APT31 cloned and reused a Windows-based hacking tool for years before Microsoft patched the vulnerability, researchers report.
Source: Dark Reading – Threat
[...]
Almost four of every five attacks attributed in 2020 were conducted by cybercriminal groups, a significant jump from 2019, with attacks on healthcare
[...]
A stored cross-site scripting vulnerability in the iCloud website reportedly earned a security researcher $5,000.
Source: Dark Reading – Threat Intelligence –
[...]
Security researchers explore how criminals are expanding their arsenals with new, more subtle, and more effective ransomware attack techniques.
Source: Dark Reading
[...]
A proof-of-concept program infects systems with ARM64-compiled binaries and then reaches out to download additional functionality.
Source: Dark Reading – Threat Intelligence
[...]
Without on-site audits, many organizations lack their usual visibility to assess risk factors and validate contracts and SLA with providers.
Source: Dark
[...]
Multilayered infiltration involved custom malicious tooling, backdoors, and cloaked code, far beyond the skills of script kiddies.
Source: Dark Reading – Threat
[...]
Similar to previous ransomware takedowns, this disruption to the ransomware-as-a-service model will likely be short-lived, security experts say.
Source: Dark Reading –
[...]