The US Department of Justice hacked into Hive's infrastructure, made off with hundreds of decryptors, and seized the gang's operations.
Follow Dark Reading:
 January 27, 2023
LATEST SECURITY NEWS & COMMENTARY
Hive Ransomware Gang Loses Its Honeycomb, Thanks to DoJ
The US Department of Justice hacked into Hive's infrastructure, made off with hundreds of decryptors, and seized the gang's operations.
Riot Games Latest Video-Game Maker to Suffer Breach
Highlighting continued attacks on game developers, attackers stole source code from and issued a ransom demand to the maker of League of Legends.
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Hackers don't need a key to get past your defenses if they can essentially teleport using RMMs, warns CISA and the NSA.
7 Insights From a Ransomware Negotiator
The rapid maturation and rebranding of ransomware groups calls for relentless preparation and flexibility in response, according to one view from the trenches.
Companies Struggle With Zero Trust as Attackers Adapt to Get Around It
Only one in 10 enterprises will create a robust zero-trust foundation in the next three years, while more than half of attacks won't even be prevented by it, according to Gartner.
German Government, Airports, Banks Hit With Killnet DDoS Attacks
After Berlin pledged tanks for Ukraine, some German websites were knocked offline temporarily by Killnet DDoS attacks.
Organizations Must Brace for Privacy Impacts This Year
Expect more regulatory and enforcement action in the US and around the world.
Dutchman Detained for Dealing Details of Tens of Millions of People
The accused sold an enormous data set stolen from the Austrian radio and television licensing authority — to an undercover cop.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
North Korea's Top APT Swindled $1B From Crypto Investors in 2022
The DPRK has turned crypto scams into big business to replenish its depleted state coffers.

Log4j Vulnerabilities Are Here to Stay — Are You Prepared?
Don't make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the vulnerability is on a potential attack path to a critical asset.

Can't Fill Open Positions? Rewrite Your Minimum Requirements
If you or your company can't find good infosec candidates, consider changing up the qualifications to find more nontraditional talent.

MORE
EDITORS' CHOICE
Microsoft Azure-Based Kerberos Attacks Crack Open Cloud Accounts
Two common attacks against on-premises Kerberos authentication servers — known as Pass the Ticket and Silver Ticket — can be used against Microsoft's Azure AD Kerberos, a security firms says.
LATEST FROM THE EDGE

A Child's Garden of Cybersecurity
Whether you dream of your child growing into a CISO or just want them to improve their security hygiene, consider this roundup of literary geekery.
LATEST FROM DR TECHNOLOGY

Skyhawk Security Launches Multicloud Runtime Threat Detection and Response Platform
Skyhawk Synthesis extends cloud security misconfiguration detection across multiple clouds, the company says — throwing cloud security posture management in for free.
WEBINARS
View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.