Production systems at the remote access company were breached, leading AnyDesk to revoke code signing certificate and reset Web portal credentials as part of its incident response. [TechWeb]( Follow Dark Reading:
[RSS](
February 06, 2024 LATEST SECURITY NEWS & COMMENTARY [AnyDesk Compromised, Passwords Revoked](
Production systems at the remote access company were breached, leading AnyDesk to revoke code signing certificate and reset Web portal credentials as part of its incident response.
[Deepfake-Generating Apps Explode, Allowing Multimillion-Dollar Corporate Heists](
Deepfakes are fast becoming more realistic, and access to them more democratic, enabling even ordinary attackers to enact major fraud. What's the most effective way to fight back?
[Google: Govs Drive Sharp Growth of Commercial Spyware Cos](
Private spyware vendors were behind nearly half of all zero-day exploits in Google products since 2014.
[Teens Committing Scary Cybercrimes: What's Behind the Trend?](
Crypto theft, sextortion tactics, swattings, and ransomware: teenagers are increasingly taking up cybercrime for fun and profit â and experts credit an array of contributing factors.
[Fresh 'Mispadu Stealer' Variant Emerges](
Latest iteration of the malware appears aimed at targets in Mexico.
[Pegasus Spyware Targets Jordanian Civil Society in Wide-Ranging Attacks](
As the Middle East nation enforces strict cybercrime laws, citizens face crackdowns on free speech with nearly three dozen journalists and lawyers targeted with the NSO Group's spyware.
[How the SEC's Rules on Cybersecurity Incident Disclosure Are Exploited](
Cyber hygiene is no longer a nice-to-have but necessary for organizations that want to survive the relentless barrage of cyberattacks being unleashed daily.
[Nigerian President Dismisses Nation's 'Cybercrime Haven' Image](
President Bola Tinubu says country is not a nation of cybercriminals, despite being the originator of the infamous "Nigerian Prince" scam. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS [China Infiltrates US Critical Infrastructure in Ramp-up to Conflict]( Threat actors linked to the People's Republic of China, such as Volt Typhoon, continue to "pre-position" themselves in the critical infrastructure of the United States, according to military and law enforcement officials.
[macOS Malware Campaign Showcases Novel Delivery Technique]( Threat actor behind the Activator macOS backdoor is using pirated apps to distribute the malware in what could be a botnet-building operation.
[Why Gen Z Is the New Force Reshaping OT Security]( Modernizing legacy operational technology (OT) systems to align with younger workers' technology habits, skills, and expectations can enhance security and resiliency.
[CISO Corner: Gen Z Challenges, CISO Liability & Cathay Pacific Case Study]( Dark Reading's roundup of strategic cyber-operations insights for chief information security officers. [MORE]( PRODUCTS & RELEASES [ProcessUnity Introduces Industry's All-In-One Third-Party Risk Management Platform]( [New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol]( [Kaspersky's ICS CERT Predictions for 2024: Ransomware Rampage, Cosmopolitical Hacktivism, and Beyond](
[MORE PRODUCTS & RELEASES]( EDITORS' CHOICE [Cloudflare Falls Victim to Okta Breach, Atlassian Systems Cracked](
The cyberattackers, believed to be state sponsored, didn't get far into Cloudflare's global network, but not for lack of trying. LATEST FROM THE EDGE [Name That Edge Toon: The Great Escape](
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. LATEST FROM DR TECHNOLOGY [Google Open Sources AI-Boosted Fuzzing Framework](
The fuzzing framework uses AI to boost code coverage and to speed up vulnerability discovery. LATEST FROM DR GLOBAL [African Cybersecurity: Facing 2024's Biggest Hurdles](
Key trends in African information security this year will include biometric deployments and privacy concerns, and the rise of misinformation. WEBINARS - [Securing the Software Development Life Cycle from Start to Finish](
- [Making Sense of Security Operations Data]( [View More Dark Reading Webinars >>]( WHITE PAPERS - [SANS ICS/OT Cybersecurity Survey: 2023's Challenges and Tomorrow's Defenses](
- [Threat Terrain of the Modern Factory: Survey of Programmable Assets and Robot Software](
- [Pixelle's OT Security Triumph with Security Inspection](
- [The OT Zero Trust Handbook: Implementing the 4 Cornerstones of OT Security](
- [2023 Snyk AI-Generated Code Security Report](
- [Buyer's Guide: Choosing a True DevSecOps Solution for Your Apps on AWS](
- [Understanding AI Models to Future-Proof Your AppSec Program]( [View More White Papers >>]( FEATURED REPORTS - [Passwords Are Passe: Next Gen Authentication Addresses Today's Threats](
- [The State of Supply Chain Threats](
- [What Ransomware Groups Look for in Enterprise Victims]( Ransomware attackers cast a wide net -- they just care about causing damage, making money, and gaining new victims. That means no organization is automatically immune to attack just because of its size or industry. Organizations need to take steps ... [View More Dark Reading Reports >>]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:ContactDarkReading@informa.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: /cdn-cgi/l/email-protection?sp_aid=121052&elq_cid=22844169&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529&utm_source=eloqua&utm_medium=email&utm_campaign=DR_NL_Dark%20Reading%20Daily_02.06.24&sp_cid=51820&utm_content=DR_NL_Dark%20Reading%20Daily_02.06.24&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529#90
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2024]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:ContactDarkReading@informa.com)