The FBI’s Denver field office says the tools will convert documents while also dropping malware and scraping users’ systems for sensitive data.
Автор: Kristina Beek, Associate Editor, Dark Reading
FCC Investigates China-Backed Tech Suppliers for Evading US Operations Ban
FCC chairman warns these companies may still be operating in the US because they don’t believe that being added to its "Covered List" poses any serious risk.
Attackers Pivot to SEMrush Spoof to Steal Google Credentials
The attackers are taking an indirect approach to targeting SEO professionals and their Google credentials, using a fake digital marketing website.
Ukraine Defense Sector Under Attack Via Dark Crystal RAT
The UNC-200 threat group, active since last summer, has been utilizing the Signal messaging app to social engineer targets into downloading an infostealing remote access Trojan.
Infosys Settles $17.5M Class Action Lawsuit After Sprawling Third-Party Breach
Several major companies in the finance sector were impacted by the third-party breach, prompting them to notify thousands of customers of their compromised data.
Black Basta Leader in League With Russian Officials, Chat Logs Show
Though the chat logs were leaked a month ago, analysts are now seeing that Russian officials may have assisted Black Basta members according, to the shared messages.
Extortion Reboot: Ransomware Crew Threatens Leak to Snowden
Though the group initially stuck to classic ransomware TTPs before demanding the ransom, it went off script when it began threatening the group and detailing potential consequences the victim would face.
ClickFix Attack Compromises 100+ Car Dealership Sites
The ClickFix attack tactic seems to be gaining traction among threat actors.
Apache Tomcat RCE Vulnerability Under Fire With 2-Step Exploit
The researchers who discovered the initial assault warned that the simple, staged attack is just the beginning for advanced exploit sequences that will test cyber defenses in new and more difficult ways.
Man-in-the-Middle Vulns Provide New Research Opportunities for Car Security
A pair of researchers plan on detailing effective tools to dig into the effectiveness of vehicle cybersecurity without breaking the bank.