A secretive phishing cabal boasts a sophisticated affiliate network and a modular, custom toolset that's claiming victims on three continents. [TechWeb]( Follow Dark Reading:
[RSS](
September 07, 2023 LATEST SECURITY NEWS & COMMENTARY [W3LL Gang Compromises Thousands of Microsoft 365 Accounts](
A secretive phishing cabal boasts a sophisticated affiliate network and a modular, custom toolset that's claiming victims on three continents.
[Google's Souped-up Chrome Store Review Process Foiled by Data-Stealer](
Researchers have discovered that despite Google's adoption of the Manifest V3 security standard to protect against malicious plug-ins, attackers can still get bad extensions past its review process.
[AtlasVPN Linux Zero-Day Disconnects Users, Reveals IP Addresses](
All it takes is a simple copy-paste to undo a VPN service used by millions worldwide.
[NYC Subway Disables Trip-History Feature Over Tap-and-Go Privacy Concerns](
The move by New York's Metropolitan Transit Authority (MTA) follows a report that showed how easy it is for someone to pull up another individual's seven-day ride history through the One Metro New York (OMNY) website.
[Researchers Discover Critical Vulnerability in PHPFusion CMS](
No patch is available yet for the bug, which can enable remote code execution under the correct circumstances.
[Peiter 'Mudge' Zatko Lands Role as CISA Senior Technical Adviser](
The former hacker and Twitter security executive will use his role to help fulfill the Biden administration's plans for the National Cybersecurity Strategy.
[Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs](
The Security and Exchange Commission's Proposed Rule for Public Companies (PPRC) is ambiguous.
[Apple iPhone 14 Pro Offered Up to the Hacking Masses](
Since launching in 2019, the Security Device Research Program has discovered 130 critical vulnerabilities; applications are now open for Apple's 2024 iteration.
[Securing Your Legacy: Identities, Data, and Processes](
Legacy systems of all kinds pose significant cybersecurity risks. Here's how to mitigate them.
[Realism Reigns on AI at Black Hat and DEF CON](
Realistic expectations and caution began to replace wonder and confusion for generative AI at the recent security industry gatherings.
[As LotL Attacks Evolve, So Must Defenses](
Because living-off-the-land (LotL) attacks masquerade as frequently used, legitimate companies, they are very difficult to block and detect. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS [A Brief History of ICS-Tailored Attacks]( It's on the cyber defenders to learn from the past and make industrial control system networks hostile to attackers.
[How Companies Can Cope With the Risks of Generative AI Tools]( To benefit from AI yet minimize risk, companies should be cautious about information they share, be aware of AI's limitations, and stay vigilant about business implications.
[Cybercriminals Team Up to Upgrade 'SapphireStealer' Malware]( A hacker published a real gem of an infostealer to GitHub that requires zero coding knowledge to use. Then a community sprung up around it, polishing the code to a high shine and creating new, even more robust features. [MORE]( EDITORS' CHOICE [Hackers Target High-Privileged Okta Accounts via Help Desk](
Threat actors convince employees to reset MFA for Super Admin accounts in the IAM service to leverage compromised accounts, impersonating users and moving laterally within an organization. LATEST FROM THE EDGE [Cybersecurity Builds Trust in Critical Infrastructure](
Improving an energy company's resistance to cyberattack does more than protect vital resources â it enhances trust from customers and investors. LATEST FROM DR TECHNOLOGY [Coding Tips to Sidestep JavaScript Vulnerabilities](
This Tech Tip focuses on best security practices to write secure JavaScript code. LATEST FROM DR GLOBAL [US Government Denies Blocking Sales of AI Chips to Middle East](
Nvidia and AMD do face expanded export rules for their A100 and H100 artificial intelligence (AI) chips in the Middle East, but it's not yet clear why. WEBINARS - [Cyber Risk Assessment Secrets From the Pros]( Executives want to know whether they should worry about an attack that hit another organization. They worry how safe they are from a breach. But it can be difficult for security teams to quantitatively measure risk, or even say with ... - [How Businesses Can Counterpunch against Generative AI-Powered Ransomware]( Join industry experts in AI and cybersecurity as they examine how ChatGPT and other generative AI tools are currently being used to improve the efficacy of ransomware attacks, how that will affect the cyber risk posture of most businesses, and ... [View More Dark Reading Webinars >>]( WHITE PAPERS - [Digital Transformation and Connected Systems Have Opened the Door to New Threat Vectors](
- [Essential SASE Must-haves](
- [Rediscovering Your Identity](
- [2023 Global Future of Cyber Report](
- [Cybersecurity in a post pandemic world: A focus on financial services](
- [Cybersecurity in 2023 and beyond: 12 leaders share their forecasts](
- [Know your customer: Enable a 360-degree view with customer identity & access management]( [View More White Papers >>]( FEATURED REPORTS - [What Ransomware Groups Look for in Enterprise Victims]( Ransomware attackers cast a wide net -- they just care about causing damage, making money, and gaining new victims. That means no organization is automatically immune to attack just because of its size or industry. Organizations need to take steps ... - [Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware](
- [Successfully Managing Identity in Modern Cloud and Hybrid Environments]( Cloud promised to simplify the security and management of enterprise systems. In many ways it has, but when it comes to identity management it's as complicated as ever. This report details how to get identity programs on track -- and ... [View More Dark Reading Reports >>]( PRODUCTS & RELEASES [Tuya Smart and Amazon Web Services Collaborate to Establish an IoT Security Lab]( [Global Cloud Security Market to Reach $62.9B by 2028]( [Hornetsecurity Releases 365 Total Protection Plan 4 for Microsoft 365]( [Lacework Expands Partnership With Google Cloud to Deliver Enterprise Flexibility in the Cloud]( [AI for Good: Voxel AI Tech Increases Funding to $30M With Strategic Funding Round]( [ReasonLabs Summer 2023 Trends Report Reveals Top Consumer Security Threats]( [3 out of 4 Cyberattacks in the Education Sector Are Associated With a Compromised OnâPremises User or Admin Account]( [Introducing SafeUTM: The Free Version of NGFW]( [National Cybersecurity Alliance Receives 200K Grant From Craig Newmark Philanthropies for HBCU Cybersecurity Program](
[MORE PRODUCTS & RELEASES]( CURRENT ISSUE
[What Ransomware Groups Look for in Enterprise Victims](
[DOWNLOAD THIS ISSUE](
[VIEW BACK ISSUES]( Dark Reading Weekly
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:ContactDarkReading@informa.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: /cdn-cgi/l/email-protection?sp_aid=118049&elq_cid=22844169&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529&utm_source=eloqua&utm_medium=email&utm_campaign=DR_NL_Dark%20Reading%20Weekly_09.07.23&sp_cid=49721&utm_content=DR_NL_Dark%20Reading%20Weekly_09.07.23&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529#81
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2023]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:ContactDarkReading@informa.com)