4 Critical Steps in Advance of 47-Day SSL/TLS Certificates – Dark Reading
With certificate lifespans set to shrink by 2029, IT teams need to spend the next 100 days planning in order to avoid operational disruptions. – Read More
With certificate lifespans set to shrink by 2029, IT teams need to spend the next 100 days planning in order to avoid operational disruptions. – Read More
Within months of implementing anti-fraud measures and automation, Texas National Bank prevented more than $300,000 in check fraud. – Read More
The threat actors trick victims into opening a malicious script, leading to the execution of the BroaderAspect .NET loader. – Read More
The new ransomware strain’s aggressive multithreading and cross-platform capabilities make it a potent threat to enterprise environments. – Read More
Researchers observed North Korean threat actors targeting cryptocurrency and Web3 platforms on Telegram using malicious Zoom meeting requests. – Read More
The outage began shortly before the July 4 holiday weekend and caused disruptions for customer ordering and other services provided by the IT distributor. – Read More
The announcement comes just months after security researchers observed that the group was making the transition to rebrand to World Leaks, a data theft outfit. – Read More
A color picker for Google’s browser with more than 100,000 downloads hijacks sessions every time a user navigates to a new webpage and also redirects them to malicious sites. –…
Deloitte’s new blueprint looks to bridge the gap between the massive push for AI adoption and a lack of preparedness among leaders and employees. – Read More
As attacks on software supply chains and third parties increase, more data on critical software and infrastructure services is being advertised and sold on the Dark Web. – Read More
The Anti-Phishing Working Group observed how attackers are increasingly abusing QR codes to conduct phishing attacks or to trick users into downloading malware. – Read More
Malicious extensions can be engineered to bypass verification checks for popular integrated development environments, according to research from OX Security. – Read More
Microsoft, PayPal, Docusign, and others are among the trusted brands threat actors use in socially engineered scams that try to get victims to call adversary-controlled phone numbers. – Read More
Passengers’ personal information was likely accessed via a third-party platform used at a call center, but didn’t include passport or credit card info. – Read More
Attackers can abuse malicious extensions to access critical data, including credentials, but organizations can reduce the risks by raising awareness and enforcing strict policy controls. – Read More