Threat actors seen using Go-language implementation of the red-teaming tool on Intel and Apple silicon-based macOS systems.
Follow Dark Reading:
 May 17, 2023
LATEST SECURITY NEWS & COMMENTARY
Attackers Target macOS With 'Geacon' Cobalt Strike Tool
Threat actors seen using Go-language implementation of the red-teaming tool on Intel and Apple silicon-based macOS systems.
Severe RCE Bugs Open Thousands of Industrial IoT Devices to Cyberattack
Researchers found 11 vulnerabilities in products from three industrial cellular router vendors that attackers can exploit through various vectors, bypassing all security layers.
'MichaelKors' Showcases Ransomware's Fashionable VMware ESXi Hypervisor Trend
Wide use and lack of support for malware detection technologies has made VMware's virtualization technology a prime target for cyberattackers.
4 Big Mistakes to Avoid in OT Incident Response
What works in IT may not in an operational technology/industrial control systems environment where availability and safety of operations must be maintained.
Name That Toon: One by One
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Russian Ransomware Perp Charged After High-Profile Hive, Babuk & LockBit Hits
LockBit, Babuk, and Hive ransomware used by Russian to target critical US organizations, DOJ says.
Qilin Ransomware Operation Outfits Affiliates With Sleek, Turnkey Cyberattacks
Researchers infiltrate a ransomware operation and discover slick services behind Qilin's Rust-based malware variant.
(Sponsored Article) 2023 AT&T Cybersecurity Insights Report: Edge Ecosystem
The 2023 AT&T Cybersecurity Insights Report examines how edge use cases are evolving, how organizations are changing to deliver better business outcomes through digital first experiences, and how an integrated ecosystem can work together to put security at the core of edge computing.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Microsoft Advisories Are Getting Worse
A predictable patch cadence is nice, but the software giant can do more.

Toyota Discloses Decade-Long Data Leak Exposing 2.15M Customers' Data
A misconfigured cloud instance exposed vehicle data, but not personally identifiable information, the car maker says.

Severe RCE Bugs Open Thousands of Industrial IoT Devices to Cyberattack
Researchers found 11 vulnerabilities in products from three industrial cellular router vendors that attackers can exploit through various vectors, bypassing all security layers.

MORE
EDITORS' CHOICE
TSA Official: Feds Improved Cybersecurity Response Post-Colonial Pipeline
US Transportation Security Agency (TSA) administrator reflects on how the Colonial Pipeline incident has moved the needle in public-private cooperation.
LATEST FROM DR GLOBAL

BEC Campaign via Israel Spotted Targeting Large Multinational Companies
The latest scams request historically high sums of around $700,000.
LATEST FROM THE EDGE

How Boards Can Set Enforceable Cyber Risk Tolerance Levels
Boards love to say they have low risk tolerance, but are they willing to make the expensive and painful decisions to make it truly happen?
LATEST FROM DR TECHNOLOGY

Microsoft Authenticator to Enforce Number Matching
As a way to enhance MFA security, Microsoft will require users to authorize login attempts by entering a numeric code into the Microsoft Authenticator app.
WEBINARS
  • Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks

    Even as the debate over return to work rages on, it is clear the enterprise network will never be the same. Remote work is now the norm, and many organizations have shifted to digital business models. Network architectures, and the ...

  • Puzzled by Patching: Solve Endpoint Pains

    In this webinar, you'll learn critical steps to improve your security posture and reduce patching complexity so that your IT team can do more with less while keeping security at the forefront. Now is the time to slay the time-consuming ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
  • How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment

    Concerns over API security and low-code/no-code use added to an already-full plate of application security challenges for many organizations over the last year. IT and security decision-makers are deeply concerned about compromises resulting from vulnerabilities in the software supply ...

  • Successfully Managing Identity in Modern Cloud and Hybrid Environments

    Cloud promised to simplify the security and management of enterprise systems. In many ways it has, but when it comes to identity management it's as complicated as ever. This report details how to get identity programs on track -- and ...

  • The Promise and Reality of Cloud Security

    Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises. The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises ...

View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.