Usually focused on going after cryptocurrency organizations, the threat actor has begun targeting defense companies around the world.
| LATEST SECURITY NEWS & COMMENTARY | Lazarus Group's 'DeathNote' Cluster Pivots to Defense Sector Usually focused on going after cryptocurrency organizations, the threat actor has begun targeting defense companies around the world. Microsoft: NSO Group-Like 'QuaDream' Actor Selling Mobile Spyware to Governments Researchers at Microsoft have discovered links between a threat group tracked as DEV-0196 and an Israeli private-sector company, QuaDream, that sells a platform for exfiltrating data from mobile devices. Microsoft Patches 97 CVEs, Including Zero-Day & Wormable Bugs The April 2023 Patch Tuesday security update also included a reissue of a fix for a 10-year-old bug that a threat actor recently exploited in the supply chain attack on 3CX. 1M+ WordPress Sites Hacked via Zero-Day Plug-in Bugs A wide-ranging campaign to inject malicious code into WordPress-run websites has been ongoing for at least five years. Pair of Apple Zero-Days Under Active Exploit; Patch & Update Accordingly Unpatched Macs, iPhones, and iPads open to browser takeover and system kernel-level malicious code execution, Apple warns. Cybercriminals 'CAN' Steal Your Car, Using Novel IoT Hack Your family's SUV could be gone in the night thanks to a headlight crack and hack attack. Samsung Engineers Feed Sensitive Data to ChatGPT, Sparking Workplace AI Warnings In three separate incidents, engineers at the Korean electronics giant reportedly shared sensitive corporate data with the AI-powered chatbot. Russia's Joker DPR Claims Access to Ukraine Troop Movement Data A hacktivist group working with Russia claims it breached DELTA, the Ukrainian battlefield management system (BMS). 'BEC 3.0' Is Here With Tax-Season QuickBooks Cyberattacks In next-gen, credential-harvesting attacks, phishing emails use cloud services and are free from the typical bad grammar or typos they've traditionally used (and which users have learned to spot). Rethinking Cybersecurity's Structure & the Role of the Modern CISO A CISO with a focused role will be better prepared to thrive in an organization and accelerate adoption and understanding of cybersecurity. How Password Managers Can Get Hacked Password managers aren't foolproof, but they do help mitigate risks from weak credentials and password reuse. Following best practices can contribute to a company's defenses. LastPass Breach Reveals Important Lessons Devastating cyberattacks often can be prevented with basic cybersecurity measures. Bad Actors Will Use Large Language Models — but Defenders Can, Too Security teams need to find the best, most effective uses of large language models for defensive purposes. MORE NEWS / MORE COMMENTARY | |
| EDITORS' CHOICE | 7 Things Your Ransomware Response Playbook Is Likely Missing Incident response experts share their secrets for success when it comes to creating a professional-grade ransomware response playbook. Are you ready for the worst? LATEST FROM THE EDGE How and Why to Put Multicloud to Work Complex multicloud environments present organizations with security challenges, but also opportunities for efficiency. LATEST FROM DR TECHNOLOGY Fight AI With AI By developing new tools to defend against adversarial AI, companies can help ensure that artificial intelligence is developed and used in a responsible and safe manner. | |
| | | |
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|