In a "new class of attack," the Russian APT breached a target in Washington, DC, by credential-stuffing wireless networks in close proximity to it and daisy-chaining a vector together in a resourceful and creative way, according to researchers.
Follow Dark Reading:
 November 26, 2024
LATEST SECURITY NEWS & COMMENTARY
Fancy Bear 'Nearest Neighbor' Attack Uses Nearby Wi-Fi Network
In a "new class of attack," the Russian APT breached a target in Washington, DC, by credential-stuffing wireless networks in close proximity to it and daisy-chaining a vector together in a resourceful and creative way, according to researchers.
Ransomware Attack on Blue Yonder Hits Starbucks, Supermarkets
The incident is typical of the heightened threats organizations face during the holidays, when most companies reduce their security operations staff by around 50%.
BlackBasta Ransomware Brand Picks Up Where Conti Left Off
New analysis says law enforcement efforts against Russian-language ransomware-as-a-service (RaaS) infrastructure helped consolidate influence behind BlackBasta, but some experts aren't so sure the brand means that much.
Closing the Cybersecurity Career Diversity Gap
Diversity isn't just an issue of fairness — it's about operational excellence and ensuring we have the best possible teams defending our national security.
(Sponsored Article) Avoiding 7 Frequent SecOps Mistakes
Learn the most common security operations (SecOps) traps and the best practices for avoiding them.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
MITRE: Cross-Site Scripting Is 2024's Most Dangerous Software Weakness
In addition to XSS, MITRE and CISA's 2024 list of the 25 most dangerous security vulnerability types (CWEs) also flagged out-of-bounds write, SQL injection, CSRF, and path traversal.

Cybersecurity Is Critical, but Breaches Don't Have to Be Disasters
The future of cybersecurity isn't about preventing every breach — it's about learning and growing stronger with each attack.

China's Cyber Offensives Built in Lockstep With Private Firms, Academia
The scale of Beijing's systematic tapping of private industry and universities to build up its formidable hacking and cyber-warfare capabilities is larger than previously understood.

Going Beyond Secure by Demand
Secure by Demand offers a starting point for third-party risk management teams, but they need to take the essential step of using a mature software supply chain security solution to ensure they're not blindly trusting a provider's software.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Faux ChatGPT, Claude API Packages Deliver JarkaStealer
Attackers are betting that the hype around generative AI (GenAI) is attracting less technical, less cautious developers who might be more inclined to download an open source Python code package for free access, without vetting it or thinking twice.
LATEST FROM THE EDGE

How a Mental Health Nonprofit Secures Endpoints for Compassionate Care
Consolidating endpoint management boosts cybersecurity while keeping an Oklahoma-based nonprofit focused on community mental health.
LATEST FROM DR TECHNOLOGY

Phishing Prevention Framework Reduces Incidents by Half
The anti-fraud plan calls for companies to create a pipeline for compiling attack information, along with formal processes to disseminate that intelligence across business groups.
LATEST FROM DR GLOBAL

Yakuza Victim Data Leaked in Japanese Agency Attack
A local government resource for helping Japanese citizens cut ties with organized crime was successfully phished in a tech support scam, and could have dangerous consequences.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.