One South Korean victim gave up $3 million to cybercriminals, thanks to convincing law-enforcement impersonation scams that combine both psychology and technology.
Follow Dark Reading:
 March 14, 2024
LATEST SECURITY NEWS & COMMENTARY
Sophisticated Vishing Campaigns Take World by Storm
One South Korean victim gave up $3 million to cybercriminals, thanks to convincing law-enforcement impersonation scams that combine both psychology and technology.
Typosquatting Wave Shows No Signs of Abating
A spate of recent typosquatting attacks shows the scourge of this type of attack is still very much with us, even after decades of cyber defender experience with it.
Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update
Microsoft has disclosed fewer flaws and zero-days in the first three months of 2024 compared with the first quarter of the prior four years.
The CISO Role Is Changing. Can CISOs Themselves Keep Up?
What happens to security leaders that don't communicate security well enough? "Ask SolarWinds."
Russia-Sponsored Cyberattackers Infiltrate Microsoft's Code Base
The Midnight Blizzard APT is mounting a sustained, focused cyber campaign against the computing kahuna, using secrets it stole from emails back in January.
'The Weirdest Trend in Cybersecurity': Nation-States Returning to USBs
USBs are fetch again, as major APTs from Russia, China, and beyond are turning to them for BYOD cyberattacks.
Stealth Bomber: Atlassian Confluence Exploits Drop Web Shells In-Memory
The proof-of-concept exploits for Atlassian Confluence would enable arbitrary code execution without requiring file system access.
Japan Blames North Korea for PyPI Supply Chain Cyberattack
Open source software ecosystem compromise leaves developers in Asia and around the globe at risk.
Broke Cyber Pros Flock to Cybercrime Side Hustles
Burned-out cybersecurity professionals dealing with layoffs and stressful working conditions are increasingly finding a better way to earn a buck: cybercrime.
How Not to Become the Target of the Next Microsoft Hack
The alarming number of cyber threats targeting Microsoft cloud applications shows cybersecurity needs an overhaul.
The Ongoing Struggle to Protect PLCs
A decade after Stuxnet, vulnerabilities in OT systems and programmable logic controllers remain exposed.
How to Identify a Cyber Adversary: Standards of Proof
Identifying the who, what, and how behind a cyberattack is crucial for preventing future strikes.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Don't Give Your Business Data to AI Companies
Handing over your business data to artificial intelligence companies comes with inherent risks.

Why You Need to Know Your AI's Ancestry
Securing AI can't wait an hour, let alone a decade.

What Cybersecurity Chiefs Need From Their CEOs
By helping CISOs navigate the expectations being placed on their shoulders, CEOs can greatly benefit their companies.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Patch Now: Kubernetes RCE Flaw Allows Full Takeover of Windows Nodes
Attackers can remotely execute code with system privileges by exploiting a vulnerability in the source code of the open source container management system.
LATEST FROM THE EDGE

Creating Security Through Randomness
How lava lamps, pendulums, and suspended rainbows keep the Internet safe.
LATEST FROM DR TECHNOLOGY

Google's Post-Quantum Upgrade Doesn't Mean We're All Protected Yet
Just because Google has put in the work to quantum-proof Chrome doesn't mean post-quantum security is all set.
LATEST FROM DR GLOBAL

Nissan Oceania Breached; 100K People Affected Down Under
A possible ransomware attack has exposed government and personal data of Australians and New Zealanders, encompassing the carmaker's customers, dealers, and employees.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.