BatLoader has spread rapidly to roost in systems globally, tailoring payloads to its victims.
Follow Dark Reading:
 November 15, 2022
LATEST SECURITY NEWS & COMMENTARY
Researchers Sound Alarm on Dangerous BatLoader Malware Dropper
BatLoader has spread rapidly to roost in systems globally, tailoring payloads to its victims.
Unpatched Zimbra Platforms Are Probably Compromised, CISA Says
Attackers are targeting Zimbra systems in the public and private sectors, looking to exploit multiple vulnerabilities, CISA says.
Quantum Cryptography Apocalypse: A Timeline and Action Plan
Quantum computing's a clear threat to encryption, and post-quantum crypto means adding new cryptography to hardware and software without being disruptive.
Australia Declares War on Cybercrime Syndicates
An international counter-ransomware task force has been announced by Australian authorities following the recent Optus and Medibank data breaches.
(Sponsored Article) Managing and Mitigating Risk From Unknown Unknowns
Five practical steps to up-level attack surface management programs and gain greater visibility and risk mitigation around the extended ecosystem.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Why CVE Management as a Primary Strategy Doesn't Work
With only about 15% of vulnerabilities actually exploitable, patching every vulnerability is not an effective use of time.

Twitter's CISO Takes Off, Leaving Security an Open Question
Lea Kissner was one of three senior executives to quit this week, leaving many to wonder if the social media giant is ripe for a breach and FTC action.

Patch ASAP: Critical Citrix, VMware Bugs Threaten Remote Workspaces With Takeover
Hole-y software alert, Batman: Cybercriminal faves Citrix Gateway and VMware Workspace ONE have authentication-bypass bugs that could offer up total access to attackers.

MORE
EDITORS' CHOICE
Cookies for MFA Bypass Gain Traction Among Cyberattackers
Multifactor authentication has gained adoption among organizations as a way of improving security over passwords alone, but increasing theft of browser cookies undermines that security.
LATEST FROM THE EDGE

How APIs and Applications Can Live Happily Ever After
Solutions that allow businesses to reduce complexity, develop and deploy applications and APIs, and protect those applications and APIs are no fairy tale.
LATEST FROM DR TECHNOLOGY

Swimlane Introduces Low-Code, Automation Approach to OT Security
Automating security for OT infrastructure can help organizations combat a rising volume of cyber threats in an era when security professionals are in short supply.
WEBINARS
  • Seeing Your Attack Surface Through the Eyes of an Adversary

    The best way to manage exposure, reduce risk, and improve your security posture is to understand your attack surface through the eyes of an attacker. Cortex Xpanse provides automated Attack Surface Management with an agentless implementation. Xpanse scans the entirety ...

  • Understanding Cyber Attackers & Their Methods

    Every day, your enterprise is at risk of being hacked. But just who are the cyber attackers, and what are their motivations? What methods might they use to crack enterprise data, and how do they stage their attacks? Do you ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.