The Shikitega malware takes over IoT and endpoint devices, exploits vulnerabilities, uses advanced encoding, abuses cloud services for C2, installs a cryptominer, and allows full remote control.
Follow Dark Reading:
 September 08, 2022
LATEST SECURITY NEWS & COMMENTARY
Next-Gen Linux Malware Takes Over Devices With Unique Tool Set
The Shikitega malware takes over IoT and endpoint devices, exploits vulnerabilities, uses advanced encoding, abuses cloud services for C2, installs a cryptominer, and allows full remote control.
Holiday Inn Owner InterContinental Has a Breach Trend
After a high-profile 2017 breach and a Holiday Inn ransomware hit earlier this year, IHG confirms that its booking channels and applications have been disrupted in yet another cyberattack.
Iran-Linked APT Cozies Up to 'Enemies' in Trust-Based Spy Game
APT42 is posing as a friend to people considered threats to the government, using a raft of different tools to steal relevant info and perform surveillance.
Fighting Ransomware Takes an Army: Our Public & Private Sector Soldiers Join Forces
Continued collaboration will help win the fight as cybersecurity remains a national priority. International and public-private cooperation is helping stem the damage from ransomware threats and cyberattacks.
Some Employees Aren't Just Leaving Companies — They're Defrauding Them
Here are a few measures your organization can implement to minimize fraudulent behavior and losses.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Defenders Be Prepared: Cyberattacks Surge Against Linux Amid Cloud Migration
Ransomware in particular poses a major threat, but security vendors say there has been an increase in Linux-targeted cryptojacking, malware, and vulnerability exploits as well, and defenders need to be ready.

Raspberry Robin Malware Connected to Russian Evil Corp Gang
Infections attributed to the USB-based worm have taken off, and now evidence links the malware to Dridex and the sanctioned Russian cybercriminal group Evil Corp.

Botnets in the Age of Remote Work
Here are some strategies for protecting the business against botnets poised to take advantage of remote-work vulnerabilities.

MORE
EDITORS' CHOICE
TeslaGun Primed to Blast a New Wave of Backdoor Cyberattacks
What under-the-hood details of newly discovered attack control panel tell us about how the Evil Corp threat group manages its ServHelper backdoor malware campaigns.
LATEST FROM THE EDGE

How Can I Protect My SaaS Apps Amid Employee Turnover?
A SaaS-specific security solution can help security teams make sure apps and usage are both secure, reducing the chances of a breach.
LATEST FROM DR TECHNOLOGY

Pen Testing Evolves for the DevSecOps World
Penetration testing not only serves to triage and validate other defect discovery activities, it informs risk management activities, such as threat modeling and secure design.
WEBINARS
  • Emerging Cyber Vulnerabilities That Every Enterprise Should Know About

    Every day, black hat attackers and white hat researchers are discovering new security vulnerabilities in widely-used systems and applications that might be exploited to compromise your data. Are you aware of the newest-and potentially most impactful-vulnerabilities that have been discovered/...

  • Using Identity & Access Management to Improve Cyber Defense

    End user credentials have become a central target for online attackers, enabling them to navigate your enterprise systems as trusted users. As online attackers target these credentials and end users seek to gain access to a wider variety of applications ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.