The gang's time from initial access to draining data out of a Veeam server is shockingly fast; after which the attackers went on to deploy actual ransomware in less than a day.
Follow Dark Reading:
 July 12, 2024
LATEST SECURITY NEWS & COMMENTARY
Akira Ransomware: Lightning-Fast Data Exfiltration in 2-ish Hours
The gang's time from initial access to draining data out of a Veeam server is shockingly fast; after which the attackers went on to deploy actual ransomware in less than a day.
Apple Warns iPhone Users in 98 Countries of More Spyware Attacks
Users receiving the warnings are likely being targeted based on who they are or what they do, according to the vendor.
FishXProxy Phishing Kit Outfits Cybercriminals for Success
A new end-to-end toolkit circulating on the Dark Web significantly lowers the barrier to entry for creating sophisticated campaigns that can avoid most traditional security detection and protection systems.
'Crystalray' Attacks Jump 10X, Using Only OSS to Steal Credentials
Remember when hackers used to write their own malware? Kids these days don't want to work, they just want freely available tools to do it for them.
Advance Auto Parts Data Breach Affects 2.3M Customers
Threat actors had access to the automotive provider's networks for more than a month before they were discovered.
Centralized Cyber-Incident Reporting Can Improve Effectiveness
Companies need robust cyber-response plans and a straightforward path to transparency.
(Sponsored Article) GenAI-Powered Attacks Change the Game
While GenAI tools increase the speed at which employees and organizations can operate, they also afford adversaries the same luxury.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Attackers Already Exploiting Flaws in Microsoft's July Security Update
In all, the company released fixes for a whopping 139 CVEs in its own products and four for non-Microsoft products.

Privacy & Security Concerns With AI Meeting Tools
Businesses need to find a balance between harnessing the benefits of AI assistants and safeguarding sensitive information — maintaining trust with employees and clients.

CISA Takedown of Ivanti Systems Is a Wake-up Call
The exploitation of vulnerabilities in Ivanti's software underscores the need for robust cybersecurity measures and proactive response strategies to mitigate risks and protect critical assets.

Fujitsu Suffers Worm-Like Attack From Something That Wasn't Ransomware
The CE giant released its investigative findings regarding a March cyberattack that resulted in data exfiltration affecting its Japanese operations.

Feds Uncover Sprawling, GenAI-Enabled Russian Troll Farm
The bot farm was created using AI-enhanced software that was able to create a host of different false personas to spread disinformation in convincing and unsettling ways.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Attackers Have Been Leveraging Microsoft Zero-Day for 18 Months
Likely two separate threat actors are using the just-patched CVE-2024-38112 in targeted, concurrent infostealer campaigns.
LATEST FROM THE EDGE

Trade the Comfort of Security Theater for True Security
It's time to wipe off the flattering grease paint and instead make executives see the real face of cybersecurity that works.
LATEST FROM DR TECHNOLOGY

Microsoft Melds Identity & SSE With Entra Suite
The integration of Entra Identity offerings with new security service edge (SSE) services to provide unified conditional access is seeking enterprise approval.
LATEST FROM DR GLOBAL

Microsoft's Partnership With Middle East AI Firm Under Scrutiny
The US government worries that Group 42 Holdings, an AI firm based in the United Arab Emirates, could become a backdoor for technology leaks to China.
WEBINARS
  • Search Capabilities with PostgreSQL: From Standard to Semantic

    In the digital age, the ability to sift through vast amounts of text data efficiently and effectively is crucial. PostgreSQL, a robust open-source relational database, offers various search functionalities that cater to multiple needs, from simple pattern matching to linguistic ...

  • Generative AI: Use Cases and Risks in 2024

    This webinar reviews use cases and risks in the leading generative AI applications and models, including market favorites ChatGPT, DALL-E 2, and AutoGPT.

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.