After compromising Azure and Outlook user accounts, threat actors are creating malicious apps with high privileges to conduct cryptomining, phishing, and password spraying.
Follow Dark Reading:
 December 14, 2023
LATEST SECURITY NEWS & COMMENTARY
Attackers Target Microsoft Accounts to Weaponize OAuth Apps
After compromising Azure and Outlook user accounts, threat actors are creating malicious apps with high privileges to conduct cryptomining, phishing, and password spraying.
Global TeamCity Exploitation Opens Door to SolarWinds-Style Nightmare
Russia's APT29 is going after a critical RCE flaw in the JetBrains TeamCity software developer platform, prompting governments worldwide to issue an urgent warning to patch.
MITRE Debuts ICS Threat Modeling for Embedded Systems
EMB3D, like ATT&CK and CWE, seeks to provide a common understanding of cyber-threats to embedded devices and of the security mechanisms for addressing them.
Hacktivists Interrupt UAE TV Streams With a Message About Gaza
The root cause may lie in set-top boxes run by a questionable service provider.
Software & Security: How to Move Supply Chain Security Up the Agenda
Getting more insight helps you to prioritize across all your systems, letting you drive more collaboration, real change, and real success for your teams.
Ransomware Gangs Use PR Charm Offensive to Pressure Victims
Threat actors are fully embracing the spin machine: rebranding, speaking with the media, writing detailed FAQs, and more, all in an effort to make headlines.
(Sponsored Article) The SOC's Future Is a Security Platform
SOC tools must evolve, and a unified platform with a comprehensive, proactive protection and Gen AI can tip the scales in favor of your defenders.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Dozens of Bugs Patched in Apple TVs and Watches, Macs, iPads, iPhones
A laundry list of tweaks to Safari, Bluetooth, Accessibility, and much more.

Biden's AI Exec Order Is a Start, but We Must Safeguard Innovation
It's important for Congress to strengthen protections for AI and set guardrails to make sure it isn't used maliciously.

Cybercrime Orgs Increasingly Use Human Trafficking to Staff Scam Mills
Interpol breaks up Southeast Asian cybercrime rings, rescuing 149 victims of human trafficking, but the agency warns the human cost of cybercrime is mounting across the globe.

Data's Perilous Journey & Lessons Not Learned From the Target Breach
A decade after Target suffered a major security breach, are we still disregarding the gaping holes in our cyber fortifications?

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Microsoft Gives Admins a Reprieve With Lighter-Than-Usual Patch Update
The company's final patch release for 2023 contained fixes for a total of just 36 vulnerabilities — none of which, for a change, were zero-days.
LATEST FROM THE EDGE

Tips for Modernizing SecOps Teams
Dark Reading's special report looks at ways security operations teams can improve their efficiency and effectiveness to address the latest threats.
LATEST FROM DR TECHNOLOGY

Confidential AI Protects Data and Models Across Clouds
Confidential AI integrates zero trust and confidential computing to guard data and models during inferencing, training, learning, and fine-tuning.
LATEST FROM DR GLOBAL

Saudi Cyber Students Team with Bahrain to Assess AI Security & Risk
A visit to the "Island of Pearls" is part of ongoing regional efforts to enhance cooperation and exchange knowledge between universities in the cyber and technology sectors.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.