Thursday, April 24, 2025

Threat Intelligence

Threat Intelligence news from the cyber security industry and abroad. Gain insight into cybercrime and advanced persistent threats. Read the latest threat intelligence on malware and other vulnerabilities or malicious programs.

dark reading threat intel and cybersecurity news

Hackers Score Nearly $1M at Device-Focused Pwn2Own Contest

0
Security researchers and hackers demonstrated 63 zero-day vulnerabilities in popular devices at the latest Pwn2Own, exploiting printers from Canon, HP, and Lexmark, and routers and network-attached storage device from...
dark reading threat intel and cybersecurity news

Security Flaw in Atlassian Products Affecting Multiple Companies

0
BENGALURU, December 13, 2022 — Researchers at CloudSEK observed that for Atlassian products - Jira, Confluence, and BitBucket, cookies are not invalidated, even if the password is changed, with...
dark reading threat intel and cybersecurity news

Metaparasites & the Dark Web: Scammers Turn on Their Own

0
Cybercriminals are often seen as parasites, feeding off a wide swath of victims of every size and stripe. But as it turns out, they've become targets in their own...
dark reading threat intel and cybersecurity news

Rash of New Ransomware Variants Springs Up in the Wild

0
Enterprise security teams can add three more ransomware variants to the constantly growing list of ransomware threats for which they need to monitor.The three variants — Vohuk, ScareCrow, and...
dark reading threat intel and cybersecurity news

TikTok Banned on Govt. Devices; Will Private Sector Follow Suit?

0
Texas this week become the fifth US state to ban the TikTok app on government-owned devices over concerns about the social media app harvesting sensitive data from user devices...
dark reading threat intel and cybersecurity news

3 Ways Attackers Bypass Cloud Security

0
BLACK HAT EUROPE 2022 – London - CoinStomp. Watchdog. Denonia.These cyberattack campaigns are among the most prolific threats today targeting cloud systems — and their ability to evade detection...
dark reading threat intel and cybersecurity news

Google: Use SLSA Framework for Better Software Security

0
Organizations should implement the Supply Chain Levels for Software Artifacts (SLSA) framework when building software to ensure better software security and integrity, advocates Google — after the tech giant...
dark reading threat intel and cybersecurity news

Iranian APT Targets US With Drokbk Spyware via GitHub

0
A subgroup of the state-backed Iranian threat actor Cobalt Mirage is using a new custom malware dubbed "Drokbk" to attack a variety of US organizations, using GitHub as a...
dark reading threat intel and cybersecurity news

Report: Air-Gapped Networks Vulnerable to DNS Attacks

0
Common misconfigurations in how Domain Name System (DNS) is implemented in an enterprise environment can put air-gapped networks and the high-value assets they are aimed at protecting at risk...