The Chinese state-sponsored APT has compromised as many as 30% of Cisco legacy routers on a SOHO botnet that multiple threat groups use.
| LATEST SECURITY NEWS & COMMENTARY | Volt Typhoon Ramps Up Malicious Activity Against Critical Infrastructure The Chinese state-sponsored APT has compromised as many as 30% of Cisco legacy routers on a SOHO botnet that multiple threat groups use. Move Over, APTs: Cybercriminals Now Target Critical Infrastructure Too Danish energy sector attacks attributed to Russia's Sandworm APT turn out to be the work of a new concern: cyber opportunists. OpenAI's New GPT Store May Carry Data Security Risks Third-party developers of custom GPTs (mostly) aren't able to see your chats, but they can access, store, and potentially utilize some other kinds of personal data you share. Mandiant, SEC Lose Control of X Accounts Without 2FA Crypto hacks on Mandiant and SEC X accounts are the predictable result of the social media platform's upcharge for basic cybersecurity protections, experts say. Ivanti Researchers Report Two Critical Zero-Day Vulnerabilities Patches will be available in late January and February, but until then, customers must take mitigation measures. UAE Faces Fresh Plague of Phishing Scams, Poisoned Searches Dubai Police are issuing warnings about highly indexed websites that mimic popular online destinations, like the city's travel card top-up site. War or Cost of Doing Business? Cyber Insurers Hashing Out Exclusions Following a settlement over Merck's $700 million claims over NotPetya damages, questions remain about what constitutes an act of war for cyber-insurance policies. Fake Recruiters Defraud Facebook Users via Remote-Work Offers Scammers are targeting multiple brands with "job offers" on Meta's social media platform, that go as far as to offer what look like legitimate job contracts to victims. Anonymous Sudan Launches Cyberattack on Chad Telco Hacktivists attack infrastructure, including routers, network administration systems, and devices. Hospitals Must Treat Patient Data and Health With Equal Care All companies are under the data privacy compliance gun — but healthcare companies have a target on their backs. MORE NEWS / MORE COMMENTARY | | | PRODUCTS & RELEASES | Claroty Welcomes Former US National Cyber Director Chris Inglis to Advisory Board Critical Start Implements Cyber Risk Assessments With Peer Benchmarking and Prioritization Engine Orca Security Appoints Raf Chiodo As Chief Revenue Officer MORE PRODUCTS & RELEASES |
| | | | | FEATURED REPORTS | The State of Supply Chain Threats What Ransomware Groups Look for in Enterprise Victims Ransomware attackers cast a wide net -- they just care about causing damage, making money, and gaining new victims. That means no organization is automatically immune to attack just because of its size or industry. Organizations need to take steps ... How to Use Threat Intelligence to Mitigate Third-Party Risk The report discusses the various steps of a continuous third-party intelligence lifecycle: Data collection, Data classification, Data storage, Data analysis, reporting, dissemination, continuous monitoring, data governance, and choosing the right technology stack. The report also includes information about how attackers ... | View More Dark Reading Reports >> |
|
|
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|