The evolving malware is targeting hospitality and other B2C workers in Canada and Europe with capabilities that can evade Android 13 security restrictions.
Follow Dark Reading:
 August 08, 2024
LATEST SECURITY NEWS & COMMENTARY
Hazy Issue in Entra ID Allows Privileged Users to Become Global Admins
Invisible authentication mechanisms in Microsoft allow any attacker to escalate from privileged to super-duper privileged in cloud environments, paving the way for complete takeover.
Critical AWS Vulnerabilities Allow S3 Attack Bonanza
Researchers at Aqua Security discovered the "Shadow Resource" attack vector and the "Bucket Monopoly" problem, where threat actors can guess the name of S3 buckets based on their public account IDs.
Chameleon Banking Trojan Makes a Comeback Cloaked as CRM App
The evolving malware is targeting hospitality and other B2C workers in Canada and Europe with capabilities that can evade Android 13 security restrictions.
CrowdStrike Will Give Customers Control Over Falcon Sensor Updates
The security vendor has also implemented several changes to protect against the kind of snafu that crashed 8.5 million Windows computers worldwide last month.
Creating Insecure AI Assistants With Microsoft Copilot Studio Is Easy
Microsoft claims 50,000 organizations are using its new Copilot Creation tool, but researcher Michael Bargury demonstrated at Black Hat USA ways it could unleash insecure chatbots.
The API Security Crisis: Why Your Company Could Be Next
You're only as strong as your weakest security link.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Cyberattack Strikes the Grand Palais RMN; Impact Appears Limited
Everyone expected some kind of cyberattack during the Olympics. If this is the best they've got, the bad guys don't deserve a spot on the podium.

Hunters International Disguises SharpRhino RAT as Legitimate Network Admin Tool
The RaaS group that distributes Hive ransomware delivers new malware impersonating as validly signed network-administration software to gain initial access and persistence on targeted networks

Preparing for the Future of Post-Quantum Cryptography
The AI boom and increasing popularity of quantum computing necessitates quantum-resilient security.

The CrowdStrike Meltdown: A Wake-up Call for Cybersecurity
The incident serves as a stark reminder of the fragility of our digital infrastructure. By adopting a diversified, resilient approach to cybersecurity, we can mitigate the risks and build a more secure digital future.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Dark Reading News Desk Live From Black Hat USA 2024
The Dark Reading team once again welcomes the world's top cybersecurity experts to the Dark Reading News Desk live from Black Hat USA 2024. Tune into the livestream.
LATEST FROM THE EDGE

Monitoring Changes in KEV List Can Guide Security Teams
The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.
LATEST FROM DR TECHNOLOGY

Knostic Wins 2024 Black Hat Startup Spotlight Competition
During a "Shark Tank"-like final, each startup's representative spent five minutes detailing their company and product, with an additional five minutes to take questions from eight judges from Omdia, investment firms, and top companies in cyber.
LATEST FROM DR GLOBAL

Russia's Priorities in Prisoner Swap Suggest Cyber Focus
At least two Russian nationals serving prison sentences for cybercrime offenses, Vladislav Klyushin and Roman Seleznev, were released as part of the landmark prisoner swap.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.