Attackers are triggering victims' deep-seated fear of getting in trouble in order to spread the sophisticated stealer across continents.
| LATEST SECURITY NEWS & COMMENTARY | Fake Copyright Infringement Emails Spread Rhadamanthys Attackers are triggering victims' deep-seated fear of getting in trouble in order to spread the sophisticated stealer across continents. Chinese Gamers Targeted in Winos4.0 Framework Scam Campaigns like Silver Fox and Void Arachne are deploying the framework, using social media and messaging platforms to lure in victims. International Police Effort Obliterates Cybercrime Network Interpol disrupts 22,000 malicious IP addresses, 59 servers, 43 electronic devices, and arrests 41 suspected cybercriminals. Nokia: No Evidence So Far That Hackers Breached Company Data The mobile device maker continues to investigate IntelBroker's claims of another high-profile data breach, with the cybercriminal group posting on BreachForums internal data allegedly stolen from Nokia through a third-party contractor. German Law Could Protect Researchers Reporting Vulns The draft amendment also includes prison time for those who access systems to maliciously spy or intercept data. How to Outsmart Stealthy E-Crime and Nation-State Threats In a time of increasingly sophisticated cross-domain attacks, relying solely on automated solutions isn't enough. Despite Emerging Regulations, Mobile Device, IoT Security Requires More Industry Attention Omdia Principal Analyst Hollie Hennessy says that until a promising new set of regulations around the world comes online, connected device security entails a shared responsibility among consumers, enterprises, and manufacturers. (Sponsored Article) 3 Major Exposure Risks — and How to Solve Them A proactive, continuous approach to exposure management can help prioritize resources to overcome major cybersecurity challenges. MORE NEWS / MORE COMMENTARY | | | | DON'T MISS THIS UPCOMING EVENT | Know Your Enemy: Understanding Cybercriminals and Nation-State ActorsNov. 14, 11:00 a.m. – 5:00 p.m. ET. Who are the cyberattackers behind current attack campaigns, and what is their endgame? How could their tactics and techniques be used against your organization? In this free virtual event, learn about the latest, most prolific threat actors and their methods, and how to protect your enterprise. Register now! LISTEN TO OUR LATEST PODCASTDark Reading Confidential: Quantum Has Landed, So Now What?NIST's new post-quantum cryptography standards are here, so what comes next? This episode of Dark Reading Confidential digs the world of quantum computing from a cybersecurity practitioner's point of view — with guests Matthew McFadden, vice president, Cyber, General Dynamics Information Technology (GDIT) and Thomas Scanlon, professor, Heinz College, Carnegie Mellon University. HOT TOPICS Attacker Hides Malicious Activity in Emulated Linux Environment The CRON#TRAP campaign involves a novel technique for executing malicious commands on a compromised system. How to Win at Cyber by Influencing People Zero trust is a mature approach that will improve your organization's security. MORE |
| | PRODUCTS & RELEASES | AU10TIX Q3 2024 Global Identity Fraud Report Detects Skyrocketing Social Media Attacks SOFTSWISS Expands Bug Bounty Program MORE PRODUCTS & RELEASES |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|