Malicious Windows drivers signed as legit by Microsoft have been spotted as part of a toolkit used to kill off security processes in post-exploitation cyber activity.
Follow Dark Reading:
 December 15, 2022
LATEST SECURITY NEWS & COMMENTARY
Microsoft-Signed Malicious Drivers Usher In EDR-Killers, Ransomware
Malicious Windows drivers signed as legit by Microsoft have been spotted as part of a toolkit used to kill off security processes in post-exploitation cyber activity.
Proofpoint Nabs Illusive, Signaling a Sunset for Deception Tech
Former pure-play deception startup Illusive attracts Proofpoint with its repositioned platform focusing on identity threat detection and response (ITDR).
Automated Cyber Campaign Creates Masses of Bogus Software Building Blocks
The proliferation of automated cyberattacks against npm, NuGet, and PyPI underscores the growing sophistication of threat actors and the threats to open source software supply chains.
Royal Ransomware Puts Novel Spin on Encryption Tactics
An emerging cybercriminal group linked with Conti has expanded its partial encryption strategy and demonstrates other evasive maneuvers, as it takes aim at healthcare and other sectors.
Apple Zero-Day Actively Exploited on iPhone 15
Without many details, Apple patches a vulnerability that has been exploited in the wild to execute code.
NSA Slices Up 5G Mobile Security Risks
The feds' mobile service provider guidance details cybersecurity threat vectors associated with 5G network slicing.
How Our Behavioral Bad Habits Are a Community Trait and Security Problem
Learn to think three moves ahead of hackers so you're playing chess, not checkers. Instead of reacting to opponents' moves, be strategic, and disrupt expected patterns of vulnerability.
CSAF Is the Future of Vulnerability Management
Version 2.0 of the Common Security Advisory Framework will enable organizations to automate vulnerability remediation.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Uber Breached, Again, After Attackers Compromise Third-Party Cloud
Threat actors leak employee email addresses, corporate reports, and IT asset information on a hacker forum after an attack on an Uber technology partner.

The Cybersecurity Industry Doesn't Have a Stress Problem — It Has a Leadership Problem
Organizations need servant leaders to step forward and make their teams' professional effectiveness and happiness a priority.

Accelerating Vulnerability Identification and Remediation
Software teams can now fix bugs faster with faster release cycles, but breach pressure is increasing. Using SBOM and automation will help better detect, prevent, and remediate security issues throughout the software development life cycle.

MORE
EDITORS' CHOICE
Microsoft Squashes Zero-Day, Actively Exploited Bugs in Dec. Update
Here's what you need to patch now, including six critical updates for Microsoft's final Patch Tuesday of the year.
LATEST FROM THE EDGE

Analysis Shows Attackers Favor PowerShell, File Obfuscation
Aiming to give threat hunters a list of popular attack tactics, a cybersecurity team analyzed collections of real-world threat data to find attackers' most popular techniques.
LATEST FROM DR TECHNOLOGY

Google Launches Scanner to Uncover Open Source Vulnerabilities
OSV-Scanner generates a list of dependencies in a project and checks the OSV database for known vulnerabilities, Google says.
WEBINARS
View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.