The attack highlights growing interest among threat actors to target data from software-as-a-service providers.
Follow Dark Reading:
 June 13, 2023
LATEST SECURITY NEWS & COMMENTARY
Researchers Report First Instance of Automated SaaS Ransomware Extortion
The attack highlights growing interest among threat actors to target data from software-as-a-service providers.
RomCom Threat Actor Targets Ukrainian Politicians, US Healthcare
The group appears to be targeting victims based on their proximity and involvement to and within pro-Ukraine organizations.
Supply Chain Attack Defense Demands Mature Threat Hunting
Active threat hunting is the best protection against supply chain attacks like MOVEit and 3CX, experts say.
New Loader Delivering Spyware via Image Steals Cryptocurrency Info
Sophisticated attackers are lacing malware into PNG image files in order to steal cryptocurrency and business information.
Doing Less With Less: Focusing on Value
Always reach for defense in depth with proposed security changes. Measure and test results, focus on items of greatest impact, and get C-suite members involved to drive better outcomes.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Cl0P Gang Sat on Exploit for MOVEit Flaw for Nearly 2 Years
Over that time, the group carried multiple tests to see if the exploit worked and to identify potential victims. It was like "turning the doorknob" to check for access, a researcher says.

5 Tips for Modernizing Your Security Operations Center Strategy
A solid, dependable SOC strategy that is scalable in the face of various security threats is essential to reduce cybersecurity risks to your business.

Easily Exploitable Microsoft Visual Studio Bug Opens Developers to Takeover
The bug is very dangerous and impacts a big swath of the developer community, researchers warn.

The Growing Cyber Threats of Generative AI: Who's Accountable?
In the wrong hands, malicious actors can use chatbots to unleash sophisticated cyberattacks that could have devastating consequences.

Name That Edge Toon: Spring Chickens
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

MORE
EDITORS' CHOICE
Brand-New Security Bugs Affect All MOVEit Transfer Versions
Progress has issued a second patch for additional SQL flaws that are distinct from the zero-day that the Cl0p ransomware gang is exploiting.
LATEST FROM DR GLOBAL

'Stealth Soldier' Attacks Target Libyan Government Entities With Surveillance Malware
Surveillance malware targets Libyan government entities, with possible links to a 2019 Egypt attack campaign.
LATEST FROM THE EDGE

10 Important Security Tasks You Shouldn't Skip
Time and money are valuable and finite, but some actions are well worth spending those resources on.
LATEST FROM DR TECHNOLOGY

Defenders Buckle Up for a Future of Detecting Deepfakes
Today technology companies have high success rates against generative AI-created voices and videos, but future detection will be much more difficult.
WEBINARS
  • Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy

    Threat intelligence -- collecting data about broad trends in online attacks -- helps security teams improve their defenses by identifying online exploits that have the potential to hit their organizations and to prioritize their security resources accordingly. But how should ...

  • How to Use Threat Intelligence to Mitigate Third Party Risk

    Threat intelligence provides security teams with insights into the kinds of attacks that may target their organizations and prioritize their security activities. But what if the risk is coming from third-party partners and systems? In this webinar, experts discuss how ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
  • How to Use Threat Intelligence to Mitigate Third-Party Risk

    The report discusses the various steps of a continuous third-party intelligence lifecycle: Data collection, Data classification, Data storage, Data analysis, reporting, dissemination, continuous monitoring, data governance, and choosing the right technology stack. The report also includes information about how attackers ...

  • Shoring Up the Software Supply Chain Across Enterprise Applications

    Supply chain security attacks are growing at an alarming pace, and things are going to keep getting worse until DevSecOps teams get on the same page. A little help from the feds could also be welcome Modern-day software development depends ...

  • The Promise and Reality of Cloud Security

    Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises. The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises ...

View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.