Long-awaited security fixes for ProxyNotShell and Mark of the Web bypasses are part of a glut of actively exploited zero-day vulnerabilities and other critical flaws that admins need to prioritize in the coming hours.
Follow Dark Reading:
 November 10, 2022
LATEST SECURITY NEWS & COMMENTARY
Microsoft Quashes Bevy of Actively Exploited Zero-Days for November Patch Tuesday
Long-awaited security fixes for ProxyNotShell and Mark of the Web bypasses are part of a glut of actively exploited zero-day vulnerabilities and other critical flaws that admins need to prioritize in the coming hours.
Patch ASAP: Critical Citrix, VMware Bugs Threaten Remote Workspaces With Takeover
Hole-y software alert, Batman: Cybercriminal faves Citrix Gateway and VMware Workspace ONE have authentication-bypass bugs that could offer up total access to attackers.
SolarWinds Faces Potential SEC Enforcement Act Over Orion Breach
In the nearly two years since the company discovered the cyber intrusion, SolarWinds has fundamentally rearchitected its development environment to make it much harder to compromise, CISO Tim Brown tells Dark Reading.
W4SP Stealer Stings Python Developers in Supply Chain Attack
Threat actors continue to push malicious Python packages to the popular PyPI service, striking with typosquatting, authentic sounding file names, and hidden imports to fool developers and steal their information.
Oreo Giant Mondelez Settles NotPetya 'Act of War' Insurance Suit
The settlement muddies the waters even further for the viability of war exclusion clauses when it comes to cyber insurance.
RomCom Malware Woos Victims With 'Wrapped' SolarWinds, KeePass Software
An analysis of the RomCom APT shows the group is expanding its efforts beyond the Ukrainian military into the UK and other English-speaking countries.
Retail Sector Prepares for Annual Holiday Cybercrime Onslaught
Retailers and hospitality companies expect to battle credential harvesting, phishing, bots, and various malware variants.
Unencrypted Traffic Still Undermining Wi-Fi Security
An analysis by RSA Conference's security operations center found 20% of data over its network was unencrypted and more than 55,000 passwords were sent in the clear.
Cloud9 Malware Offers a Paradise of Cyberattack Methods
The Swiss Army knife-like browser extension is heaven for attackers — and can be hell for enterprise users.
What We Really Mean When We Talk About ‘Cybersecurity’
A lack of precision in our terminology leads to misunderstandings and confusion about the activities we engage in, the information we share, and the expectations we hold.
The Shifting Role of the CISO
My year as a venture capital CISO-in-residence.
Beyond the Pen Test: How to Protect Against Sophisticated Cybercriminals
Why are we still doing perfunctory penetration testing when we can be emulating realistic threats and stress-testing the systems most at risk?
Build Security Around Users: A Human-First Approach to Cyber Resilience
Security is more like a seat belt than a technical challenge. It's time for developers to shift away from a product-first mentality and craft defenses that are built around user behaviors.
A Better Way to Resist Identity-Based Cyber Threats
New approaches to identity access management are indispensable.
Instagram Star Gets 11 Years for Cybercrimes Used to Fund His Lavish Lifestyle
Prolific online scammer and social media influencer 'Hushpuppi' sentenced for bank cyber heists, BEC campaigns, money laundering, and more.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
InterPlanetary File System Increasingly Weaponized for Phishing, Malware Delivery
Cyberattackers like IPFS because it is resilient to content blocking and takedown efforts.

Microsoft's Certificate-Based Authentication Enables Phishing-Resistant MFA
Microsoft added certificate-based authentication (CBA) to the Azure Active Directory to help organizations enable phishing-resistant MFA that complies with US federal requirements. The change paves the way for enterprises to migrate their Active Directory implementations to the cloud.

It's Time to See Cybersecurity Regulation as a Friend, Not a Foe
There's real value in having a better perspective around future regulation and compliance requirements.

MORE
EDITORS' CHOICE
Microsoft Warns on Zero-Day Spike as Nation-State Groups Shift Tactics
The software giant also recorded an increase in attacks on IT services companies as state-backed threat actors have adapted to better enterprise defenses and cast a wider net, Microsoft says.
LATEST FROM THE EDGE

The Art of Calculating the Cost of Risk
Insurance and legislation affect how enterprises balance between protecting against breaches and recovering from them.
LATEST FROM DR TECHNOLOGY

Now That EDR Is Obvious, What Comes Next?
First in our series addressing the top 10 unanswered questions in security: What's going to replace EDR?
WEBINARS
  • State of Bot Attacks: What to Expect in 2023

    Malicious bots have moved past distributed denial-of-service and credential-stuffing attacks and are now capable of launching sophisticated attacks such as performing reconnaissance for future attacks, committing shopping cart and ticketing fraud, and engaging in clickjacking. Bot attacks are highly profitable ...

  • Understanding Cyber Attackers & Their Methods

    Every day, your enterprise is at risk of being hacked. But just who are the cyber attackers, and what are their motivations? What methods might they use to crack enterprise data, and how do they stage their attacks? Do you ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.