Gen Digital, the parent company of the security companies, is the latest victim in a rash of Cl0p attacks on the bug in the MOVEit transfer software, leading to employee data being revealed. [TechWeb]( Follow Dark Reading:
[RSS](
June 22, 2023 LATEST SECURITY NEWS & COMMENTARY [Avast, Norton Parent Latest Victim of MOVEit Data Breach Attacks](
Gen Digital, the parent company of the security companies, is the latest victim in a rash of Cl0p attacks on the bug in the MOVEit transfer software, leading to employee data being revealed.
[Ransomware Misconceptions Abound, to the Benefit of Attackers](
It's time to update what we think we understand about ransomware, including new defensive measures and how fast the attack response should be.
[2 More Apple Zero-Days Exploited in Ongoing iOS Spy Campaign](
The zero-day security bugs are being used to deploy the sophisticated but "odd" TriangleDB spying implant on targeted iOS devices.
[Emerging Ransomware Group 8Base Doxxes SMBs Globally](
A threat you've never heard of is using double extortion attacks on mom-and-pop shops around the globe.
[US Investors Sniffing Around Blacklisted NSO Group Assets](
Pressure mounts on the NSO Group's business viability as Khashoggi widow joins group of plaintiffs suing the Israeli firm for Pegasus spyware abuse.
[Third MOVEit Transfer Vulnerability Disclosed by Progress Software](
MOVEit has created a patch to fix the issue and urges customers to take action to protect their environments, as Cl0p attacks continue to mount, including on government targets.
['Muddled Libra' Uses Oktapus-Related Smishing to Target Outsourcing Firms](
The emerging cyber-threat group is unusually persistent and nimble, bypassing MFA, stealing data, and using compromised environments for downstream customer attacks.
[100K+ Infected Devices Leak ChatGPT Accounts to the Dark Web](
Infostealers are as alive as ever, wantonly sweeping up whatever business data might be of use to cybercriminals, including OpenAI credentials.
[Critical Barracuda ESG Zero-Day Linked to Novel Chinese APT](
A PRC-aligned actor used a trio of custom malware to take advantage of inherent weaknesses in edge appliances.
[Rorschach Ransomware: What You Need to Know](
Learn how the latest ransomware variant has heightened attack execution speed and what that means for cybersecurity operations.
[Placing People & Realism at the Center of Your Cybersecurity Strategy](
While it's impossible for an organization to be completely secure, there's no reason to be defenseless.
[Cybercrime Doesn't Take a Vacation](
Organizations need to prepare for security threats as summer holidays approach.
[Hackers Will Be Quick to Bypass Gmail's Blue Check Verification System](
It's still important to use other security measures, such as strong passwords and two-factor authentication, to protect your data. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS [Name That Toon: Time to Spare?]( Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
[Consumer Data: The Risk and Reward for Manufacturing Companies]( To adequately address privacy, manufacturers need to think differently about data. [MORE]( EDITORS' CHOICE [Killnet Threatens Imminent SWIFT, World Banking Attacks](
The DDoS collective claims to be teaming up with ReVIL and Anonymous Sudan for destructive financial attacks in retaliation for US aid in Ukraine, but the partnerships (and danger) are far from verified. LATEST FROM DR TECHNOLOGY [Decoding Identity and Access Management for Organizations and Consumers](
Workforce IAM and consumer IAM are not interchangeable â they serve different purposes and constituencies. LATEST FROM THE EDGE [Keep Job Scams From Hurting Your Organization](
From fake job listings that ding your reputation to fake job applicants who hack your network, job scams are a major threat. LATEST FROM DR GLOBAL [Dodgy Microlending Apps Stalk MEA Users, Highlighting Cyber Maturity Gaps](
Mobile users in the Middle East and Africa often download moneylending apps that ask for excessive permissions â an all too common issue in an area where mobile-only is the norm and cyber awareness is low. WEBINARS - [Finding a Backup Strategy That Works For You]( You've been hit with a ransomware, DDoS, natural disaster, or destructive cyberattack. One of the first questions: can we get our data back? Good back-ups are key to business continuity and disaster recovery, but backing up your data in preparation ... - [Secrets to a Successful Managed Security Service Provider Relationship]( Sometimes, the security team you have just isn't enough. To help keep up with security threats 24/7 - and to bolster skills the team may not have -- many enterprises are working with managed security service providers (MSSPs) and security providers ... [View More Dark Reading Webinars >>]( WHITE PAPERS - [9 Traits You Need to Succeed as a Cybersecurity Leader](
- [Welcome to Modern Web App Security](
- [AppSec Best Practices: Where Speed, Security, and Innovation Meet in the Middle](
- [Cybersecurity Maturity Model Certification (CMMC) Version 1.02](
- [The Cloud Security Workflow Handbook](
- [2023 Cloud Threat Report](
- [Cybersecurity in a post pandemic world: A focus on financial services]( [View More White Papers >>]( FEATURED REPORTS - [Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks]( The most profound change to enterprise security with the rise of remote work is the way endpoint security has moved from last line of defense to being on the frontline. The user's endpoint is the first device attackers encounter, making ... - [How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment]( Concerns over API security and low-code/no-code use added to an already-full plate of application security challenges for many organizations over the last year. IT and security decision-makers are deeply concerned about compromises resulting from vulnerabilities in the software supply ... - [Successfully Managing Identity in Modern Cloud and Hybrid Environments]( Cloud promised to simplify the security and management of enterprise systems. In many ways it has, but when it comes to identity management it's as complicated as ever. This report details how to get identity programs on track -- and ... [View More Dark Reading Reports >>]( PRODUCTS & RELEASES [Cymulate Announces Security Analytics for Continuous Threat Exposure Management]( [Netskope Enables Secure Enterprise Use of ChatGPT and Generative AI Applications]( [Security LeadHER Wraps Groundbreaking Inaugural Conference for Women in Security]( [NineID Raises $2.6M to Build a Secure Bridge Between the Digital and Physical Worlds of Corporate Security]( [Action1 Announces $20M Investment in Its Patch Management Platform]( [Coalition Releases Security Vulnerability Exploit Scoring System]( [Keytos Uncovers 15,000 Vulnerable Subdomains per Month in Azure Using Cryptographic Certificates](
[MORE PRODUCTS & RELEASES]( CURRENT ISSUE
[How to Use Threat Intelligence to Mitigate Third-Party Risk](
[DOWNLOAD THIS ISSUE](
[VIEW BACK ISSUES]( Dark Reading Weekly
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:ContactDarkReading@informa.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2023]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:ContactDarkReading@informa.com)