ICYMI: A Microsoft Warning, Follina, Atlassian, and More
Dark Reading's digest of the other don't-miss stories of the week, including YouTube account takeovers and a sad commentary on…
Google: Hack-for-Hire Groups Present a Potent Threat
Cyber mercenaries in countries like India, Russia, and the UAE are carrying out data theft and hacking missions for a…
Microsoft Exchange servers worldwide backdoored with new malware
A newly discovered lightweight and persistent malware was used by attackers to backdoor Microsoft Exchange servers belonging to government and…
Evilnum hackers return in new operation targeting migration orgs
The Evilnum hacking group is showing renewed signs of malicious activity, targeting European organizations that are involved in international migration.…
Cybercriminals Use Azure Front Door in Phishing Attacks
Resecurity, Inc. (USA) has identified a spike in phishing content delivered via Azure Front Door (AFD), a cloud […] The…
Microsoft Exchange bug abused to hack building automation systems
A Chinese-speaking threat actor has hacked into the building automation systems (used to control HVAC, fire, and security functions) of…
APT Groups Swarming on VMware Servers with Log4Shell
CISA tells organizations running VMware servers without Log4Shell mitigations to assume compromise.
Chinese APT Group Likely Using Ransomware Attacks as Cover for IP Theft
Bronze Starlight’s use of multiple ransomware families and its victim-targeting suggest there’s more to the group’s activities than just financial…
How APTs Are Achieving Persistence Through IoT, OT, and Network Devices
To prevent these attacks, businesses must have complete visibility into, and access and management over, disparate devices.