Once they compromise an victim with an initial ransomware attack, threat actors are ready to deploy a secondary attack with a different strain, which could leave even more damage. [TechWeb]( Follow Dark Reading:
[RSS](
October 03, 2023 LATEST SECURITY NEWS & COMMENTARY [FBI: Crippling 'Dual Ransomware Attacks' on the Rise](
Once they compromise an victim with an initial ransomware attack, threat actors are ready to deploy a secondary attack with a different strain, which could leave even more damage.
[North Korea Poses as Meta to Deploy Complex Backdoor at Aerospace Org](
The Lazarus Group's "LightlessCan" malware executes multiple native Windows commands within the RAT itself, making detection significantly harder, security vendor says.
[KillNet Claims DDoS Attack Against Royal Family Website](
The royal takedown was a brief but effective PR stunt for Russia's most notorious hacktivist group.
[Norway Urges Europe-Wide Ban on Meta's Targeted Ad Data Collection](
Norway wants to permanently ban the owner of Facebook and Instagram from collecting sensitive user data across Europe, saying its current policies violate GDPR rules.
[Iran-Linked APT34 Spy Campaign Targets Saudis](
The Menorah malware can upload and download files, as well as execute shell commands.
[Making Sense of Today's Payment Cybersecurity Landscape](
PCI DSS v4.0 is the future of the payment card industry's information security standard, but businesses must continue to look beyond this guidance and engage in proactive strategies of their own. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS [DHS: Physical Security a Concern in Johnson Controls Cyberattack]( An internal memo cites DHS floor plans that could have been accessed in the breach.
[Spyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain]( The Israeli company developed highly-targeted, mobile malware that would make any APT jealous.
[How the Okta Cross-Tenant Impersonation Attacks Succeeded]( Sophisticated attacks on MGM and Caesars underscore the reality that even robust identity and access management may not be enough to protect you.
[The Hot Seat: CISO Accountability in a New Era of SEC Regulation]( Updated cybersecurity regulations herald a new era of transparency and accountability in the face of escalating industry vulnerabilities. [MORE]( EDITORS' CHOICE [Move Over, MOVEit: Critical Progress Bug Infests WS_FTP Software](
In the wake of Cl0p's MOVEit rampage, Progress Software is sending file-transfer customers scrambling again â this time to patch a critical bug that is easily exploitable with a specially crafted HTTPS POST request. LATEST FROM THE EDGE [In Search of Rust Developers, Companies Turn to In-House Training](
Google, Fortanix, and other firms have aimed to train a cadre of Rust developers, betting that the additional cost will be offset by security savings. LATEST FROM DR TECHNOLOGY [Nexusflow Slots AI Into SOC Automation](
The startup claims its private AI software is working on making decisions based on generalizing from examples. LATEST FROM DR GLOBAL [Which DFIR Challenges Does the Middle East Face?](
Demand for digital forensics and incident response (DFIR) surges in the Middle East, a new IDC report finds. Is automation the answer? WEBINARS - [The Enterprise View to Cloud Security]( Today's enterprises may have dozens and dozens of cloud applications and services running in their environment. Enterprises need to coordinate security, manage privileges and access, and handle incident response - the service provider will do only so much. In this ... - [Tips for A Streamlined Transition to Zero Trust]( From identifying the potential attack surface to determining policy, there is a clear path to zero trust and best practices to make the transition as smooth as possible - both for your organization and your customers. Zero trust is more ... [View More Dark Reading Webinars >>]( WHITE PAPERS - [The Forrester Wave: External Threat Intelligence Service Providers, Q3 2023](
- [Global Perspectives on Threat Intelligence](
- [Building Cyber Resiliency: Key Strategies for Proactive Security Operations](
- [Evaluating SASE for the Work-From-Anywhere Era](
- [Essential SASE Must-haves](
- [Rediscovering Your Identity](
- [Cybersecurity in a post pandemic world: A focus on financial services]( [View More White Papers >>]( FEATURED REPORTS - [Passwords Are Passe: Next Gen Authentication Addresses Today's Threats](
- [Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks]( The most profound change to enterprise security with the rise of remote work is the way endpoint security has moved from last line of defense to being on the frontline. The user's endpoint is the first device attackers encounter, making ... - [How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment]( Concerns over API security and low-code/no-code use added to an already-full plate of application security challenges for many organizations over the last year. IT and security decision-makers are deeply concerned about compromises resulting from vulnerabilities in the software supply ... [View More Dark Reading Reports >>]( PRODUCTS & RELEASES [Visa Program Combats Friendly Fraud Losses For Small Businesses Globally]( [Secure Yeti Appoints Jayson E. Street as Chief Adversarial Officer to Spearhead Cybersecurity Empowerment]( [Fortinet Announces Formation of Veterans Program Advisory Council to Narrow the Cybersecurity Skills Gap With Military Veteran Talent](
[MORE PRODUCTS & RELEASES]( CURRENT ISSUE
[The State of Supply Chain Threats](
[DOWNLOAD THIS ISSUE](
[VIEW BACK ISSUES]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:ContactDarkReading@informa.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: /cdn-cgi/l/email-protection?sp_aid=118514&elq_cid=22844169&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529&utm_source=eloqua&utm_medium=email&utm_campaign=DR_NL_Dark%20Reading%20Daily_10.03.23&sp_cid=50001&utm_content=DR_NL_Dark%20Reading%20Daily_10.03.23&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529#94
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2023]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:ContactDarkReading@informa.com)