Source
DARKReading
The cloud now acts as the connecting infrastructure for many companies' assets — from IoT devices to workstations to applications and workloads — exposing the edge to threats.
Phishing-as-a-service (PhaaS) kits have become an increasingly popular way for lower-skill individuals who want to get into cybercrime.
Though the groups have shared their decision to go dark, threat researchers say there are signs that it's business as usual.
The AI era means attackers are smarter, faster, and hitting you where you least expect it — your sign-up funnel.
The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware.
The North Korea-linked group Kimsuky used ChatGPT to create deepfakes of military ID documents in an attempt to compromise South Korean targets.
The data security platform comes with a predictive capability that separates it from other offerings aimed at protecting enterprise data, the startup says.
"Chaotic Deputy" is a set of four vulnerabilities in the chaos engineering platform that many organizations use to test the resilience of their Kubernetes environments.
The newly emerged worm has spread across hundreds of open source software packages, stealing credentials and infecting other components without much direct attacker input.
Researchers say the commercial adtech platform and several other companies form the infrastructure of a massive cybercrime operation.