Cyber-Pro Scam; New faces of risk; Cyber ​​increases the rating

Welcome to CISO Corner, the weekly collection of Dark Reading articles designed specifically for readers and security leaders involved in security operations. Each week we offer articles collected from our…

UN peacekeeping operations under fire from state-sponsored hackers

UN peacekeeping missions, especially in Africa, are at increasing risk of being compromised by sophisticated nation-state-sponsored threat actors and need to adopt best practices and basic cybersecurity infrastructure tools, new…

A look at 10 IT successes in the world of sports

The Olympic Games, FIFA World Cup and Super Bowl are just a few examples of iconic sporting events that demonstrate the global importance of the professional sports industry. But while…

TheMoon malware resurrects with paid malicious botnets

After disappearing for several years, TheMoon has returned with a botnet army of around 40,000 botnets, made up of small stolen SOHO (Home and Office) devices and available for rent…

The golden age of automated penetration testing has arrived

March 29, 2024News about hackersPen Testing/Regulatory Compliance Network penetration testing plays a critical role in detecting vulnerabilities that can be exploited. The current method of performing pen tests is expensive,…

Dormakaba locks used in millions of hotel rooms could be broken in seconds

March 29, 2024PressroomReverse Engineering/RFID Security Security vulnerabilities discovered in Dormakaba’s Saflok RFID electronic locks used in hotels could be weaponized by threat actors to spoof key cards and stealthily break…

TheMoon botnet resurfaces, leveraging EoL devices to power criminal proxies

March 29, 2024PressroomNetwork Security/IoT Security A previously considered inert botnet has been observed enslaving small home/small office (SOHO) routers and end-of-life IoT devices to power a criminal proxy service called…

The evolution of Iran’s cyber influence operations in support of Hamas

When the war between Israel and Hamas began on October 7, 2023, Iranian cyber groups immediately activated to provide support to Hamas. These Iranian-backed and Iranian-affiliated actors have combined influence…

A new Linux bug could lead to user password leaks and clipboard hijacking

March 29, 2024PressroomVulnerabilities/Linux Details have emerged about a vulnerability affecting the “wall” command of the util-linux package that could potentially be exploited by an attacker to leak a user’s password…

PyPI halts subscriptions due to surge in malicious package uploads targeting developers

March 29, 2024PressroomSupply Chain Attack/Threat Intelligence Maintainers of the Python Package Index (PyPI) repository briefly suspended new user signups following an influx of malicious projects uploaded as part of a…