FreshRSS

๐Ÿ”’
โŒ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Phishing in Troubled Waters: 3 Ways Email Attacks May Impact Elections

By Darktrace Experts Staff
The state of email defenses has a role to play in the US presidential election.

  • October 13th 2020 at 19:30

Treasury Dept. Advisory Shines Spotlight on Ransomware Negotiators

By Jai Vijayan Contributing Writer
With attacks showing no signs of abating, some companies have begun offering services to help reduce ransom demands, buy more time, and arrange payments.

  • October 13th 2020 at 18:45

25% of BEC Cybercriminals Based in the US

By Kelly Sheridan Staff Editor, Dark Reading
While the US is known to be a prime target for BEC attacks, just how many perpetrators are based there came as a surprise to researchers.

  • October 13th 2020 at 18:10

Where are the 'Great Exits' in the Data Security Market?

By Dave Cole Cofounder and CEO, Open Raven
If data security were a student, its report card would read "Not performing to potential." Here's why.

  • October 13th 2020 at 18:00

Trickbot Botnet Response Highlights Partnerships Preventing US Election Interference

By Tanner Johnson Senior Analyst, Connectivity & IoT, OMDIA
Recent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption.

  • October 13th 2020 at 16:00

Security Officers, Are Your Employees Practicing Good Habits from Home?

By Chip Witt Vice President of Product Management at SpyCloud
Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.

  • October 12th 2020 at 14:00

Online Voting Is Coming, but How Secure Will It Be?

By Brad Brooks CEO of OneLogin
It's time for state governments to act as leaders, adopt digital ID standards, enable new online voting systems, and provide broad-based access to all communities for the benefit of all.

  • October 13th 2020 at 14:00

Software AG Continues Efforts Against $20M Ransomware Attack

By Dark Reading Staff
The attack, which now includes extortion components, has moved into its second week.

  • October 12th 2020 at 21:10

Security Firms & Financial Group Team Up to Take Down Trickbot

By Robert Lemos Contributing Writer
Microsoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation's C2 infrastructure.

  • October 12th 2020 at 19:20

What Is End-to-End Encryption?

By Hudson Bloom, Senior Consultant, Application Security, Optiv: End-to-end encryption is a style of encrypted connection in which...
Many services advertise E2EE, but not all of them actually offer it.

  • October 12th 2020 at 18:30

Security Officers, Are Your Employers Practicing Good Habits from Home?

By Chip Witt Vice President of Product Management at SpyCloud
Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.

  • October 12th 2020 at 14:00

A 7-Step Cybersecurity Plan for Healthcare Organizations

By Steve Zurier Contributing Writer
With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations.

  • October 12th 2020 at 14:00

How to Pinpoint Rogue IoT Devices on Your Network

By Kelly Sheridan Staff Editor, Dark Reading
Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.

  • October 12th 2020 at 13:10
  • October 12th 2020 at 10:00

Latest Version of MalLocker Android Ransomware Packs New Tricks

By Jai Vijayan Contributing Writer
Like most such mobile malware, the new one doesn't encrypt data but attempts to make an infected system impossible to use, Microsoft says.

  • October 9th 2020 at 20:20

Apple Pays Bug Bounty to Enterprise Network Researchers

By Dark Reading Staff
So far, the company has doled out $288,000 to five researchers who, in three months, found 55 vulnerabilities in its corporate infrastructure.

  • October 9th 2020 at 20:10

Critical Zerologon Flaw Exploited in TA505 Attacks

By Dark Reading Staff
Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.

  • October 9th 2020 at 18:15

CISOs Planning on Bigger Budgets: Report

By Dark Reading Staff
Budgets are on the rise, even in a time of revenue worries across the industry.

  • October 9th 2020 at 17:20

Why MSPs Are Hacker Targets, and What To Do About It

By John Hammond Senior Security Researcher at Huntress
Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.

  • October 9th 2020 at 14:00

Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

By Samuel Greengard Freelance Writer
In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.

  • October 9th 2020 at 11:30

Cyberattacks Up, But Companies (Mostly) Succeed in Securing Remote Workforce

By Robert Lemos Contributing Writer
Despite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.

  • October 8th 2020 at 21:50

Scale Up Threat Hunting to Skill Up Analysts

By Chris Hoff Product Marketing Manager, ReversingLabs
Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why.

  • October 8th 2020 at 18:00

US Seizes Domain Names Used in Iranian Disinformation Campaign

By Dark Reading Staff
The US has seized 92 domain names used by Iran's Islamic Revolutionary Guard Corps to spread a worldwide disinformation campaign.

  • October 8th 2020 at 17:55

US Election-Related Websites Vulnerable to Fraud, Abuse

By Steve Zurier Contributing Writer
New research finds the vast majority of reputable news, political, and donor-oriented sites don't use registry locks.

  • October 8th 2020 at 16:00

Kaspersky Researchers Spot Russia-on-Russia Cyber-Espionage Campaign

By Kelly Jackson Higgins Executive Editor at Dark Reading
Steganography-borne malware used to spy on industrial targets in Russia.

  • October 8th 2020 at 15:55

Key Considerations & Best Practices for Establishing a Secure Remote Workforce

By Kurt John Chief Cybersecurity Officer, Siemens USA
Cybersecurity is challenging but not paralyzing, and now is the moment to educate our employees to overcome these challenges.

  • October 8th 2020 at 14:00

'Bahamut' Threat Group Targets Government & Industry in Middle East

By Kelly Sheridan Staff Editor, Dark Reading
Researchers say the cyber espionage group was involved in several attacks against government officials and businesses in the Middle East and South Asia.

  • October 7th 2020 at 22:00

New 'HEH' Botnet Targets Exposed Telnet Services

By Jai Vijayan Contributing Writer
Latest threat is one in a growing list of malware developed in the Go programming language.

  • October 7th 2020 at 21:30

Open Source Threat Intelligence Searches for Sustainable Communities

By Robert Lemos Contributing Writer
As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...

  • October 7th 2020 at 21:00

Rare Firmware Rootkit Discovered Targeting Diplomats, NGOs

By Kelly Jackson Higgins Executive Editor at Dark Reading
Second-ever sighting of a firmware exploit in the wild is a grim reminder of the dangers of these mostly invisible attacks.

  • October 7th 2020 at 20:45

3 Ways Companies are Working on Security by Design

By Ericka Chickowski Contributing Writer
Execs from top financial organizations and other companies share insights on building a security culture.

  • October 7th 2020 at 20:30

Cyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare Threats

By Robert Lemos Contributing Writer
Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.

  • October 7th 2020 at 20:05

CISA Warns of Renewed Emotet Activity

By Dark Reading Staff
The Emotet malware dropper is seeing an upsurge in new activity in the second half of 2020.

  • October 7th 2020 at 18:30

The New War Room: Cybersecurity in the Modern Era

By Satya Gupta Executive Co-Founder & CTO, Virsec
The introduction of the virtual war room is a new but necessary shift. To ensure its success, security teams must implement new systems and a new approach to cybersecurity.

  • October 7th 2020 at 18:00

What the Sci-Fi Hit Altered Carbon Teaches Us About Virtualization Security

By Corey Nachreiner Chief Technology Officer, WatchGuard Technologies
The Netflix show may be fantastical, but it has real-world lessons about virtualization.

  • October 7th 2020 at 14:00
โŒ