Eight months after the cyberattack, the cloud hosting services company's remediation costs top $10 million as it tries to repair the damage caused by the Play ransomware gang
Follow Dark Reading:
 August 31, 2023
LATEST SECURITY NEWS & COMMENTARY
Rackspace Faces Massive Cleanup Costs After Ransomware Attack
Eight months after the cyberattack, the cloud hosting services company's remediation costs top $10 million as it tries to repair the damage caused by the Play ransomware gang.
Meta Cripples China's Signature 'Spamouflage' Influence Op
The social media giant is taking on Dragonbridge, the "largest known cross-platform covert influence operation in the world."
APT Attacks From 'Earth Estries' Hit Gov't, Tech With Custom Malware
A sophisticated threat actor managed to fly under the radar for three years, despite flexing serious muscle.
Sprawling Qakbot Malware Takedown Spans 700,000 Infected Machines
"Operation Duck Hunt" is not likely to eliminate the initial access botnet forever, but the proactive removal of the malware from victim machines by law enforcement is one of the largest and most significant efforts of its kind.
Chinese Group Spreads Android Spyware via Trojan Signal, Telegram Apps
Thousands of devices have become infected with "BadBazaar," malware previously used to spy on Uyghur and Turkic ethnic minorities in China.
Motherboard Mishaps Undermine Trust, Security
MSI and Microsoft warn about new Windows Preview blue screens on some motherboards, the latest mishap to raise questions over the reliability of hardware and firmware.
China Unleashes Flax Typhoon APT to Live Off the Land, Microsoft Warns
The cyber-espionage group has created a stealthy, hard-to-mitigate network of persistent access across a range of organizations, but the endgame is unclear.
Ransomware With an Identity Crisis Targets Small Businesses, Individuals
TZW is the latest version of Adhubllka, which has been active since 2019 but has gone largely unreported due to its lower ransom demands.
5 Best Practices for Implementing Risk-First Cybersecurity
Embracing a risk-first mindset empowers organizations to make informed decisions, strengthen security, safeguard valuable assets, and reduce financial impact.
North Korea's Lazarus APT Uses GUI Framework to Build Stealthy RAT
The world's most notorious threat actor is using an unprecedented tactic for sneaking spyware into the IT networks of important companies.
Financial Firms Breached in MOVEit Cyberattacks Now Face Lawsuits
TD Ameritrade, Charles Schwab named in new class action data breach lawsuit, following last week's filing against Prudential.
Is Bias in AI Algorithms a Threat to Cloud Security?
Using AI for threat detection and response is essential — but it can't replace human intelligence, expertise, and intuition.
Legal Liability for Insecure Software Might Work, but It's Dangerous
Imposing government-regulated security requirements on software companies may go too far and create unintended consequences.
4 Strategies to Safeguard the Finance Industry Against Deepfake Onslaught
Through strategic measures and a united front, the finance industry can overcome the looming threat of deepfakes.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Should Senior IT Professionals Be Accountable for Professional Decisions?
Everyone makes mistakes — but what if your mistakes risk the security of millions of people?

Name That Toon: Swift as an Arrow
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

Addressing Cybersecurity's Talent Shortage & Its Impact on CISOs
CISOs need to educate all arms of the business on security best practices so it becomes part of the business culture, thus expanding who's keeping watch. Automating routine tasks will help scale security.

Here's What Your Breach Response Plan Might Be Missing
The best way to withstand a data breach is to be prepared. Here are four elements that are easily overlooked in breach response plans.

MORE
EDITORS' CHOICE
5 Ways to Prepare for Google's 90-Day TLS Certificate Expiration
With bad guys frequently upping their game, security can't leave these protections to a once-a-year upgrade.
LATEST FROM THE EDGE

Vendors Training AI With Customer Data Is an Enterprise Risk
While Zoom has scrapped plans to harvest customer content for use in its AI and ML models, the incident should raise concerns for enterprises and consumers alike.
LATEST FROM DR TECHNOLOGY

Authentication Outage Underscores Why 'Fail Safe' Is Key
Duo's service outage last week, impacting schools and businesses, highlights how companies should build in resiliency and business continuity into their authentication schemes.
LATEST FROM DR GLOBAL

South African Department of Defence Denies Stolen Data Claims
Attackers leaked 1.6TB of stolen data, which government officials dismissed as "fake news."
WEBINARS
  • The Threat Hunter's Playbook: Mastering Cloud Defense Strategies

    Secure your spot now for this unforgettable cybersecurity adventure, filled with real-world examples, best practices, and expert insights from our threat research team. Level up your cloud security defense. When you attend this webinar, you will hear from the Sysdig's ...

  • Implementing Zero-Trust With A Remote Workforce

    The shift to remote work and a distributed workforce model highlighted the importance of the zero-trust model for organizations. Corporate endpoint devices are no longer protected behind the enterprise perimeter, connect to routers with unknown levels of security, and share ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.