FreshRSS

๐Ÿ”’
โŒ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:
  • May 24th 2021 at 20:45

Cartoon Caption Winner: Magic May

By John Klossner Cartoonist
And the winner of The Edge's May cartoon caption contest is ...

  • May 24th 2021 at 19:10

Former FBI Employee Indicted for Taking Documents Home

By Dark Reading Staff
The long-time intelligence analyst was accused of inappropriately handling documents related to national security.

  • May 24th 2021 at 19:00

Air India Confirms Data of 4.5M Travelers Compromised

By Dark Reading Staff
Affected data includes names, birthdates, contact information, passport details, and credit card data, the airline reports.

  • May 24th 2021 at 18:51

Sophos Research Uncovers Widespread Use of TLS By Cybercriminals

By Terry Sweeney Contributing Editor
SPONSORED CONTENT: Nearly half of all malware is being disseminated via the Transport Layer Security cryptographic protocol, says Dan Schiappa, executive VP and chief product officer for Sophos.

  • May 24th 2021 at 16:30

Work from Home Modifies the Endpoint Security Equation, Cisco Says

By Terry Sweeney Contributing Editor
SPONSORED CONTENT: As customers get to grips with this new WFH reality, they'll need to simplify their implementations and make more use of automation, says Cisco Secure's Al Huger.

  • May 24th 2021 at 14:15

As Threat Hunting Matures, Malware Labs Emerge

By Tomislav Pericin Chief Software Architect & Co-Founder, ReversingLabs
By leveraging their analysis outputs, security pros can update detection rules engines and establish a stronger security posture in the process.

  • May 24th 2021 at 14:00

Cyber Insurance Firms Start Tapping Out as Ransomware Continues to Rise

By Robert Lemos Contributing Writer
A global insurance carrier refuses to write new ransomware policies in France, while insurers rewrite policies. Are we heading toward a day when ransomware incidents become uninsurable?

  • May 24th 2021 at 13:30

Data in Danger Amid New IT Challenges

By Dark Reading Staff
Survey finds new threats due to the pandemic make managing enterprise cyber-risk even more challenging.

  • May 21st 2021 at 20:33

FBI Issues Conti Ransomware Alert as Attacks Target Healthcare

By Dark Reading Staff
Officials have identified at least 16 Conti ransomware attacks targeting US healthcare and first responder networks.

  • May 21st 2021 at 19:58

Cloud Security Blind Spots: Where They Are and How to Protect Them

By Kelly Sheridan Staff Editor, Dark Reading
Security experts discuss oft-neglected areas of cloud security and offer guidance to businesses working to strengthen their security posture.

  • May 21st 2021 at 19:00

The Changing Face of Cybersecurity Awareness

By Lise Lapointe CEO and Founder, Terranova Security
In the two decades since cybersecurity awareness programs emerged, they've been transformed from a good idea to a business imperative.

  • May 21st 2021 at 14:00

The Edge Poll: Moving On

By Edge Editors Dark Reading
During the stresses of the pandemic, did you ever consider quitting security?

  • May 21st 2021 at 14:00

Dev-Sec Disconnect Undermines Secure Coding Efforts

By Robert Lemos Contributing Writer
Rather than continue to complain about each other, developers and security pros need to work together and celebrate their successes.

  • May 20th 2021 at 21:55

Lack of Skills, Maturity Hamper Threat Hunting at Many Organizations

By Jai Vijayan Contributing Writer
When implemented correctly, threat hunting can help organizations stay head of threats, researcher says at RSA Conference.

  • May 20th 2021 at 21:10

Don't Let Scary Headlines Shape Your Company's Cyber-Resilience Strategy

By Joan Goodchild Staff Editor
Resilience planning should be based on data and backed by technology, cybersecurity pros agreed at this week's RSA Conference.

  • May 20th 2021 at 21:10

Maricopa County CISO: Online Misinformation/Disinformation in 2020 Election a 'Gamechanger'

By Kelly Jackson Higgins Executive Editor at Dark Reading
Custom playbooks played a key role in the Arizona election jurisdiction's security strategy.

  • May 20th 2021 at 20:58

100M Users' Data Exposed via Third-Party Cloud Misconfigurations

By Dark Reading Staff
Researchers who examined 23 Android apps report developers potentially exposed the data of more than 100 million people.

  • May 20th 2021 at 19:47

Security Providers Describe New Solutions (& Growing Threats) at RSAC

By Terry Sweeney Contributing Editor
SPONSORED CONTENT: Watch now -- Leading security companies meet Dark Reading in the RSA Conference Broadcast Alley to talk about tackling insider threat, SOC complexity, cyber resilience, mobile security, attacker evasion, supply chain threats, ransomware, and more.

  • May 20th 2021 at 19:30

Cost Savings, Better Security Drive Adoption of Emerging Technologies

By Steve Zurier Contributing Writer
However, senior technology managers express concerns about whether their current infrastructure can properly safeguard them.

  • May 20th 2021 at 19:00

3 Ways Anti-Vaxxers Will Undercut Security With Misinformation

By Marc Rogers & Sara-Jayne Terp Executive Director of Cybersecurity, Okta / Founder at Bodacea Light Industries LLC
Misinformation campaigns thrive on inequality of knowledge, which bad actors use to drive a wedge between communities.

  • May 20th 2021 at 17:00

How 2 New Executive Orders May Reshape Cybersecurity & Supply Chains for a Post-Pandemic World

By Andrea Little Limbago Vice President of Research and Analysis, Interos
A modernized US technology strategy must account for the growing ideological divide between authoritarians and democracies over the use of cyber and emerging technologies.

  • May 20th 2021 at 14:00

Cobalt Strike Becomes a Preferred Hacking Tool by Cybercrime, APT Groups

By Kelly Jackson Higgins Executive Editor at Dark Reading
Incident response cases and research show how the red-team tool has become a become a go-to for attackers.

  • May 19th 2021 at 21:35

SolarWinds CEO: Attack Began Much Earlier Than Previously Thought

By Jai Vijayan Contributing Writer
Investigation shows threat actors began probing SolarWinds' network in January 2019, according to Sudhakar Ramakrishna.

  • May 19th 2021 at 21:25

Google Chrome Makes It Easier to Update Compromised Passwords

By Dark Reading Staff
A new capability will use Google's Duplex technology to alert people when their passwords are compromised and help change them.

  • May 19th 2021 at 20:55

Attackers Took 5 Minutes to Start Scanning for Exchange Server Flaws

By Kelly Sheridan Staff Editor, Dark Reading
Research underscores the acceleration of attack activity and points to a growing concern that defenders can't keep pace.

  • May 19th 2021 at 20:19

Automation & Pervasive, Connected Technology to Pose Cyber Threats in 2030

By Robert Lemos Contributing Writer
A project to look at potential cybersecurity threats in a decade sees hackers and marketers sending spam directly to our vision, while attackers' automated systems adapt faster than defenses.

  • May 19th 2021 at 19:25

Colonial Pipeline CEO Confirms Ransom Payment

By Dark Reading Staff
CEO Joseph Blount says the $4.4 million payment was a necessary decision amid high-stakes infrastructure disruption.

  • May 19th 2021 at 17:43

How to Adapt to Rising Consumer Expectations of Invisible Security

By Chris Ryan Senior Fraud Solutions Consultant at Experian
Working from home has changed users' ideas about seamless security. Here's how to address them.

  • May 19th 2021 at 17:00

Credential Stuffing Reaches 193 Billion Login Attempts Annually

By Robert Lemos Contributing Writer
More attacks does not necessarily mean more threats, but all attacks types have increased, according to Akamai's new "State of the Internet" report.

  • May 19th 2021 at 14:45

How Ransomware Encourages Opportunists to Become Criminals

By Charles Herring CTO and Co-Founder, WitFoo
And what's needed to stop it: Better information sharing among private organizations and with law enforcement agencies.

  • May 19th 2021 at 14:00

How Attackers Weigh the Pros and Cons of BEC Techniques

By Kelly Sheridan Staff Editor, Dark Reading
Security researchers discuss attackers' evolving methodologies in business email compromise and phishing campaigns.

  • May 18th 2021 at 21:10

How to Get Employees to Care About Security

By Joan Goodchild Staff Editor
Want to a security awareness program that sticks? Make it fun and personal -- and offer free lunch.

  • May 18th 2021 at 21:10

Splunk to Acquire TruSTAR for Data Management

By Dark Reading Staff
Splunk said it will integrate TruSTAR's data-sharing capabilities into its Data-to-Everything platform following the acquisition.

  • May 18th 2021 at 17:31

FBI's IC3 Logs 1M Complaints in 14 Months

By Dark Reading Staff
The FBI's IC3 reports COVID-related scams and an increase in online retail may be behind the upswing in complaints.

  • May 18th 2021 at 17:26

Why Anti-Phishing Training Isn't Enough

By Aviv Grafi CEO & Founder, Votiro
Not only is relying on employees' awareness insufficient to prevent sophisticated social engineering attacks, some training methods can create other problems.

  • May 18th 2021 at 17:00

Best 11 Quotes From Cryptographers' Panel

By Sara Peters Senior Editor at Dark Reading
Cryptographers at an RSA Conference panel aren't worried about adversarial quantum cryptography. Machine learning, though, causes pressing practical issues.

  • May 18th 2021 at 16:30

Researchers Create Covert Channel Over Apple AirTag Network

By Robert Lemos Contributing Writer
Small amounts of data could be sent from nearly anywhere using Apple's "Find My" network, hidden in the large volume of traffic as AirTags become widely used, two researchers say.

  • May 18th 2021 at 14:40

How to Mitigate Against Domain Credential Theft

By Zur Ulianitzky & Yaron Shani Head of Security Research , XM Cyber / Senior Cybersecurity Researcher, XM Cyber
Attackers routinely reuse stolen domain credentials. Here are some ways to thwart their access.

  • May 18th 2021 at 14:00

Cisco Plans to Create 'Premium' SecureX Offering With Kenna Security Features

By Kelly Jackson Higgins Executive Editor at Dark Reading
Executives from Cisco share insights on the networking giant's ambitious security strategy.

  • May 18th 2021 at 13:50

DarkSide Ransomware Variant Targets Disk Partitions

By Dark Reading Staff
A newly discovered DarkSide ransomware variant can detect and compromise partitioned hard drives, researchers report.

  • May 17th 2021 at 21:57

47% of Criminals Buying Exploits Target Microsoft Products

By Kelly Sheridan Staff Editor, Dark Reading
Researchers examine English- and Russian-language underground exploits to track how exploits are advertised and sold.

  • May 17th 2021 at 21:27

DDoS Attacks Up 31% in Q1 2021: Report

By Dark Reading Staff
If pace continues, DDoS attack activity could surpass last year's 10-million attack threshold.

  • May 17th 2021 at 21:15

Rapid7 Is the Latest Victim of a Software Supply Chain Breach

By Jai Vijayan Contributing Writer
Security vendor says attackers accessed some of its source code using a previously compromised Bash Uploader script from Codecov.

  • May 17th 2021 at 20:10

RSAC 2021: What Will SolarWinds' CEO Reveal?

By Joan Goodchild Staff Editor
In a keynote conversation with Forrester analyst Laura Koetzle, Sudhakar Ramakrishna will get candid about the historic breach.

  • May 17th 2021 at 18:45

Latest Security News From RSAC 2021

By Dark Reading Staff
Check out Dark Reading's updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2021.

  • May 17th 2021 at 16:00

Agility Broke AppSec. Now It's Going to Fix It.

By Chen Gour-Arie Chief Architect, Enso Security
Outnumbered 100 to 1 by developers, AppSec needs a new model of agility to catch up and protect everything that needs to be secured.

  • May 17th 2021 at 14:00

Name That Toon: Road Trip

By John Klossner Cartoonist
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

  • May 17th 2021 at 13:30

Rapid7 Source Code Accessed in Supply Chain Attack

By Dark Reading Staff
An investigation of the Codecov attack revealed intruders accessed Rapid7 source code repositories containing internal credentials and alert-related data.

  • May 14th 2021 at 20:02

How Faster COVID-19 Research Is Being Made Possible by Secure Silicon

By Sara Peters Senior Editor at Dark Reading
When Intel and Leidos set up a "trusted execution environment" to enable a widespread group of researchers to securely share and confidentially compute real-world data, it was no small achievement.

  • May 14th 2021 at 17:30

Cisco Confirms Plans to Acquire Kenna Security

By Dark Reading Staff
Cisco plans to integrate Kenna's vulnerability management technology into its SecureX platform.

  • May 14th 2021 at 16:39

Chart: Cybersecurity Now a Top Corporate Priority

By Edge Editors Dark Reading
Majority of global IT decision makers say cybersecurity is extremely or more important now than it was pre-pandemic, according to Cisco.

  • May 14th 2021 at 15:30

SOC Teams Burdened by Alert Fatigue Explore XDR

By Joan Goodchild Staff Editor
ESG research finds a complex attack surface and threat landscape make alerts too overwhelming to monitor accurately

  • May 14th 2021 at 15:20

Wi-Fi Design, Implementation Flaws Allow a Range of Frag Attacks

By Robert Lemos Contributing Writer
Every Wi-Fi product is affected by at least one fragmentation and aggregation vulnerability, which could lead to a machine-in-the-middle attack, researcher says.

  • May 14th 2021 at 14:50

Security Trends to Follow at RSA Conference 2021

By Yonit Wiseman Associate at YL Ventures
Here are three key categories of sessions that provide an inside look at some of today's most interesting cybersecurity trends.

  • May 14th 2021 at 14:00

Software, Incident Response Among Big Focus Areas in Biden's Cybersecurity Executive Order

By Jai Vijayan Contributing Writer
Overall objectives are good, but EO may be too prescriptive in parts, industry experts say.

  • May 13th 2021 at 22:30

85% of Data Breaches Involve Human Interaction: Verizon DBIR

By Kelly Sheridan Staff Editor, Dark Reading
Ransomware, phishing, and Web application attacks all increased during a year in which the majority of attacks involved a human element.

  • May 13th 2021 at 21:25

Firms Struggle to Secure Multicloud Misconfigurations

By Robert Lemos Contributing Writer
Half of companies had at least one case of having all ports open to the public, while more than a third had an exposed database.

  • May 13th 2021 at 19:55

Dragos & IronNet Partner on Critical Infrastructure Security

By Dark Reading Staff
The IT and OT security providers will integrate solutions aimed at improving critical infrastructure security

  • May 13th 2021 at 19:31

When AI Becomes the Hacker

By Kelly Jackson Higgins Executive Editor at Dark Reading
Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society.

  • May 13th 2021 at 18:45
โŒ