Source
DARKReading
To prevent this, organizations should focus on developing secure hardware and firmware foundations, enabling them to manage, monitor, and remediate hardware and firmware security.
A technique to abuse Microsoft's built-in source code editor has finally made it into the wild, thanks to China's Mustang Panda APT.
Their findings highlight the frailty of some of the mechanisms for establishing trust on the Internet.
An attacker is using the tool to deploy a cryptominer and the Tsunami DDoS bot on compromised systems.
The dangerous ransomware group is targeting financial and insurance sectors using smishing and vishing against IT service desk administrators, cybersecurity teams, and other employees with top-level privileges.
Law enforcement seized electronics containing special hacking tools and software as well as a substantial amount of cash in the raids.
Most investors aren't demanding cybersecurity preparedness from startups, but founders should still be worried about the risks.