www.darkreading.com Open in urlscan Pro
2606:4700::6811:7863  Public Scan

Submitted URL: https://app.reg.techweb.com/e/er?sp_aid=116049&elq_cid=43606538&sp_eh=447d724fc79fe8493e7e8f91b598681d1cfa213356449634e9953b...
Effective URL: https://www.darkreading.com/?_mc=NL_DR_EDT_DR_daily_20230412&cid=NL_DR_EDT_DR_daily_20230412&sp_aid=116049&elq_cid=43606538&...
Submission: On April 13 via manual from US — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

ICS/OT

Remote Workforce

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Physical Security

IoT

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat USA - August 5-10 - Learn More
   
 * Black Hat Asia - May 9-12 - Learn More
   

Webinars
 * Expert Advice for Getting the Most from Security Orchestration, Automaton &
   Response Enterprise Tools
   Apr 13, 2023
 * SBOMS and the Modern Enterprise Software Supply Chain
   Apr 18, 2023

Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >

Newsletter

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

ICS/OT

Remote Workforce

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Physical Security

IoT

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat USA - August 5-10 - Learn More
   
 * Black Hat Asia - May 9-12 - Learn More
   

Webinars
 * Expert Advice for Getting the Most from Security Orchestration, Automaton &
   Response Enterprise Tools
   Apr 13, 2023
 * SBOMS and the Modern Enterprise Software Supply Chain
   Apr 18, 2023

Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

ICS/OT

Remote Workforce

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Physical Security

IoT

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat USA - August 5-10 - Learn More
   
 * Black Hat Asia - May 9-12 - Learn More
   

Webinars
 * Expert Advice for Getting the Most from Security Orchestration, Automaton &
   Response Enterprise Tools
   Apr 13, 2023
 * SBOMS and the Modern Enterprise Software Supply Chain
   Apr 18, 2023

Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >

--------------------------------------------------------------------------------

Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 
 3. 

Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint |
Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top
of Mind | <READ IT NOW>
PreviousNext
TOP STORIES
Majority of US IT Pros Told to Keep Quiet About Data Breaches

Apr 13, 2023

To report or not report? While more than half of all companies have suffered a
data breach, 71% of IT professionals say they have been told to not report an
incident, which could mean legal jeopardy.

LastPass Breach Reveals Important Lessons
Apr 12, 2023
Devastating cyberattacks often can be prevented with basic cybersecurity
measures.

Legion Malware Marches onto Web Servers to Steal Credentials, Spam Mobile Users
Apr 13, 2023
A novel credential harvester compromises SMTP services to steal data from a
range of hosted services and providers, and can also launch SMS-based spam
attacks against devices using US mobile carriers.
FBI & FCC Warn on 'Juice Jacking' at Public Chargers, but What's the Risk?
Apr 12, 2023
Hackers can compromise public charging hubs to steal data, install malware on
phones, and more, threatening individuals and businesses alike.

--------------------------------------------------------------------------------

Latest News

Super-Yacht Specialist Lürssen in Dry Dock After Ransomware Attack

The ransomware attack proves that even the wealthiest cannot buy their immunity
from threat actors.

The ransomware attack proves that even the wealthiest cannot buy their immunity
from threat actors.

by Dark Reading Staff, Dark Reading

Apr 13, 2023

Attacks/Breaches
1 MIN READ

Article

--------------------------------------------------------------------------------

Majority of US IT Pros Told to Keep Quiet About Data Breaches

To report or not report? While more than half of all companies have suffered a
data breach, 71% of IT professionals say they have been told to not report an
incident, which could mean legal jeopardy.

To report or not report? While more than half of all companies have suffered a
data breach, 71% of IT professionals say they have been told to not report an
incident, which could mean legal jeopardy.

by Robert Lemos, Contributing Writer, Dark Reading

Apr 13, 2023

Vulnerabilities/Threats
5 MIN READ

Article

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

Legion Malware Marches onto Web Servers to Steal Credentials, Spam Mobile Users

A novel credential harvester compromises SMTP services to steal data from a
range of hosted services and providers, and can also launch SMS-based spam
attacks against devices using US mobile carriers.

A novel credential harvester compromises SMTP services to steal data from a
range of hosted services and providers, and can also launch SMS-based spam
attacks against devices using US mobile carriers.

by Elizabeth Montalbano, Contributor, Dark Reading

Apr 13, 2023

Cloud
5 MIN READ

Article

--------------------------------------------------------------------------------

Lazarus Group's 'DeathNote' Cluster Pivots to Defense Sector

Usually focused on going after cryptocurrency organizations, the threat actor
has begun targeting defense companies around the world.

Usually focused on going after cryptocurrency organizations, the threat actor
has begun targeting defense companies around the world.

by Jai Vijayan, Contributing Writer, Dark Reading

Apr 12, 2023

Vulnerabilities/Threats
3 MIN READ

Article

--------------------------------------------------------------------------------

FBI & FCC Warn on 'Juice Jacking' at Public Chargers, but What's the Risk?

Hackers can compromise public charging hubs to steal data, install malware on
phones, and more, threatening individuals and businesses alike.

Hackers can compromise public charging hubs to steal data, install malware on
phones, and more, threatening individuals and businesses alike.

by Nate Nelson, Contributing Writer, Dark Reading

Apr 12, 2023

ICS/OT Security
4 MIN READ

Article

--------------------------------------------------------------------------------

Data on 400K Kodi Forum Members Stolen and Put Up for Sale

Open source media player Kodi still hasn't recovered its forum and plans to
redeploy it on a new server with software update.

Open source media player Kodi still hasn't recovered its forum and plans to
redeploy it on a new server with software update.

by Dark Reading Staff, Dark Reading

Apr 12, 2023

Attacks/Breaches
1 MIN READ

Article

--------------------------------------------------------------------------------

Microsoft: NSO Group-Like 'QuaDream' Actor Selling Mobile Spyware to Governments

Researchers at Microsoft have discovered links between a threat group tracked as
DEV-0196 and an Israeli private-sector company, QuaDream, that sells a platform
for exfiltrating data from mobile devices.

Researchers at Microsoft have discovered links between a threat group tracked as
DEV-0196 and an Israeli private-sector company, QuaDream, that sells a platform
for exfiltrating data from mobile devices.

by Elizabeth Montalbano, Contributor, Dark Reading

Apr 12, 2023

Vulnerabilities/Threats
5 MIN READ

Article

--------------------------------------------------------------------------------

Gartner: Human-Centric Design Is Top Cybersecurity Trend for 2023

In order to reduce cybersecurity risks and failures, organizations will need to
focus on employees, management, and new operating models.

In order to reduce cybersecurity risks and failures, organizations will need to
focus on employees, management, and new operating models.

by Dark Reading Staff, Dark Reading

Apr 12, 2023

Remote Workforce
1 MIN READ

Article

--------------------------------------------------------------------------------

More News

Latest Commentary

The Internet Reform Trilemma

An "open" Internet faces challenges from autocratic governance models.
Policymakers should instead think about creating an Internet that's equitable,
inclusive, and secure.

by Nick Merrill, Research Fellow, UC Berkeley Center for Long-Term Cybersecurity

Apr 13, 2023

--------------------------------------------------------------------------------

How to Define Tier-Zero Assets in Active Directory Security

There are plenty of AD objects and groups that should be considered tier zero in
every environment, but some will vary among organizations.

by Andy Robbins, Principal Product Architect, SpecterOps

Apr 13, 2023

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

LastPass Breach Reveals Important Lessons

Devastating cyberattacks often can be prevented with basic cybersecurity
measures.

by Mike Walters, VP of Vulnerability and Threat Research & Co-Founder, Action1
Corporation

Apr 12, 2023

--------------------------------------------------------------------------------

Where Are the Women? Making Cybersecurity More Inclusive

Stepped-up recruiting efforts along with better work-life balance policies and
mentoring and recruitment programs will help balance the scales.

by Corye Douglas, Risk Manager

Apr 11, 2023

--------------------------------------------------------------------------------

How Password Managers Can Get Hacked

Password managers aren't foolproof, but they do help mitigate risks from weak
credentials and password reuse. Following best practices can contribute to a
company's defenses.

by Stu Sjouwerman, Founder & CEO, KnowBe4, Inc.

Apr 11, 2023

--------------------------------------------------------------------------------

More Commentary



Partner Perspectives

How CIEM Can Improve Identity, Permissions Management for Multicloud
DeploymentsThe gap between permissions granted and permissions used exposes
organizations to increased risk. (Part two of a two-part series.)
Apr 11, 2023
Read More From Microsoft


PRODUCTS & RELEASES



Super-Yacht Specialist Lürssen in Dry Dock After Ransomware AttackThe Internet
Reform TrilemmaMajority of US IT Pros Told to Keep Quiet About Data
BreachesLegion Malware Marches onto Web Servers to Steal Credentials, Spam
Mobile UsersHow to Define Tier-Zero Assets in Active Directory SecurityGoogle
Tackles Open Source Security With New Dependency ServiceMenlo Security
Illustrates Importance of Browser Security as 4 in 5 Ransomware Attacks Include
Threats Beyond Data EncryptionVulnCheck Named CVE Numbering Authority for Common
Vulnerabilities and ExposuresReport Reveals ChatGPT Already Involved in Data
Leaks, Phishing Scams & Malware Infections
More Products & Releases
Resources
White Papers
 * Learn Infrastructure as Code: Step-by-Step
 * The Essential Guide to Secure Web Gateway
 * Unit 42 Retainer
 * Cloud Incident Response Datasheet
 * The CISOs Report: Perspectives, Challenges, and Plans for 2022 and Beyond

More White Papers
Events
 * Black Hat USA - August 5-10 - Learn More
 * Black Hat Asia - May 9-12 - Learn More

More Events
Webinars
 * Expert Advice for Getting the Most from Security Orchestration, Automaton &
   Response Enterprise ToolsApr 13, 2023
 * SBOMS and the Modern Enterprise Software Supply ChainApr 18, 2023
 * How Supply Chain Attacks Work -- And What You Can Do to Stop ThemApr 19, 2023
 * How to Accelerate XDR Outcomes: Bridging the Gap Between Network and
   EndpointApr 20, 2023
 * How to Launch a Threat Hunting ProgramApr 27, 2023

More Webinars

CONNECT WITH US

REGISTER FOR A

SUBSCRIBE TO THE

FOLLOW US

DARK READING WEBINAR

DARK READING NEWSLETTER

@DARKREADING

REGISTER FOR A

DARK READING WEBINAR

Learn about New Cybersecurity Threats, Vulnerabilities and Technology Trends.

SCHEDULE

SUBSCRIBE TO THE

DARK READING NEWSLETTER

Get daily or weekly Dark Reading top stories delivered straight into your inbox.

SUBSCRIBE

FOLLOW US

@DARKREADING

Follow us @darkreading to stay up-to-date with the latest news & insider
information about events & more.

 * 
 * 
 * 
 * 
 * 



DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2023 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.





Cookies Button


ABOUT COOKIES ON THIS SITE

We and our partners use cookies to enhance your website experience, learn how
our site is used, offer personalised features, measure the effectiveness of our
services, and tailor content and ads to your interests while you navigate on the
web or interact with us across devices. By clicking "Continue" or continuing to
browse our site you are agreeing to our and our partners use of cookies. For
more information seePrivacy Policy

CONTINUE




COOKIES PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


BACK



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices