Source
DARKReading
Weaponizing Microsoft's own services for command-and-control is simple and costless, and it helps attackers better avoid detection.
A recent campaign targeting Middle Eastern government organizations plays standard detection tools like a fiddle. With cyberattackers getting more creative, defenders must start keeping pace.
The quest to keep data private while still being able to search may soon be within reach, with different companies charting their own paths.
The breach was carried out with stolen Citrix credentials for an account that lacked multifactor authentication. Attackers went undetected for days, and Change's backup strategy failed.
Unmanaged and unknown Web services endpoints are just some of the challenges organizations must address to improve API security.
Some customers found that they had the ability to cancel a stranger's flight to another country after opening the app, which was showing other individuals' flight details.
The newly discovered malware, which has so far mainly targeted Turkish telcos and has links to HiatusRat, infects routers and performs DNS and HTTP hijacking attacks on connections to private IP addresses.
With mergers and acquisitions making a comeback, organizations need to be sure they safeguard their digital assets before, during, and after.