FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdaySecurity

You Can't Opt Out of Citizen Development

By Michael Bargury, CTO & Co-Founder, Zenity
To see why low-code/no-code is inevitable, we need to first understand how it finds its way into the enterprise.

  • May 16th 2022 at 18:32

NSA Cyber Chief Vows 'No Backdoors' in Quantum Encryption Standards

By Dark Reading Staff, Dark Reading
New quantum encryption standards will stand up to spy-snooping, NSA cybersecurity director said.

  • May 16th 2022 at 17:15

Name That Toon: Knives Out

By John Klossner, Cartoonist
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

  • May 16th 2022 at 17:00

Critical Zyxel Firewall Bug Under Active Attack After PoC Exploit Debut

By Tara Seals, Managing Editor, News, Dark Reading
Just one day after disclosure, cyberattackers are actively going after the command-injection/code-execution vulnerability in Zyxel's gear.

  • May 16th 2022 at 16:30

US Cyber Director: Forging a Cybersecurity Social Contract Is Not Optional

By Becky Bracken, Editor, Dark Reading
In a Black Hat Asia keynote fireside chat, US national cyber director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.

  • May 16th 2022 at 15:49

Me, My Digital Self, and I: Why Identity Is the Foundation of a Decentralized Future

By Richard Searle, Vice President of Confidential Computing, Fortanix
A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.

  • May 16th 2022 at 14:00

Firefox out-of-band update to 100.0.1 – just in time for Pwn2Own?

By Paul Ducklin
A new point-release of Firefox. Not unusual, but the timing of this one is interesting, with Pwn2Own coming up in a few days.

How to Turn a Coke Can Into an Eavesdropping Device

By Robert Lemos, Contributing Writer, Dark Reading
Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.

  • May 14th 2022 at 14:37

US Agrees to International Electronic Cybercrime Evidence Swap

By Dark Reading Staff, Dark Reading
The Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals.

  • May 13th 2022 at 20:18

CISO Shares Top Strategies to Communicate Security's Value to the Biz

By Tara Seals, Managing Editor, News, Dark Reading
In a keynote address at Black Hat Asia in Singapore this week, CISO and former NASA security engineer George Do discussed his go-to model for measuring security effectiveness – and getting others in the organization to listen.

  • May 13th 2022 at 20:16

Black Hat Asia: Democracy's Survival Depends on Taming Technology

By Becky Bracken, Editor, Dark Reading
The conference opens with stark outlook on the future of global democracy — currently squeezed between Silicon Valley and China.

  • May 13th 2022 at 19:45

Linux, OpenSSF Champion Plan to Improve Open Source Security

By Dark Reading Staff, Dark Reading
The White House and tech industry pledge $150 million over two years to boost open source resiliency and supply chain security.

  • May 13th 2022 at 17:05

He sold cracked passwords for a living – now he’s serving 4 years in prison

By Paul Ducklin
Crooks don't need a password for every user on your network to break in and wreak havoc. One could be enough...

Log4Shell Exploit Threatens Enterprise Data Lakes, AI Poisoning

By Tara Seals, Managing Editor, News, Dark Reading
A brand-new attack vector lays open enterprise data lakes, threatening grave consequences for AI use cases like telesurgery or autonomous cars.

  • May 13th 2022 at 14:59

Data Transformation: 3 Sessions to Attend at RSA 2022

By Liat Hayun, Co-Founder and CEO, Eureka Security
Three RSA 2022 sessions take deep dives into the security considerations around data cloud transformation.

  • May 13th 2022 at 14:00

How to Avoid Falling Victim to PayOrGrief's Next Rebrand

By Oakley Cox, Director of Analysis, Darktrace
The group that shut down the second largest city in Greece was not new but a relaunch of DoppelPaymer.

  • May 13th 2022 at 13:41

What’s a Parent to Do? Closing the Protection Gap between You and Your Children.

By McAfee

Hands down, children look to their parents to keep them safe online more than anyone else, which begs the question—what’s a parent to do?

Our recent study on connected families found that nearly three-quarters of children said their parents were best suited to teach them about staying safe online, nearly twice than teachers at school (39%) and more than twice over for online resources (34%). Parents recognize their role as a protector online as well, with an overwhelming 90% of parents worldwide agreeing that they’re the primary source.

However, our study also found that parents could be taking more steps to protect themselves online, let alone taking steps for their children. In fact, when looking at how parents protect themselves and then if they protect their children the same way, a distinct gap appears.

Online Security Habits Across Devices

Figures that were already low for relatively straightforward and relatively easily employed safety measures drop yet lower for children—such as installing antivirus software, protecting the computer with a password, or sticking to reputable online stores when shopping.

For example, on computers and laptops, note the 11% drop in antivirus usage, the 14% drop in device password/passcode protection, and the 9% drop in regular updates to the operation system.

This trend continues when the study looked at mobile device protection for parents and children. The numbers were similarly low, and sometimes lower than the rate of protection on PCs and laptops. For example, while 56% of parents said that they protect their child’s smartphone with a password or passcode, only 42% said they do the same for their child’s smartphone—a further 14% drop.

Across the board, parents reported protecting a child’s smartphone to a lesser degree than they protect a child’s computer or laptop—notably when it comes to installing antivirus on phones, to a figure of 19% less (57% to 38%).

Mobile Device Usage Among Children

What’s striking about this is how tweens and teens access the internet today. Our report found that 74% of them said that their smartphone was their most important device (followed by their gaming console at 68%). Moreover, the rate at which they use their smartphones indicates that these devices are their primary onramp to the internet. By ages 15 to 16, some 90% of children worldwide report using a smartphone.

Given these findings, two important points stand out for parents:

  • First, the steps that parents take to protect themselves aren’t always done for their children—even though their children look overwhelmingly to them for protection online.
  • Second, children are going largely unprotected on the devices they use to access the internet the most—their smartphones.

Misconceptions about online protection may play a role in these lax measures. Two additional findings may indicate why this is:

  • 49% of parents think a new phone is more secure than a new computer.
  • 59% of tweens and teens thought new phone was more secure as well.

Both perceptions deny the reality that smartphones, and the people using them, are subject to hacks and attacks just like with any other device that connects to the internet. As such, smartphones call for protection too.

6 Steps to protect you and your family online

So, what’s a parent to do? They can take a few basic actions that will go a long way toward safeguarding themselves and their families online:

1) Protect yourselves

It used to be that we could load antivirus on our devices and go on our way with confidence. That’s not the case anymore. While antivirus is still a cornerstone of protection, it’s just a part of overall online protection. Comprehensive online protection software protects more than your computer or smartphone, it protects you.

For example, ours offers all-in-one protection for your personal info and privacy for peace of mind against data breaches—along with further features that can remove your data from some of the riskiest data broker sites that are selling it online. Other features include an online protection score that shows you just how strong your security is, along with simple guidance that can help seal up any gaps.

In all, online protection is the place to start when looking after yourself and your family online, whether that’s on a computer, laptop, or phone—with particular emphasis on phones, given the way parents and children alike rely on them so strongly.

2) Protect your identities

Identity theft can affect anyone, even the youngest of children. Our study found that 15% of children experienced attempted account theft, while 28% of parents reported it happening to them. An identity protection service like ours can monitor your family’s accounts and personal info for unauthorized or suspicious activity—and help you restore a compromised identity with the help of a pro.

3) Protect your devices

In and above using online protection software, there’s also the security of your devices to consider too. After all, devices can get lost or stolen. Take steps to protect your devices by ensuring they’re locked with a PIN or other protection like facial recognition. For your apps, use two-factor authentication wherever possible for extra protection should your device end up in someone else’s hands.

4) Protect your accounts

Similarly, you can take steps to protect your online accounts by using strong, unique passwords for each one. That means no repeats. This makes it far more difficult for hackers to compromise multiple accounts, such that if one password is compromised in a data breach, any potential damage is limited to just that one account in question.

Taking care of that yourself can be a lot of work, given all the accounts you likely have accounts across all the shopping and banking, not to mention your apps. It gets even more involved when you add all your children’s accounts into the mix. Yet there’s good news, a password manager can do all the work by creating and storing strong, unique passwords for you.

5) Keep updated

Updating your operating systems and apps can keep you current with the latest features and enhancements, and help you keep one step ahead of hackers as well. Many updates to operating systems and apps include security fixes and enhancements, which can keep bad actors from taking advantage of any exploits or loopholes on your devices. Many devices and apps make it easy with an auto-update feature. If any of yours offer auto-updating, take advantage.

6) Keep talking

Completely aside from software, apps, and updates, another way to keep your kids safe online is through conversation. When talking with them about their day, weave in a few questions about what’s happening online. What are their favorite games and apps right now? What shows are they watching? Is there a funny post or video they want to share?

Questions like these, simple as they are, can make talking about their life online seem more normal—the ups and downs of it alike—and provide you with opportunities that will help you foster strong decision-making skills that they can carry into adulthood.

Closing the gap

With our study uncovering a clear gap in protection, parents can rest assured they can close it with a few relatively straightforward steps, making everyone in the household safer than before.

This was just one of several findings from our global report on connected families. Others include noteworthy differences across nations, such as which nations report the highest levels of cyberbullying and which nation has nearly 100% of its young children saying they use a smartphone regularly. Yet more findings reveal insights into screen time, video game usage, and a breakdown of the top online activities for teens—and many more ways families are growing up together through their lives online.

Again, what’s a parent to do in light of all this?

Our blog is a great place to start. It offers parents and families a terrific resource when they have questions about life online, along with further resources about online protection that simply make for good reading. Our aim is to help you get thinking about what’s best for your family and the steps you can take to see it through, all so that you can make everyone’s time online safer and more enjoyable.

The post What’s a Parent to Do? Closing the Protection Gap between You and Your Children. appeared first on McAfee Blog.

Transforming SQL Queries Bypasses WAF Security

By Robert Lemos, Contributing Writer, Dark Reading
A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.

  • May 12th 2022 at 23:20

Black Hat Asia: Firmware Supply Chain Woes Plague Device Security

By Tara Seals, Managing Editor, News, Dark Reading
The supply chain for firmware development is vast, convoluted, and growing out of control: patching security vulnerabilities can take up to two years. For cybercriminals, it's a veritable playground.

  • May 12th 2022 at 22:57

3 Predictors of Cybersecurity Startup Success

By Ed Amoroso, CEO, TAG Cyber LLC
Before investing, venture capitalists should consider a trio of business characteristics that seem to correlate with commercial success, based on meetings with over 2,000 cybersecurity startups.

  • May 12th 2022 at 20:49

Egnyte Enhances Program for Managed Service Providers

Enhancements to the program include unique packages, faster response time for invoicing, and dedicated training for new solutions.
  • May 12th 2022 at 20:31

StackHawk Raises $20.7 Million in Series B Funding for Developer-First Application and API Security Testing

Round co-led by Sapphire Ventures and Costanoa Ventures to accelerate product leadership and market growth.
  • May 12th 2022 at 20:24

Cloud Firm Appian Awarded $2B in Trade Secret Cyber-Theft Lawsuit

By Dark Reading Staff, Dark Reading
Cloud competitor found liable for breaking into Appian back-end systems to steal company secrets.

  • May 12th 2022 at 19:01

Needs Improvement: Scoring Biden's Cyber Executive Order

By Ali N. Khan, Solution Demand Manager, ReversingLabs
One year after it was issued, has President Biden's Cyber Executive Order had an impact?

  • May 12th 2022 at 17:00

S3 Ep82: Bugs, bugs, bugs (and Colonial Pipeline again) [Podcast]

By Paul Ducklin
Latest episode - lots to learn - plain English - fun with a serious side - listen now!

Serious Security: Learning from curl’s latest bug update

By Paul Ducklin
Learn how to write plain-speaking and purposeful security advisories from one of the most widely-used open source tools in the world.

How Can Your Business Defend Itself Against Fraud-as-a-Service?

By Bruno Farinelli, Fraud Analytics Manager, ClearSale
By understanding how FaaS works and following best practices to prevent it, your business can protect its customers, revenue, and brand reputation.

  • May 12th 2022 at 14:00

Known macOS Vulnerabilities Led Researcher to Root Out New Flaws

By Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
Researcher shares how he unearthed newer bugs in Apple's operating system by closer scrutiny of previous research, including vulnerabilities that came out of the Pwn2Own competition.

  • May 12th 2022 at 13:45

5 Years That Altered the Ransomware Landscape

By Jai Vijayan, Contributing Writer, Dark Reading
WannaCry continues to be a reminder of the challenges that organizations face dealing with the ransomware threat.

  • May 12th 2022 at 13:00

Google Will Use Mobile Devices to Thwart Phishing Attacks

By Dark Reading Staff, Dark Reading
In an effort to combat phishing, Google will allow Android phones and iPhones to be used as security keys.

  • May 12th 2022 at 11:51

Nokia Opens Cybersecurity Testing Lab

By Dark Reading Staff, Dark Reading
The end-to-end cybersecurity 5G testing lab will help identify and prevent cyberattacks on 5G networks.

  • May 12th 2022 at 12:31

On the Air With Dark Reading News Desk at Black Hat Asia 2022

By Dark Reading Staff, Dark Reading
This year's Black Hat Asia is hybrid, with some sessions broadcast on the virtual platform and others live on stage in Singapore. News Desk is available on-demand with prerecorded interviews.

  • May 12th 2022 at 11:41

Life Behind the Screens of Parents, Tweens, and Teens: McAfee’s Connected Family Study

By McAfee

How do parents and children connect and protect themselves online? We spoke with thousands of them around the world to find out.

In December 2021 we conducted a study about beliefs and behaviors about life online among members of connected families—as individuals and as a family unit. Parents and children were surveyed together, with parents answering first and then bringing their children in to consent and answer, leading to findings that represent connected families across 10 different nations.

Through this study, we uncovered universal beliefs about online protection, along with several nuances, all of which pinpointed several tensions between parents and children when it comes to staying safe while enjoying life online.

Four broader topics presented themselves through this study, with each topic presenting several follow-on findings. Here, we’ll take a look at each topic and touch on a few of the several findings found within each, followed by a link where you can download the full report with its complete set of insights and trends.

Topic One: Mobile Maturity

While our tweens and tweens seem to grow into adults right before our eyes, their lives online mature into adulthood as well—thanks in large part to their mobile devices.

Our study found that children between 15 and 16 years old see their mobile usage jump significantly, so much so that it approaches levels that they will carry into adulthood. Yet their connected lives start much earlier, with smartphones and mobile devices leading the way online. The result is that most tweens and young teens today have access to the expansive internet in the palm of their hand, which exposes them to the broader internet full of apps, chats, entertainment, and social media—along with the benefits and risks nearly right away.

As far as the risks are concerned, tweens and young teens reported on their experience with cyberbullying, account theft, and unauthorized use of their personal data. Here it appears that several children were exposed to these risks at an early age.

While these experiences start early with 10–14-year-olds, exposure to online risks only increase as teens get older. By age 17 to 18, reports of cyberbullying increase to 18%, attempted theft of an online account to 16%, and unauthorized use of personal data to 14%.

Topic Two: Parents as Safekeepers

As far as life online is concerned, children look to their parents to keep them safe. While parents accept that role, our study found that they appear to have difficulty in following through.

Children said that their parents are best suited to teach them about being safe online, making them the clear winners across all categories. Nearly three-quarters of children pointed to parents, nearly twice than teachers at school (39%) and more than twice over for online resources (34%).

Looking at the reasons for that response more closely, 63% tweens and teens worldwide felt that their parents know enough to protect their security and privacy. This figure was higher for younger children (65%) and then decreased as they reached their late teens (55%). As noted earlier, an increasing number of children in their late teens have experienced online risks at this point, perhaps leading to less confidence that their parents indeed have the knowledge to keep them safe.

Parents recognize their role as protectors online, just as they recognize their responsibility to protect their children in the broader world. An overwhelming 90% of parents worldwide agreed with this sentiment. Like their children, parents felt that teachers at school played a role as well at 36%. However, their second top response was internet providers, weighing in at 41%.

Yet while parents say they view themselves as protectors, there’s a gap between intent and effort. On PCs and laptops, parents reported the online protection measures they took for themselves, which appear relatively low given the availability and ease of use with such measures—like installing antivirus software (68%), protecting the computer with a password (58%), or sticking to reputable online stores when shopping (50%).

These figures drop yet lower when asked if they took similar precautions for their children. Thus, as parents protect themselves at a low rate, they protect their children at a rate that’s yet even lower.

Moreover, when it came to protection on smartphones, the numbers were similarly low, and often lower than the rate of protection on PCs and laptops. For example, while 56% of parents said that they protect their smartphone with a password or passcode, only 42% said they do the same for their child’s smartphone—a further 14% drop.

Topic Three: The Secret Lives of Tweens and Teens Online

It’s no secret that teens and tweens may hide their activities online. In fact, they’ve said as much.

Our research found that more than half of children (59%) take some action to hide what they’re up to online. When asked for details, tweens and teens mentioned the following:

  • Clearing the browser history, 26%.
  • Close/minimize browser when parent walked in, 21%.
  • Hide or delete IMs or videos, 15%.
  • Browse with incognito mode, 15%.
  • Lie or omit details about online activities, 15%.
  • Use a device their parents don’t check, 10%.

As children grow older, these privacy-keeping activities only increase, particularly when it comes to clearing browser history and using incognito mode in their browser.

Likewise, it appears that it’s no secret children are speaking privately with people they don’t know online. When asked if they believe their children are having conversations without knowing a person’s real identity, 34% of parents said yes. As for children, 37% said yes, marking a 3% difference in awareness between parents and children.

Broken down by age bracket, 36% of children from ages 10 to 14 say they’re having these conversations, which jumps up to 41% at ages 15 to 16. Later, from ages 17 to 18, that figure drops to 39%.

Topic Four: Gendered Protection Bias

Parents in our study said that they take different measures for boys and girls when it comes to protecting them online. An apparent gender bias finds girls more protected than boys, yet it is boys who encounter more issues online.

Keeping tabs of a child’s safety online takes many forms, some involving apps and software on a child’s device, others that require parents to take a more active hand.

As for safety on devices, parental controls software provides one method for monitoring online activity, with features that keep an eye on children’s activity, limit screen time, and that block and filter certain apps and websites.

Parental controls software appears to remain a popular option. On PCs and laptops, 33% of parents reported using it. On mobile devices, the figure held at 33% as well.

Further, parents said that they relied on other approaches to help keep their children safe, citing several other ways they oversee their children’s time online. For example, in the case of monitoring activity on their child’s mobile device, parents say they will:

  • Limit the time of day or length of time when the child has screen time, 59%.
  • Check the websites or apps the child visits or uses, 56%.
  • Look at call records or text messages on a smartphone the child uses, 40%.
  • Friend or follow the child on social media sites, 35%.
  • Track the child’s location through GPS apps or software, 30%.

However, accounting for age and gender, differences in the use of parental controls arise. Girls in their tweens and early teens see more protection from parental controls software than boys do.

For example, girls 10-14 were more likely than boys of the same age to have parental controls on PCs on laptops in every country surveyed (except Canada), and on mobile in every country (except Germany).

This trend extends to several of the more hands-on approaches, with girls seeing them applied more often than boys. For example, in the U.S.:

  • 47% of parents say they will check the browsing and email history on the PCs of their daughters aged 10 to 14. For boys of the same age, that figure is far lower at 33%.
  • The numbers for mobile devices were also similar, with reported checks for girls at 48% and for boys at 35%.

Based on reports from boys, they are more likely to experience a range of online threats more frequently than girls do—with issues ranging from attempted account theft, a financial information leak, and unauthorized use of their personal data.

Meanwhile, it is girls who are adopting online activities at a rate much faster than boys, at least on mobile. Girls aged 10 to 14 tend to stream music, use social media, and go online shopping more than boys their age.

In all, girls report that they are reaping the benefits of online life earlier than boys and with relatively fewer security issues. Meanwhile, for boys, that equation is flipped. Their online lives mature more slowly, yet they find themselves experiencing security issues more often.

Further findings

We’ve seen just how young children are when they reach maturity, at least in terms of their lives online.
By their mid-teens, they’re using computers, laptops, and smartphones at rates that will carry into adulthood. With that, they’re already experiencing some of the risks and issues that adults do, such as attempted account theft, improper use of data, and leaks of financial information.

These represent a few of the many insights and trends found in our complete report on connected families. Others include noteworthy differences across nations, such as which nations report the highest levels of cyberbullying and which nation has nearly 100% of its young children saying they use a smartphone regularly. Yet more findings reveal insights into screen time, video game usage, and a breakdown of the top online activities for teens—and many more ways families are growing up together through their lives online.

Click here for a full copy of the report.

Survey Methodology

In December 2021 McAfee LLC conducted a study about beliefs and behaviors around digital participation and online protection among members of connected families—as individuals and as a family unit.

Global survey of parents and children, with children answering alongside their parents.

Parents and children were surveyed together, with parents answering first and then bringing their children in to consent and answer.
These findings represent connected families not collections of individuals.

The post Life Behind the Screens of Parents, Tweens, and Teens: McAfee’s Connected Family Study appeared first on McAfee Blog.

PlainID Debuts Authorization-as-a-Service Platform

Platform powered by policy-based access control (PBAC).
  • May 11th 2022 at 21:18

Threat Actors Are Stealing Data Now to Decrypt When Quantum Computing Comes

By Jeffrey Schwartz, Contributing Writer
The technique, called store-now, decrypt later (SNDL), means organizations need to prepare now for post-quantum cryptography.

  • May 11th 2022 at 20:14

Ready, IAM, Fire: How Weak IAM Makes You a Target

Proper identity and access management configuration serves as an effective starting point for organizations looking to secure their cloud infrastructure.
  • May 11th 2022 at 20:05

Microsoft Simplifies Security Patching Process for Exchange Server

By Dark Reading Staff, Dark Reading
Delivering hotfixes and system updates separately will allow manual patching without requiring elevated permissions, Microsoft said.

  • May 11th 2022 at 18:50

Orca Security Unveils Context-Aware Shift Left Security to Identify and Prevent Cloud Application Security Issues Earlier

Enterprises can now ship more secure code to production by unifying security across software development, DevOps, and security teams.
  • May 11th 2022 at 18:29

NSA Warns Managed Service Providers Are Now Prime Targets for Cyberattacks

By Dark Reading Staff, Dark Reading
International cybersecurity authorities issue guidance to help information and communications service providers secure their networks.

  • May 11th 2022 at 17:28

Keeper Security Partners with SHI International for New Fully Managed IT Service (SHI Complete)

The partnership integrates Keeper's zero-knowledge, zero-trust enterprise password manager (EPM) into SHI Complete, a comprehensive, fully managed IT service for small and medium-sized businesses (SMBs).
  • May 11th 2022 at 17:27

Top 6 Security Threats Targeting Remote Workers

By Sakshi Udavant, Freelance Writer
Remote work is here to stay, which means security teams must ensure that security extends beyond corporate devices and protects employees wherever they are.

  • May 11th 2022 at 17:13

Concentric AI Raises Series A Funding Led by Ballistic Ventures to Autonomously Secure Business-Critical Data

Round of $14.5M to support team of AI experts and cybersecurity leaders targeting overshared data with AI-based solutions for data access governance and loss prevention.
  • May 11th 2022 at 17:06

Breaking Down the Strengthening American Cybersecurity Act

By Charles Horton, Chief Operating Officer, NetSPI
New federal cybersecurity rules will set timelines for critical infrastructure sector organizations — those in chemical, manufacturing, healthcare, defense contracting, energy, financial, nuclear, or transportation — to report ransomware payments and cyberattacks to CISA. All parties have to comply for it to work and help protect assets.

  • May 11th 2022 at 17:00

Quantum Ransomware Strikes Quickly, How to Prepare and Recover

NYC-area cybersecurity expert shares the anatomy of a Quantum Ransomware attack and how to prevent, detect and recover from a ransomware attack, in a new article from eMazzanti Technologies.
  • May 11th 2022 at 16:54

Material Security Reaches $1.1 Billion Valuation for ‘Zero Trust’ Security on Microsoft and Google Email

Founders Fund leads $100 million Series-C financing, gaining the email security startup unicorn status two years after its launch.
  • May 11th 2022 at 16:09

SpyCloud Report: Fortune 1000 Employees Pose Elevated Cyber Risk to Companies

Analysis finds 687 million exposed credentials and personally identifiable information (PII) among Fortune 1000 employees, and a 64% password reuse rate.
  • May 11th 2022 at 15:42

Cyber-Espionage Attack Drops Post-Exploit Malware Framework on Microsoft Exchange Servers

By Jai Vijayan, Contributing Writer, Dark Reading
IceApple's 18 separate modules include those for data exfiltration, credential harvesting, and file and directory deletion, CrowdStrike warns.

  • May 11th 2022 at 14:30

The Danger of Online Data Brokers

By Dr. Chris Pierson, Founder & CEO, BlackCloak
Enterprises should consider online data brokers as part of their risk exposure analysis if they don't already do so.

  • May 11th 2022 at 14:00

Vanity URLs Could Be Spoofed for Social Engineering Attacks

By Robert Lemos, Contributing Writer, Dark Reading
Attackers could abuse the vanity subdomains of popular cloud services such as Box.com, Google, and Zoom to mask attacks in phishing campaigns.

  • May 11th 2022 at 13:00

Novel Nerbian RAT Lurks Behind Faked COVID Safety Emails

By Dark Reading Staff, Dark Reading
Malicious emails with macro-enabled Word documents are spreading a never-before-seen remote-access Trojan, researchers say.

  • May 11th 2022 at 10:17

What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers

By Tara Seals, Managing Editor, News, Dark Reading
Microsoft's May 2022 Patch Tuesday contains several bugs in ubiquitous software that could affect millions of machines, researchers warn.

  • May 10th 2022 at 22:35

US Pledges to Help Ukraine Keep the Internet and Lights On

By Dark Reading Staff, Dark Reading
US State Department outlines coordinated government effort to provide Ukraine with cybersecurity intelligence, expertise, and resources amid invasion.

  • May 10th 2022 at 21:37

Lincoln College Set to Close After Crippling Cyberattack

By Dark Reading Staff, Dark Reading
COVID-19 and a December 2021 cyberattack combined to put the future of Abraham Lincoln's namesake college in peril.

  • May 10th 2022 at 17:48

Colonial Pipeline facing $1,000,000 fine for poor recovery plans

By Paul Ducklin
How good is your cybersecurity? Are you making the same mistakes as lots of other people? Here's some real-life advice...

Cybercriminals Are Increasingly Exploiting Vulnerabilities in Windows Print Spooler

Kaspersky researchers discovered that cybercriminals made approximately 65,000 attacks between July 2021 and April 2022.
  • May 10th 2022 at 16:21

Arctic Wolf Launches Arctic Wolf Labs Focused on Security Operations Research and Intelligence Reporting

New research-focused division focused on advancing innovation in the field of security operations.
  • May 10th 2022 at 15:41

5-Buck DCRat Malware Foretells a Worrying Cyber Future

By Robert Lemos, Contributing Writer, Dark Reading
The Dark Crystal remote access Trojan (aka DCRat) breaks a few stereotypes, with coding done by a solo developer, using an obscure Web language and offering it at a frighteningly low price.

  • May 10th 2022 at 15:37

Onapsis Announces New Offering to Jumpstart Security for SAP Customers

Company delivers new vulnerability management offering to help resource-constrained organizations combat increasing attacks on mission-critical SAP applications .
  • May 10th 2022 at 15:36
❌