Cyberattackers could exploit CVE-2023-20238 to carry out a variety of nefarious deeds, from data theft and code execution to phishing, fraud, and DoS. This article has been indexed from Dark Reading Read the original article: Critical Security Bug Opens Cisco…
Tag: Dark Reading
‘Evil Telegram’ Spyware Campaign Infects 60K+ Mobile Users
Legitimate-seeming Telegram “mods” available in the official Google Play store for the encrypted messaging app signal the rise of a new enterprise threat. This article has been indexed from Dark Reading Read the original article: ‘Evil Telegram’ Spyware Campaign Infects…
Trickbot, Conti Sanctions Affect Top Cybercrime Brass
US Treasury officials said the sanctions move is part of its effort to combat Russian state-sponsored cybercrime. This article has been indexed from Dark Reading Read the original article: Trickbot, Conti Sanctions Affect Top Cybercrime Brass
Kenya Initiates Public Sector Digital Skills Training, No Mention of Cybersecurity
Training will cover cloud skills and working in a paperless environment, but any mention of a cybersecurity element is conspicuously lacking. This article has been indexed from Dark Reading Read the original article: Kenya Initiates Public Sector Digital Skills Training,…
3 Strategies to Defend Against Resurging Infostealers
Infostealer incidents have more than doubled recently, making it critical to bolster your defenses to mitigate this growing threat. This article has been indexed from Dark Reading Read the original article: 3 Strategies to Defend Against Resurging Infostealers
Software Supply Chain Strategies to Parry Dependency Confusion Attacks
Bad actors practice to deceive package managers with a tangled web of methods. Here’s how to hoist them by their own petard. This article has been indexed from Dark Reading Read the original article: Software Supply Chain Strategies to Parry…
Microsoft ID Security Gaps That Let Threat Actor Steal Signing Key
China’s Storm-0558 accessed user emails at some 25 enterprise organizations earlier this year using forged tokens. This article has been indexed from Dark Reading Read the original article: Microsoft ID Security Gaps That Let Threat Actor Steal Signing Key
Apple Hit By 2 No-Click Zero-Days in Blastpass Exploit Chain
Researchers at Citizen Lab recommend immediately updating any iPhones and iPads to the latest OSes. This article has been indexed from Dark Reading Read the original article: Apple Hit By 2 No-Click Zero-Days in Blastpass Exploit Chain
North Korean Hackers Target Security Researchers — Again
This time, they’re creating elaborate impostor profiles and using a fresh zero-day and a fake Windows tool to lure in the suspecting. This article has been indexed from Dark Reading Read the original article: North Korean Hackers Target Security Researchers…
Rwanda Launches Smart-City Investment Program
The ambitious move by the nation also comes with cybersecurity risks. This article has been indexed from Dark Reading Read the original article: Rwanda Launches Smart-City Investment Program