Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

'The Weirdest Trend in Cybersecurity': Nation-States Returning to USBs

USBs are fetch again, as major APTs from Russia, China, and beyond are turning to them for BYOD cyberattacks.

https://www.darkreading.com/ics-ot-security/weirdest-trend-cybersecurity-nation-states-usb

How CISA Fights Cyber Threats During Election Primary Season

Election cyber threats come from various places, including compromised voting machines, AI deepfakes, and potential physical harm to workers. But CISA has been working diligently with various public a...

https://www.darkreading.com/cybersecurity-operations/cisa-fights-cyber-threats-election-primary-season

Don't Give Your Business Data to AI Companies

Handing over your business data to artificial intelligence companies comes with inherent risks.

https://www.darkreading.com/vulnerabilities-threats/dont-give-your-business-data-to-ai-companies

Linux Variants of Bifrost Trojan Evade Detection via Typosquatting

Spike in new versions of an old Trojan — which mimic legitimate VMware domains — alarms security researchers.

https://www.darkreading.com/cloud-security/stealthy-bifrost-rat-linux-variants-use-typosquatting-to-evade-detection-

China-Linked Cyber Spies Blend Watering Hole, Supply Chain Attacks

The nation-state group compromised the website of a Tibetan festival and a software application to target user systems in Asia.

https://www.darkreading.com/cyberattacks-data-breaches/china-linked-cyber-spies-blend-watering-hole-supply-chain-attacks

CISO Sixth Sense: NIST CSF 2.0's Govern Function

2024 will redefine CISO leadership while acknowledging the management gap.

https://www.darkreading.com/cybersecurity-operations/ciso-sixth-sense-nist-csf-2-govern-function

Japan on Line Breach: Clean Up Post-Merger Tech Sprawl

A Japanese ministry blames a shared Active Directory between merged tech companies Line and South Korea's Naver for a massive data breach last November.

https://www.darkreading.com/cybersecurity-operations/japan-line-breach-clean-up-post-merger-tech-sprawl

First BofA, Now Fidelity: Same Vendor Behind Third-Party Breaches

The private information of more than 28,000 people may have been accessed by unauthorized actors, thanks to a cyber incident at service provider Infosys McCamish — the same third party recently respon...

https://www.darkreading.com/cyberattacks-data-breaches/first-bofa-now-fidelity-same-vendor-third-party-breaches

Cloud-y Linux Malware Rains on Apache, Docker, Redis & Confluence

"Spinning YARN" cyberattackers wielding a Linux webshell are positioning for broader cloud compromise by exploiting common misconfigurations and a known Atlassian Confluence bug.

https://www.darkreading.com/cloud-security/cloud-y-linux-malware-rains-apache-docker-redis-confluence

Patch Now: Apple Zero-Day Exploits Bypass Kernel Security

A pair of critical bugs could open the door to complete system compromise, including access to location information, iPhone camera and mic, and messages. Rootkitted attackers could theoretically perfo...

https://www.darkreading.com/ics-ot-security/patch-now-apple-zero-day-exploits-bypass-kernel-security

Spoofed Zoom, Google & Skype Meetings Spread Corporate RATs

A Russian-language campaign aims to compromise corporate users on both Windows and Android devices by mimicking popular online collaboration applications.

https://www.darkreading.com/cyberattacks-data-breaches/spoofed-zoom-google-skype-meetings-spread-corporate-rats

10 Essential Processes for Reducing the Top 11 Cloud Risks

The Cloud Security Alliance's "Pandemic 11" cloud security challenges can be addressed by putting the right processes in place.

https://www.darkreading.com/cyber-risk/10-essential-processes-for-reducing-top-11-cloud-risks

The Rise of Social Engineering Fraud in Business Email Compromise

By examining common social engineering tactics and four of the most devious threat groups, organizations can better defend themselves.

https://www.darkreading.com/cyberattacks-data-breaches/the-rise-of-social-engineering-fraud-in-business-email-compromise

Southern Company Builds SBOM for Electric Power Substation

The utility's software bill of materials (SBOM) experiment aims to establish stronger supply chain security – and tighter defenses against potential cyberattacks.

https://www.darkreading.com/ics-ot-security/southern-company-builds-a-power-substation-sbom

The Challenges of AI Security Begin With Defining It

Security for AI is the Next Big Thing! Too bad no one knows what any of that really means.

https://www.darkreading.com/application-security/the-challenges-of-ai-security-begin-with-defining-it