The runaway success of an upstart ransomware outfit called "Dark Angels" may well influence the cyberattack landscape for years to come.
Follow Dark Reading:
 August 05, 2024
LATEST SECURITY NEWS & COMMENTARY
Fortune 50 Co. Pays Record-Breaking $75M Ransomware Demand
The runaway success of an upstart ransomware outfit called "Dark Angels" may well influence the cyberattack landscape for years to come.
Disney, Nike, IBM Signatures Anchor 3M Fake Emails a Day
A simple toggle in Proofpoint's email service allowed for brand impersonation at an industrial scale. It prompts the question: Are secure email gateways (SEGs) secure enough?
Russia's 'Fighting Ursa' APT Uses Car Ads to Install HeadLace Malware
The scheme, from the group also known as APT28, involves targeting Eastern European diplomats in need of personal transportation, and tempting them with a purported good deal on a Audi Q7 Quattro SUV.
China's APT41 Targets Taiwan Research Institute for Cyber Espionage
The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and related technologies.
Twilio Users Kicked Out of Desktop App, Forced to Switch to Mobile
Now that the Authy Desktop app has reached EOL and is no longer accessible, users are hoping their 2FA tokens synced correctly with their mobile devices.
Is the US Federal Government Increasing Cyber-Risk Through Monoculture?
In a monoculture, cybercriminals need to look for a weakness in only one product, or discover an exploitable vulnerability, to affect a significant portion of services.
Implementing Identity Continuity With the NIST Cybersecurity Framework
Having a robust identity continuity plan is not just beneficial but essential for avoiding financially costly and potentially brand-damaging outages.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Black Basta Develops Custom Malware in Wake of Qakbot Takedown
The prolific ransomware group has shifted away from phishing as the method of entry into corporate networks, and is now using initial access brokers as well as its own tools to optimize its most recent attacks.

Attackers Hijack Facebook Pages, Promote Malicious AI Photo Editor
A malvertising campaign uses phishing to steal legitimate account pages, with the endgame of delivering the Lumma stealer.

Would Making Ransom Payments Illegal Result in Fewer Attacks?
If paying a ransom is prohibited, organizations won't do it — eliminating the incentive for cybercriminals. Problem solved, it seems. Or is it?

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Attacks on Bytecode Interpreters Conceal Malicious Injection Activity
By injecting malicious bytecode into interpreters for VBScript, Python, and Lua, researchers found they can circumvent malicious code detection.
LATEST FROM THE EDGE

NVD Backlog Continues to Grow
Despite getting help, NIST is not keeping up with new vulnerability reports for the National Vulnerabilities Database, according to an analysis from Fortress Information Security.
LATEST FROM DR TECHNOLOGY

Companies Struggle to Recover From CrowdStrike's Crippling Falcon Update
The cybersecurity firm says that 97% of sensors are back online, but some organizations continue to recover, with costs tallied at $5.4 billion for the Fortune 500 alone.
LATEST FROM DR GLOBAL

India-Linked SideWinder Group Pivots to Hacking Maritime Targets
The nation-state espionage group known for attacking Pakistan has expanded its reach to targets in Egypt and Sri Lanka.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.