Although the group relies on good old phishing to deliver Royal ransomware, researchers say DEV-0569 regularly uses new and creative discovery techniques to lure victims.
Follow Dark Reading:
 November 21, 2022
LATEST SECURITY NEWS & COMMENTARY
DEV-0569 Ransomware Group Remarkably Innovative, Microsoft Cautions
Although the group relies on good old phishing to deliver Royal ransomware, researchers say DEV-0569 regularly uses new and creative discovery techniques to lure victims.
Australia's Hack-Back Plan Against Cyberattackers Raises Familiar Concerns
How far can its government — or any government or private company — go to proactively disrupt cyber threats without causing collateral damage?
Secure Offboarding in the Spotlight as Tech Layoffs Mount
A secure-by-design culture is needed to develop a comprehensive offboarding and identity management strategy that limits potential for broader compromise in case of unauthorized access.
The Next Generation of Supply Chain Attacks Is Here to Stay
With the proliferation of interconnected third-party applications, new strategies are needed to close the security gap.
Palo Alto Networks Focuses on Secure Coding with $195M Cider Deal
PAN plans to add Cider's CI/CD security platform to its Prisma Cloud suite of AppSec tools.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
China-Based Billbug APT Infiltrates Certificate Authority
Access to digital certificates would allow the Chinese-speaking espionage group to sign its custom malware and skate by security scanners.

Misconfigurations, Vulnerabilities Found in 95% of Applications
Weak configurations for encryption and missing security headers topped the list of software issues found during a variety of penetration and application security tests.

TMI Tech: How to Stop Vulnerable Software from 'Oversharing'
Stop chatty apps from oversharing and eliminate a hacker backdoor — train developers on "security first" while subjecting APIs to least-privilege zero-trust policies.

MORE
EDITORS' CHOICE
Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident
Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT security talent hampers cyber-defense initiatives.
LATEST FROM THE EDGE

Amid Legal Fallout, Cyber Insurers Redefine State-Sponsored Attacks as Act of War
As carriers rewrite their act-of-war exclusions following the NotPetya settlement between Mondelez and Zurich, organizations should read their cyber insurance policies carefully to see what is still covered.
LATEST FROM DR TECHNOLOGY

New Startup OpsHelm Tackles Cloud Misconfigurations
The company emerges from stealth with an automated security remediation product identifies and remediates cloud misconfigurations.
WEBINARS
  • How to Protect Your Legacy Software Applications

    Agile development and continuous integration/continuous deployment have changed the game for application development practices, leading enterprises to "shift left" and build security into the software development lifecycle to catch any vulnerabilities before applications go into production. But what about ...

  • Developing and Testing an Effective Breach Response Plan

    When cyber attackers hit your network and your databases have been breached, do you know what you have to do and who to call? What do you tell your customers, employees, and other stakeholders, and when do you tell them? ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.