Production systems at the remote access company were breached, leading AnyDesk to revoke code signing certificate and reset Web portal credentials as part of its incident response.
Follow Dark Reading:
 February 06, 2024
LATEST SECURITY NEWS & COMMENTARY
AnyDesk Compromised, Passwords Revoked
Production systems at the remote access company were breached, leading AnyDesk to revoke code signing certificate and reset Web portal credentials as part of its incident response.
Deepfake-Generating Apps Explode, Allowing Multimillion-Dollar Corporate Heists
Deepfakes are fast becoming more realistic, and access to them more democratic, enabling even ordinary attackers to enact major fraud. What's the most effective way to fight back?
Google: Govs Drive Sharp Growth of Commercial Spyware Cos
Private spyware vendors were behind nearly half of all zero-day exploits in Google products since 2014.
Teens Committing Scary Cybercrimes: What's Behind the Trend?
Crypto theft, sextortion tactics, swattings, and ransomware: teenagers are increasingly taking up cybercrime for fun and profit — and experts credit an array of contributing factors.
Fresh 'Mispadu Stealer' Variant Emerges
Latest iteration of the malware appears aimed at targets in Mexico.
Pegasus Spyware Targets Jordanian Civil Society in Wide-Ranging Attacks
As the Middle East nation enforces strict cybercrime laws, citizens face crackdowns on free speech with nearly three dozen journalists and lawyers targeted with the NSO Group's spyware.
How the SEC's Rules on Cybersecurity Incident Disclosure Are Exploited
Cyber hygiene is no longer a nice-to-have but necessary for organizations that want to survive the relentless barrage of cyberattacks being unleashed daily.
Nigerian President Dismisses Nation's 'Cybercrime Haven' Image
President Bola Tinubu says country is not a nation of cybercriminals, despite being the originator of the infamous "Nigerian Prince" scam.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
China Infiltrates US Critical Infrastructure in Ramp-up to Conflict
Threat actors linked to the People's Republic of China, such as Volt Typhoon, continue to "pre-position" themselves in the critical infrastructure of the United States, according to military and law enforcement officials.

macOS Malware Campaign Showcases Novel Delivery Technique
Threat actor behind the Activator macOS backdoor is using pirated apps to distribute the malware in what could be a botnet-building operation.

Why Gen Z Is the New Force Reshaping OT Security
Modernizing legacy operational technology (OT) systems to align with younger workers' technology habits, skills, and expectations can enhance security and resiliency.

CISO Corner: Gen Z Challenges, CISO Liability & Cathay Pacific Case Study
Dark Reading's roundup of strategic cyber-operations insights for chief information security officers.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Cloudflare Falls Victim to Okta Breach, Atlassian Systems Cracked
The cyberattackers, believed to be state sponsored, didn't get far into Cloudflare's global network, but not for lack of trying.
LATEST FROM THE EDGE

Name That Edge Toon: The Great Escape
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
LATEST FROM DR TECHNOLOGY

Google Open Sources AI-Boosted Fuzzing Framework
The fuzzing framework uses AI to boost code coverage and to speed up vulnerability discovery.
LATEST FROM DR GLOBAL

African Cybersecurity: Facing 2024's Biggest Hurdles
Key trends in African information security this year will include biometric deployments and privacy concerns, and the rise of misinformation.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.