Some mobile apps are being weaponized with Trojans that secretly sign Android users up for paid subscription services.
Follow Dark Reading:
 May 10, 2022
LATEST SECURITY NEWS & COMMENTARY
Jocker, Other Fleeceware Surges Back Into Google Play
Some mobile apps are being weaponized with Trojans that secretly sign Android users up for paid subscription services.
NFTs Emerge as the Next Enterprise Attack Vector
Cybersecurity has to be a top priority as enterprises begin incorporating the use of nonfungible tokens into their business strategies, brand-awareness campaigns, and employee-communication efforts, experts say.
Costa Rica Declares State of Emergency Under Sustained Conti Cyberattacks
Conti's ransomware attack cripples Costa Rica's Treasury, sparking the US to offer a $15M bounty on the group.
Security Stuff Happens: Where Do You Go From Here?
Despite what it may feel like when you're in the trenches after a security incident, the world doesn't stop moving. (Part 3 of a series.)
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Scammer Infects His Own Machine With Spyware, Reveals True Identity
An operational slip-up led security researchers to an attacker associated with Nigerian letter scams and malware distribution, after he infected himself with Agent Tesla.

Colonial Pipeline 1 Year Later: What Has Yet to Change?
The incident was a devastating attack, but it exposed gaps in cybersecurity postures that otherwise would have gone unnoticed.

How to Create a Cybersecurity Mentorship Program
As the talent shortage rages on, companies have found mentorship programs to be one of the best ways to obtain the security skills they need to develop their existing teams.

MORE
EDITORS' CHOICE

What We've Learned in the 12 Months Since the Colonial Pipeline Attack
The attack may have been "a major wake-up call" about the need for greater resilience in IT environments, but have security teams hit the snooze bar one too many times?
LATEST FROM THE EDGE

5 Tips to Protect Your Career Against a Narcissist
When you find yourself the target of a narcissist, familiarize yourself with their tactics and learn how to survive.
LATEST FROM DR TECHNOLOGY

How to Check if Your F5 BIG-IP Device Is Vulnerable
This Tech Tip walks network administrators through the steps to address the latest critical remote code execution vulnerability (CVE-2022-1388) in F5's BIG-IP management interface.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Implementing and Using XDR to Improve Enterprise Cybersecurity

    Security operations teams are taking a hard look at extended detection and response tools - XDR - as a means of collecting and analyzing threat data and identifying cyber attacks faster and more efficiently. But exactly how does XDR technology ...

  • Building and Maintaining an Effective IoT Cybersecurity Strategy

    The Internet of Things (IoT) is much bigger than appliances in business contexts, as tools and non-computer devices are increasingly connected to the Internet. And attackers are taking advantage of these Internet-enabled technologies to target corporate data and systems. How ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.