Never before has cyber been higher on the FBI's list of priorities. Will more money allow the feds to make a greater impact?
| LATEST SECURITY NEWS & COMMENTARY | Microsoft Patches Serious Azure Cloud Security Flaws Three vulnerabilities in the platform's API Management Service could allow access sensitive data, mount further attacks, and even hijack developer portals. FBI Focuses on Cybersecurity With $90M Budget Request Never before has cyber been higher on the FBI's list of priorities. Will more money allow the feds to make a greater impact? China 'Innovated' Its Cyberattack Tradecraft, Mandia Says Mandiant CEO Kevin Mandia explains why a recently revealed targeted attack by a cyber-espionage group out of China rivals the SolarWinds attack in its complexity, and weighs in on how defenders can best leverage generative AI. Meta Expunges Multiple APT, Cybercrime Groups From Facebook, Instagram The company has removed three APTs and six potentially criminal networks from its platforms who leveraged elaborate campaigns of fake personas and profiles to lure and compromise users. Google Bans Thousands of Play Store Developer Accounts to Block Malware Last year, Google banned 173,000 developer accounts and prevented 1.5 million apps from reaching the Play Store as it fought policy violations and malware. CISO Survival Guide for Cyberattacks CISOs who have survived major cyber incidents recommend letting company ethos guide incident response. BlackCat Trolls Western Digital With Leaked Response Meeting Image The ransomware group adds in personal insults to ratchet up pressure on Western Digital threat hunters. Apple Debuts Its Rapid Response Security Update Approach Smaller fixes deliver quick improvements for iPhones, iPads, and iMacs between software updates. The White House National Cybersecurity Strategy Has a Fatal Flaw The government needs to shift focus and reconsider how it thinks about securing our nation's digital and physical assets. Combating Kubernetes — the Newest IAM Challenge IT leaders need to ensure Kubernetes clusters don't become a gateway for cybercriminals. Anatomy of a Malicious Package Attack Malicious packages are hard to avoid and hard to detect — unless you know what to look for. MORE NEWS / MORE COMMENTARY | |
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|