The threat actor uses commands from legitimate IIS logs to communicate with custom tools in a savvy bid to hide traces of its activity on victim machines.
Follow Dark Reading:
 October 31, 2022
LATEST SECURITY NEWS & COMMENTARY
Cranefly Cyberspy Group Spawns Unique ISS Technique
The threat actor uses commands from legitimate IIS logs to communicate with custom tools in a savvy bid to hide traces of its activity on victim machines.
Urgent: Google Issues Emergency Patch for Chrome Zero-Day
With scant details attached, Google Chrome seeks to shore up yet another exploited zero-day vulnerability.
Dark Web Forum Busts Come Days Apart
Operators of The Real Deal and German Deep Web underground marketplaces are in custody for allegedly dealing in drugs, weapons, malware, and more.
Reimagining the Role of the CISO
Embedding security throughout your company has greater organizational impact and myriad benefits.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Cisco Warns AnyConnect VPNs Under Active Cyberattack
Older bugs in the AnyConnect Secure Mobility Client are being targeted in the wild, showcasing patch-management failures.

7 Hidden Social Media Cyber-Risks for Enterprises
Leaning on social media to amplify your company's brand? Here's a look at the emerging cybersecurity risks that can arise from TikTok, LinkedIn, Twitter, and other platforms.

How to Attract Top Research Talent for Your Bug Bounty Program
Successful bug bounty programs strike a balance between vendor benefits and researcher incentives.

Ransomware Gangs Ramp Up Industrial Attacks in US
The manufacturing segment was especially hard hit by cyberattacks in the third quarter of 2022.

MORE
EDITORS' CHOICE
Prepare Now for Critical Flaw in OpenSSL, Security Experts Warn
Even if the security bug is not another Heartbleed, prepare like it might be, they note — it has potentially sprawling ramifications.
LATEST FROM THE EDGE

Wanted: Cybersecurity Training That Breaks Down Silos
The next generation of cybersecurity pros will need to participate frequently in relevant training to expand their skills and stay engaged.
LATEST FROM DR TECHNOLOGY

Cloud Providers Throw Their Weight Behind Confidential Computing
New technologies designed into processors allow enterprises to leverage cloud advantages while meeting privacy regulations.
WEBINARS
  • Analyzing and Correlating Security Operations Data

    Most security operations centers aren't failing because they don't have enough data - they are failing because they have too much data. In this webinar, experts recommend tools and best practices for correlating information from multiple security systems so that ...

  • Understanding Cyber Attackers & Their Methods

    Every day, your enterprise is at risk of being hacked. But just who are the cyber attackers, and what are their motivations? What methods might they use to crack enterprise data, and how do they stage their attacks? Do you ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.