Attackers are triggering victims' deep-seated fear of getting in trouble in order to spread the sophisticated stealer across continents.
Follow Dark Reading:
 November 07, 2024
LATEST SECURITY NEWS & COMMENTARY
Fake Copyright Infringement Emails Spread Rhadamanthys
Attackers are triggering victims' deep-seated fear of getting in trouble in order to spread the sophisticated stealer across continents.
Chinese Gamers Targeted in Winos4.0 Framework Scam
Campaigns like Silver Fox and Void Arachne are deploying the framework, using social media and messaging platforms to lure in victims.
International Police Effort Obliterates Cybercrime Network
Interpol disrupts 22,000 malicious IP addresses, 59 servers, 43 electronic devices, and arrests 41 suspected cybercriminals.
Nokia: No Evidence So Far That Hackers Breached Company Data
The mobile device maker continues to investigate IntelBroker's claims of another high-profile data breach, with the cybercriminal group posting on BreachForums internal data allegedly stolen from Nokia through a third-party contractor.
German Law Could Protect Researchers Reporting Vulns
The draft amendment also includes prison time for those who access systems to maliciously spy or intercept data.
How to Outsmart Stealthy E-Crime and Nation-State Threats
In a time of increasingly sophisticated cross-domain attacks, relying solely on automated solutions isn't enough.
Despite Emerging Regulations, Mobile Device, IoT Security Requires More Industry Attention
Omdia Principal Analyst Hollie Hennessy says that until a promising new set of regulations around the world comes online, connected device security entails a shared responsibility among consumers, enterprises, and manufacturers.
(Sponsored Article) 3 Major Exposure Risks — and How to Solve Them
A proactive, continuous approach to exposure management can help prioritize resources to overcome major cybersecurity challenges.
MORE NEWS / MORE COMMENTARY
DON'T MISS THIS UPCOMING EVENT
Know Your Enemy: Understanding Cybercriminals and Nation-State Actors
Nov. 14, 11:00 a.m. – 5:00 p.m. ET. Who are the cyberattackers behind current attack campaigns, and what is their endgame? How could their tactics and techniques be used against your organization? In this free virtual event, learn about the latest, most prolific threat actors and their methods, and how to protect your enterprise. Register now!
LISTEN TO OUR LATEST PODCAST
Dark Reading Confidential: Quantum Has Landed, So Now What?
NIST's new post-quantum cryptography standards are here, so what comes next? This episode of Dark Reading Confidential digs the world of quantum computing from a cybersecurity practitioner's point of view — with guests Matthew McFadden, vice president, Cyber, General Dynamics Information Technology (GDIT) and Thomas Scanlon, professor, Heinz College, Carnegie Mellon University.
HOT TOPICS
Attacker Hides Malicious Activity in Emulated Linux Environment
The CRON#TRAP campaign involves a novel technique for executing malicious commands on a compromised system.

How to Win at Cyber by Influencing People
Zero trust is a mature approach that will improve your organization's security.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Docusign API Abused in Widescale, Novel Invoice Attack
Attackers are exploiting the "Envelopes: create API" of the enormously popular document-signing service to flood corporate inboxes with convincing phishing emails aimed at defrauding organizations. It's an unusual attack vector with a high success rate.
LATEST FROM THE EDGE

How Playing Cyber Games Can Help You Get Hired
When it comes to landing a job in cybersecurity, what does it take to stand out from the pack? Try playing games.
LATEST FROM DR TECHNOLOGY

Symbiotic Security Launches Scanning Tool to Help Fix Flaws in Code
The company comes out of stealth with a tool that integrates directly into the developer's IDE to find flaws, offer remediation advice, and training materials to write secure code.
LATEST FROM DR GLOBAL

Iranian APT Group Targets IP Cameras, Extends Attacks Beyond Israel
The Iran-linked group Emennet Pasargad aims to undermine public confidence in Israel and Western nations by using hack-and-leak campaigns and disrupting government services, including elections.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.