Though there is no confirmation as to when this extradition will occur, Alexander Moucka agreed to be transferred in writing before a judge. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Category Archives: Uncategorized
Strong DLP can be a game-changer — but it can also become a slow-moving, overcomplicated mess if not executed properly. Go to Source Author: Michael Fox
A new investigation has unearthed nearly 200 unique command-and-control (C2) domains associated with a malware called Raspberry Robin. “Raspberry Robin (also known as Roshtyak or Storm-0856) is a complex and evolving threat actor that provides initial access broker (IAB) services to numerous criminal groups, many of which have connections to Russia,” Silent Push said in […]
Upgrading the organization’s Windows 10 systems to Windows 11 could potentially introduce vulnerabilities into the environment through misconfigured hardware. Go to Source Author: Stephen Lawton
Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe. Go to Source Author: Becky Bracken, Senior Editor, Dark Reading
A major telecommunications company located in Asia was allegedly breached by Chinese state-sponsored hackers who spent over four years inside its systems, according to a new report from incident response firm Sygnia. The cybersecurity company is tracking the activity under the name Weaver Ant, describing the threat actor as stealthy and highly persistent. The name […]
New agentic AI capabilities in Microsoft Security Copilot will allow agents to triage threats and provide recommendations. Go to Source Author: Jeffrey Schwartz
Organizations now use an average of 112 SaaS applications—a number that keeps growing. In a 2024 study, 49% of 644 respondents who frequently used Microsoft 365 believed that they had less than 10 apps connected to the platform, despite the fact that aggregated data indicated over 1,000+ Microsoft 365 SaaS-to-SaaS connections on average per deployment. […]
Security experts worry the company’s Chapter 11 status and aim to sell its assets could allow threat actors to exploit and misuse the genetic information it collected. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Cybersecurity researchers are calling attention to an Android malware campaign that leverages Microsoft’s .NET Multi-platform App UI (.NET MAUI) framework to create bogus banking and social media apps targeting Indian and Chinese-speaking users. “These threats disguise themselves as legitimate apps, targeting users to steal sensitive information,” McAfee Labs researcher Dexter Shin said. .NET Go to […]
