FreshRSS

๐Ÿ”’
โŒ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

3 SASE Misconceptions to Consider

By Jay Barbour Masergy Director of Security Product Management
SASE is all the rage, promising things IT leaders have long dreamed about, but a purist approach may create consequences.

  • May 31st 2021 at 14:00

Chinese APT Groups Continue to Pound Away on Pulse Secure VPNs

By Jai Vijayan Contributing Writer
Security vendor says it has observed threat groups using a set of 16 tools specifically designed to attack Pulse Secure devices since April 2020.

  • May 28th 2021 at 21:00

Chart: Cloud Concerns

By Edge Editors Dark Reading
As more organizations make their way to the cloud, their eyes are wide open to the associated cybersecurity risks that tag along for the ride.

  • May 28th 2021 at 18:35

Modern SOCs a 'Painful' Challenge Amid Growing Complexity: Report

By Dark Reading Staff
A new study examines the tools and technologies driving investment and activities for security operations centers.

  • May 28th 2021 at 17:24

SolarWinds Attackers Impersonate USAID in Advanced Email Campaign

By Kelly Sheridan Staff Editor, Dark Reading
Microsoft shares the details of a wide-scale malicious email campaign attributed to Nobelium, the group linked to the SolarWinds supply chain attack.

  • May 28th 2021 at 16:03

A Wrench and a Screwdriver: Critical Infrastructure's Last, Best Lines of Defense?

By Samuel Greengard Freelance Writer
Critical infrastructure's cybersecurity problems are complex, deep-rooted, and daunting. Addressing them won't be easy...but it isn't impossible.

  • May 28th 2021 at 15:53

Siemens Patches Major PLC Flaw that Bypasses Its 'Sandbox' Protection

By Dark Reading Staff
Researchers from Claroty today detailed the memory vuln they discovered in Siemens SIMATIC S7-1200 and S7-1500 PLCs.

  • May 28th 2021 at 15:05

Plug-ins for Code Editors Pose Developer-Security Threat

By Robert Lemos Contributing Writer
There are two critical vulnerabilities in plug-ins for the popular Visual Studio Code editor, now patched, but security firm Snyk warns that popular plug-ins could put development environments in jeopardy.

  • May 28th 2021 at 14:20

Most Mobile Apps Can Be Compromised in 15 Minutes or Less

By Alan Bavosa VP, Security Products, at Appdome
In the name of releasing apps quickly and delivering a smooth user experience, mobile app security is often given short shrift.

  • May 28th 2021 at 14:00

'Have I Been Pwned' Code Base Now Open Source

By Dark Reading Staff
Founder Troy Hunt also announces the platform will receive compromised passwords the FBI finds in its investigations.

  • May 27th 2021 at 21:00

BazaLoader Attackers Create Fake Movie Streaming Site to Trick Victims

By Dark Reading Staff
The BazaLoader infection chain includes a live call center and "customer service" from criminals, researchers report.

  • May 27th 2021 at 20:11

Acronis: Pandemic Hastened Cloud Migration, Prompting New Security Issues

By Terry Sweeney Contributing Editor
SPONSORED: WATCH NOW -- The COVID-19 pandemic has accelerated an ongoing shift in data away from business data centers to home offices and the cloud, explains Candid Wuest, VP of cyber protection research for Acronis.

  • May 27th 2021 at 19:00

Let's Stop Blaming Employees for Our Data Breaches

By Chrysa Freeman Manager of Security Awareness, Code42
Assuming employees want to steal trade secrets pits them against your security teams, creates stress and reduces productivity.

  • May 27th 2021 at 17:00

DHS Orders Pipeline Operators to Report Cyberattacks, Review Security Posture

By Robert Lemos Contributing Writer
On the heels of the Colonial Pipeline attack, the US Department of Homeland Security aims to force a reticent industry to improve its ability to detect and respond to cybersecurity attacks.

  • May 27th 2021 at 16:50

How Menlo Uses Isolation to Secure Mobile Devices in the Cloud

By Terry Sweeney Contributing Editor
SPONSORED: WATCH NOW -- Mobile devices like smartphones and tablets have emerged as popular targets for bad actors looking to break into to cloud-based networks, according to Poornima DeBolle, chief product officer for Menlo Security.

  • May 27th 2021 at 16:00

Prevention Is the Only Cure: The Dangers of Legacy Systems

By Dirk Schrader Global VP of Product Marketing and Business Development, NNT
Prolonged exposure to poorly managed legacy IT devices proves time and time again the familiar adage: What can go wrong will go wrong.

  • May 27th 2021 at 14:00

ExtraHop Explains How Advanced Threats Dominate Threat Landscape

By Terry Sweeney Contributing Editor
SPONSORED: WATCH NOW -- How do SOC professionals build a strategy when they lack basic information about how such threats operate? Advanced threats by their very nature create plenty of uncertainty, according to Matt Cauthorn, VP of cloud security for ExtraHop.

  • May 27th 2021 at 12:00

Enterprises Applying OS Patches Faster as Endpoint Risks Grow

By Jai Vijayan Contributing Writer
New study shows sharp increase in number of endpoint devices with sensitive data on them.

  • May 26th 2021 at 22:05

Google Discovers New Rowhammer Attack Technique

By Dark Reading Staff
Researchers publish the details of a new Rowhammer vulnerability called "Half-Double" that exploits increasingly smaller DRAM chips.

  • May 26th 2021 at 20:32

Zscaler Buys Deception Technology Startup

By Dark Reading Staff
ZScaler's CEO says Smokescreen Technologies' capabilities will be integrated with Zscaler's ZIA and ZPA products.

  • May 26th 2021 at 20:18

Cisco: Reduced Complexity in the SOC Improves Enterprise Security

By Terry Sweeney Contributing Editor
SPONSORED: WATCH NOW -- All it took was a global pandemic and a shift to working from home to expose security operations centers' open secret: Too much software, systems, and data to filter. Dug Song, chief strategy officer of Cisco Secure, makes a strong case for why reducing that complexity is the only tenable way forward for security professionals.

  • May 26th 2021 at 19:00

Bug Bounties and the Cobra Effect

By Oleg Brodt R&D Director of Deutsche Telekom Innovation Labs, Israel, and Chief Innovation Officer for Cyber@Ben-Gurion University
Are bug bounty programs allowing software companies to skirt their responsibility to make better, more secure products from the get-go?

  • May 26th 2021 at 17:00

How Are Cyber Insurance Companies Assessing Ransomware Risk?

By Richard Pallardy Contributing Writer
From limiting claims payments to tying payments to policyholders' actions, the cyber insurance industry is in "a very dynamic place right now," says Corvus Insurance CEO Phil Edmundson.

  • May 26th 2021 at 16:15

Devo: SIEM Continues to Evolve with Tech Trends and Emerging Threats

By Terry Sweeney Contributing Editor
SPONSORED: WATCH NOW -- Some organizations split the difference with a hybrid of premises- and cloud-based SIEM, says Ted Julian, senior VP of product at Devo. As security data volumes continue to increase, SIEM's evolution will only continue.

  • May 26th 2021 at 16:00

Messaging Apps: The Latest Hotbed in the Fraud Ecosystem

By Brittany Allen Trust & Safety Architect, Sift
Telegram and other secure messaging apps have become a haven for professional criminals to wreak havoc and turn a profit.

  • May 26th 2021 at 14:00

New Iranian Threat Actor Using Ransomware, Wipers in Destructive Attacks

By Jai Vijayan Contributing Writer
The Agrius group's focus appears to be Israel and the Middle East.

  • May 26th 2021 at 13:00

Orange: Your Leaky Security is Coming from Inside the House!

By Terry Sweeney Contributing Editor
SPONSORED: Your home WiFi router may be screaming fast, but it's also a major point of vulnerability in this work-from-home era, says Charl van der Walt, head of security research at Orange Cyberdefense. And while Zero Trust offers some relief, he offers up some how-to advice to ensure it's properly deployed.

  • May 26th 2021 at 12:00

Cloud Compromise Costs Organizations $6.2M Per Year

By Kelly Sheridan Staff Editor, Dark Reading
Organizations reported an average of 19 cloud-based compromises in the past year, but most don't evaluate the security of SaaS apps before deployment.

  • May 25th 2021 at 21:54

Rise in Opportunistic Hacks and Info-Sharing Imperil Industrial Networks

By Kelly Jackson Higgins Executive Editor at Dark Reading
Security researchers at Mandiant have seen an increasing wave of relatively simplistic attacks involving ICS systems - and attackers sharing their finds with one another - since 2020.

  • May 25th 2021 at 21:35

Russia Profiting from Massive Hydra Cybercrime Marketplace

By Robert Lemos Contributing Writer
An analysis of Bitcoin transactions from the Hydra marketplace show that the operators are locking sellers into Russian exchanges, likely fueling profits for local actors.

  • May 25th 2021 at 21:35

MacOS Zero-Day Let Attackers Bypass Privacy Preferences

By Dark Reading Staff
Apple has released security patches for vulnerabilities in macOS and tvOS that reports indicate have been exploited in the wild.

  • May 25th 2021 at 19:47

Axis Fosters Work-From-Home Momentum with Zero Trust Network Access

By Terry Sweeney Contributing Editor
SPONSORED: Watch now -- VPN and VDI, while still useful, lack the hardened security required to keep users secure. That's created an opening for Zero Trust network access.

  • May 25th 2021 at 19:00

Russian Sentenced to 30 Months for Running Criminal Website

By Dark Reading Staff
FBI says sales from illicit online shop deer.io exceeded $17 million

  • May 25th 2021 at 18:32

Your Network's Smallest Cracks Are Now Its Biggest Threats

By Sean Keef Technical Director at Skybox Security
Bad actors have flipped the script by concentrating more on low-risk threats. Here's how to address the threat and the tactics.

  • May 25th 2021 at 17:00

Uptycs Offers Resilience Formula to Boost Business Continuity

By Terry Sweeney Contributing Editor
SPONSORED CONTENT: Breaches and data loss are inevitable, but customers can bounce back more readily with some planning and foresight, says Ganesh Pai, CEO and founder of Uptycs. He suggests a trajectory for customers looking to improve their own resilience, starting with proactiveness, followed by reactivity, then predictive capabilities and better protection.

  • May 25th 2021 at 16:00

The Makings of a Better Cybersecurity Hire

By Bjorn R. Watne CISO, Storebrand Group
Experience counts, but as one CISO has learned, don't overlook a creative, motivated candidate just because their background doesn't match the job description.

  • May 25th 2021 at 15:55

The Adversary Within: Preventing Disaster From Insider Threats

By Kevin Dunne President, Pathlock
Insiders are in a position of trust, and their elevated permissions provide opportunities to cause serious harm to critical business applications and processes.

  • May 25th 2021 at 14:00

Businesses Boost Security Budgets. Where Will the Money Go?

By Kelly Sheridan Staff Editor, Dark Reading
Most organizations plan to spend more on security, leaders say in a report that explores their toughest challenges, post-breach costs, and spending priorities.

  • May 25th 2021 at 12:05

Turn the Tables: Supply Chain Defense Needs Some Offense, Fortinet Says

By Terry Sweeney Contributing Editor
SPONSORED CONTENT: Watch now -- While the SolarWinds hack put fresh attention on supply chain vulnerabilities, Derek Manky of Fortinet's Fortiguard Labs suggests dismantling cybercriminals' own supply chains.

  • May 25th 2021 at 12:00
  • May 24th 2021 at 20:45

Cartoon Caption Winner: Magic May

By John Klossner Cartoonist
And the winner of The Edge's May cartoon caption contest is ...

  • May 24th 2021 at 19:10

Former FBI Employee Indicted for Taking Documents Home

By Dark Reading Staff
The long-time intelligence analyst was accused of inappropriately handling documents related to national security.

  • May 24th 2021 at 19:00

Air India Confirms Data of 4.5M Travelers Compromised

By Dark Reading Staff
Affected data includes names, birthdates, contact information, passport details, and credit card data, the airline reports.

  • May 24th 2021 at 18:51

Sophos Research Uncovers Widespread Use of TLS By Cybercriminals

By Terry Sweeney Contributing Editor
SPONSORED CONTENT: Nearly half of all malware is being disseminated via the Transport Layer Security cryptographic protocol, says Dan Schiappa, executive VP and chief product officer for Sophos.

  • May 24th 2021 at 16:30

Work from Home Modifies the Endpoint Security Equation, Cisco Says

By Terry Sweeney Contributing Editor
SPONSORED CONTENT: As customers get to grips with this new WFH reality, they'll need to simplify their implementations and make more use of automation, says Cisco Secure's Al Huger.

  • May 24th 2021 at 14:15

As Threat Hunting Matures, Malware Labs Emerge

By Tomislav Pericin Chief Software Architect & Co-Founder, ReversingLabs
By leveraging their analysis outputs, security pros can update detection rules engines and establish a stronger security posture in the process.

  • May 24th 2021 at 14:00

Cyber Insurance Firms Start Tapping Out as Ransomware Continues to Rise

By Robert Lemos Contributing Writer
A global insurance carrier refuses to write new ransomware policies in France, while insurers rewrite policies. Are we heading toward a day when ransomware incidents become uninsurable?

  • May 24th 2021 at 13:30

Data in Danger Amid New IT Challenges

By Dark Reading Staff
Survey finds new threats due to the pandemic make managing enterprise cyber-risk even more challenging.

  • May 21st 2021 at 20:33

FBI Issues Conti Ransomware Alert as Attacks Target Healthcare

By Dark Reading Staff
Officials have identified at least 16 Conti ransomware attacks targeting US healthcare and first responder networks.

  • May 21st 2021 at 19:58

Cloud Security Blind Spots: Where They Are and How to Protect Them

By Kelly Sheridan Staff Editor, Dark Reading
Security experts discuss oft-neglected areas of cloud security and offer guidance to businesses working to strengthen their security posture.

  • May 21st 2021 at 19:00

The Changing Face of Cybersecurity Awareness

By Lise Lapointe CEO and Founder, Terranova Security
In the two decades since cybersecurity awareness programs emerged, they've been transformed from a good idea to a business imperative.

  • May 21st 2021 at 14:00

The Edge Poll: Moving On

By Edge Editors Dark Reading
During the stresses of the pandemic, did you ever consider quitting security?

  • May 21st 2021 at 14:00

Dev-Sec Disconnect Undermines Secure Coding Efforts

By Robert Lemos Contributing Writer
Rather than continue to complain about each other, developers and security pros need to work together and celebrate their successes.

  • May 20th 2021 at 21:55

Lack of Skills, Maturity Hamper Threat Hunting at Many Organizations

By Jai Vijayan Contributing Writer
When implemented correctly, threat hunting can help organizations stay head of threats, researcher says at RSA Conference.

  • May 20th 2021 at 21:10

Don't Let Scary Headlines Shape Your Company's Cyber-Resilience Strategy

By Joan Goodchild Staff Editor
Resilience planning should be based on data and backed by technology, cybersecurity pros agreed at this week's RSA Conference.

  • May 20th 2021 at 21:10

Maricopa County CISO: Online Misinformation/Disinformation in 2020 Election a 'Gamechanger'

By Kelly Jackson Higgins Executive Editor at Dark Reading
Custom playbooks played a key role in the Arizona election jurisdiction's security strategy.

  • May 20th 2021 at 20:58

100M Users' Data Exposed via Third-Party Cloud Misconfigurations

By Dark Reading Staff
Researchers who examined 23 Android apps report developers potentially exposed the data of more than 100 million people.

  • May 20th 2021 at 19:47

Security Providers Describe New Solutions (& Growing Threats) at RSAC

By Terry Sweeney Contributing Editor
SPONSORED CONTENT: Watch now -- Leading security companies meet Dark Reading in the RSA Conference Broadcast Alley to talk about tackling insider threat, SOC complexity, cyber resilience, mobile security, attacker evasion, supply chain threats, ransomware, and more.

  • May 20th 2021 at 19:30

Cost Savings, Better Security Drive Adoption of Emerging Technologies

By Steve Zurier Contributing Writer
However, senior technology managers express concerns about whether their current infrastructure can properly safeguard them.

  • May 20th 2021 at 19:00

3 Ways Anti-Vaxxers Will Undercut Security With Misinformation

By Marc Rogers & Sara-Jayne Terp Executive Director of Cybersecurity, Okta / Founder at Bodacea Light Industries LLC
Misinformation campaigns thrive on inequality of knowledge, which bad actors use to drive a wedge between communities.

  • May 20th 2021 at 17:00
โŒ