Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

The Cloud Edge Is the New Attack Surface

The cloud now acts as the connecting infrastructure for many companies' assets — from IoT devices to workstations to applications and workloads — exposing the edge to threats.

DARKReading
Microsoft Disrupts 'RaccoonO365' Phishing Service

Phishing-as-a-service (PhaaS) kits have become an increasingly popular way for lower-skill individuals who want to get into cybercrime.

#microsoft
'Scattered Lapsus$ Hunters,' Others Announce End of Hacking Spree

Though the groups have shared their decision to go dark, threat researchers say there are signs that it's business as usual.

AI-Powered Sign-up Fraud Is Scaling Fast

The AI era means attackers are smarter, faster, and hitting you where you least expect it — your sign-up funnel.

Raven Stealer Scavenges Chromium Data Via Telegram

The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware.

North Korean Group Targets South With Military ID Deepfakes

The North Korea-linked group Kimsuky used ChatGPT to create deepfakes of military ID documents in an attempt to compromise South Korean targets.

Ray Security Takes an Active Data Security Approach

The data security platform comes with a predictive capability that separates it from other offerings aimed at protecting enterprise data, the startup says.

Critical Bugs in Chaos Mesh Enable Cluster Takeover

"Chaotic Deputy" is a set of four vulnerabilities in the chaos engineering platform that many organizations use to test the resilience of their Kubernetes environments.

Self-Replicating 'Shai-hulud' Worm Targets NPM Packages

The newly emerged worm has spread across hundreds of open source software packages, stealing credentials and infecting other components without much direct attacker input.

'Vane Viper' Threat Group Tied to PropellerAds, Commercial Entities

Researchers say the commercial adtech platform and several other companies form the infrastructure of a massive cybercrime operation.