-employee-shares-classified-info-via-dating-app-charged-with-conspiracy

BlackCat Goes Dark After Ripping Off Change Healthcare Ransom

Source code fire sale, stiffing affiliates — are BlackCat admins intentionally burning their RaaS business to the ground? Experts say something's up.

https://www.darkreading.com/cyberattacks-data-breaches/blackcat-goes-dark-again-reportedly-rips-off-change-healthcare-ransom

North Korea Hits ScreenConnect Bugs to Drop 'ToddleShark' Malware

North Korea's latest espionage tool is tough to pin down, with random generators that throw detection mechanisms off its scent. The DPRK is using the recent critical bugs in ConnectWise ScreenConnect,...

https://www.darkreading.com/remote-workforce/north-korea-screenconnect-bugs-toddleshark-malware

Improved, Stuxnet-Like PLC Malware Aims to Disrupt Critical Infrastructure

A newly developed PLC malware does not require physical access to target an ICS environment, is mostly platform neutral, and is more resilient than traditional malware aimed at critical infrastructure...

https://www.darkreading.com/ics-ot-security/improved-stuxnet-like-plc-malware-disrupt-critical-infrastructure

Fast-Growing RA Ransomware Group Goes Global

The rapidly evolving threat group uses high-impact tactics that include manipulating group policy to deploy payloads across environments.

https://www.darkreading.com/ics-ot-security/fast-growing-ra-ransomware-group-goes-global

Navigating Biometric Data Security Risks in the Digital Age

Biometrics is increasingly common for authentication, and organizations must make sure their data security solutions protect what may be a new goldmine for hackers.

https://www.darkreading.com/cyber-risk/navigating-biometric-data-security-risks-digital-age

GhostLocker 2.0 Haunts Businesses Across Middle East, Africa & Asia

Ransomware cybercrime gangs GhostSec and Stormous have teamed up in widespread double-extortion attacks.

https://www.darkreading.com/cyberattacks-data-breaches/ghostlocker-two-threatens-businesses-across-middle-east-africa-asia

Seoul Spies Say North Korea Hackers Stole Semiconductor Secrets

DPRK is using cyberattacks to steal designs and other data from South Korean microchip manufacturers, according to the National Intelligence Service.

https://www.darkreading.com/cyberattacks-data-breaches/seoul-spies-say-north-korea-hackers-stole-semiconductor-secrets

Critical TeamCity Bugs Endanger Software Supply Chain

Customers should immediately patch critical vulnerabilities in on-prem deployments of the CI/CD pipeline tool JetBrains TeamCity that could allow threat actors to gain admin control over servers.

https://www.darkreading.com/application-security/critical-teamcity-bugs-endanger-software-supply-chain

Zero-Click GenAI Worm Spreads Malware, Poisoning Models

35 years after the Morris worm, we're still dealing with a version of the same issue: data overlapping with control.

https://www.darkreading.com/application-security/zero-click-genai-worm-malware-poisoning-models

Amex Customer Data Exposed in Third-Party Breach

The breach occurred through a third-party service provider frequently used by the company's travel services division.

https://www.darkreading.com/cyberattacks-data-breaches/amex-customer-data-exposed-third-party-breach

Predator Spyware Alive & Well and Expanding

Mercenary spyware operator has rebuilt its network infrastructure and now operates in 11 countries, with one of the newest additions, Botswana.

https://www.darkreading.com/remote-workforce/predator-mobile-spyware-alive-and-well-and-expanding

Middle East Leads in Deployment of DMARC Email Security

Yet challenges remain as many nation's policies for the email authentication protocol remain lax and could run afoul of Google's and Yahoo's restrictions.

https://www.darkreading.com/cyber-risk/middle-east-leads-in-dmarc-deployment

Name That Edge Toon: How Charming

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

https://www.darkreading.com/ics-ot-security/name-that-edge-toon-how-charming

What Cybersecurity Chiefs Need From Their CEOs

By helping CISOs navigate the expectations being placed on their shoulders, CEOs can greatly benefit their companies.

https://www.darkreading.com/cybersecurity-operations/what-cybersecurity-chiefs-need-from-their-ceos

Millions of Malicious Repositories Flood GitHub

GitHub and cyberattackers are waging a quiet, automated war over malicious repos.

https://www.darkreading.com/application-security/millions-of-malicious-repositories-flood-github

Protect Critical Infrastructure With Same Rigor as Classified Networks

Government security processes are often viewed as tedious and burdensome — but applying the lessons learned from them is imperative for private industry to counter a nation-state threat.

https://www.darkreading.com/cyber-risk/protect-critical-infrastructure-with-same-rigor-as-classified-networks