FreshRSS

๐Ÿ”’
โŒ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Survey Seeks to Learn How 2020 Changed Security

By Dark Reading Staff
Respondents to a new Dark Reading/Omdia survey will be entered into a drawing for a Black Hat Black Card.

  • June 23rd 2021 at 19:27

When Will Cybersecurity Operations Adopt the Peter Parker Principle?

By Robert Boudreaux Field CTO, Deep Instinct
Having a prevention mindset means setting our prevention capabilities to "prevent" instead of relying on detection and response.

  • June 23rd 2021 at 17:00

Expecting the Unexpected: Tips for Effectively Mitigating Ransomware Attacks in 2021

By Luke Tenery & Ross Rustici Partner, StoneTurn / Managing Director, StoneTurn
Cybercriminals continually innovate to thwart security protocols, but organizations can take steps to prevent and mitigate ransomware attacks.

  • June 23rd 2021 at 14:00

Despite Heightened Cyber-Risks, Few Security Leaders Report to CEO

By Jai Vijayan Contributing Writer
A new report suggests that top management at most companies still don't get security.

  • June 22nd 2021 at 22:25

Transmit Security Announces $543M Series A Funding Round

By Dark Reading Staff
The passwordless technology provider says the funding will be used to increase its reach and expand primary business functions.

  • June 22nd 2021 at 18:41

Chart: Strength in Numbers

By Edge Editors Dark Reading
More companies are heeding expert advice to beef up their incident-response teams.

  • June 22nd 2021 at 18:00

NSA Funds Development & Release of D3FEND Framework

By Dark Reading Staff
The framework, now available through MITRE, provides countermeasures to attacks.

  • June 22nd 2021 at 17:26

Identity Eclipses Malware Detection at RSAC Startup Competition

By Paul Shomo Cybersecurity Analyst
All 10 finalists in the Innovation Sandbox were focused on identity, rather than security's mainstay for the last 20 years: Malware detection.

  • June 22nd 2021 at 17:00

7 Powerful Cybersecurity Skills the Energy Sector Needs Most

By Pam Baker Contributing Writer
Those looking to join the fight might want to polish up or acquire some (or all) of these hottest skills on the market.

  • June 22nd 2021 at 14:50

Does Your Cyberattack Plan Include a Crisis Communications Strategy? 5 Tips to Get Started

By Ted Birkhahn President, HPL Cyber
Don't overlook crisis communications in your cybersecurity incident response planning.

  • June 22nd 2021 at 14:00

Did Companies Fail to Disclose Being Affected by SolarWinds Breach?

By Jai Vijayan Contributing Writer
The SEC has sent out letters to some investment firms and publicly listed companies seeking information, Reuters says.

  • June 21st 2021 at 22:35

Software-Container Supply Chain Sees Spike in Attacks

By Robert Lemos Contributing Writer
Attackers target companies' container supply chain, driving a sixfold increase in a year, aiming to steal processing time for cryptomining and compromise cloud infrastructure.

  • June 21st 2021 at 21:55

Data Leaked in Fertility Clinic Ransomware Attack

By Dark Reading Staff
Reproductive Biology Associates says the data of 38,000 patients may have been compromised in the April cyberattack.

  • June 21st 2021 at 21:31

Baltimore County Public Schools' Ransomware Recovery Tops $8M

By Dark Reading Staff
The school district has spent seven months and a reported $8.1 million recovering from the November attack.

  • June 21st 2021 at 20:09
  • June 21st 2021 at 17:30

Are Ransomware Attacks the New Pandemic?

By Bill Harrod Federal CTO, Ivanti
Ransomware has been a problem for decades, so why is government just now beginning to address it?

  • June 21st 2021 at 14:00

Attackers Find New Way to Exploit Google Docs for Phishing

By Jai Vijayan Contributing Writer
Tactic continues recent trend by attackers to use trusted cloud services to send and host malicious content.

  • June 18th 2021 at 21:00

This Week in Database Leaks: Cognyte, CVS, Wegmans

By Kelly Sheridan Staff Editor, Dark Reading
Billions of records were found exposed this week due to unprotected databases owned by major corporations and third-party providers.

  • June 18th 2021 at 20:45

Accidental Insider Leaks Prove Major Source of Risk

By Dark Reading Staff
Research reports highlight growing concerns around insider negligence that leads to data breaches.

  • June 18th 2021 at 20:45

11 Security Certifications to Seek Out This Summer

By Steve Zurier Contributing Writer
The more you know, the more you grow. The Edge takes a fresh look at leading security certifications that can help advance your career.

  • June 18th 2021 at 16:45

4 Habits of Highly Effective Security Operators

By Ricardo Villadiego Founder and CEO of Lumu
These good habits can make all the difference in advancing careers for cybersecurity operators who spend their days putting out fires large and small.

  • June 18th 2021 at 14:00

Data Breaches Surge in Food & Beverage, Other Industries

By Jai Vijayan Contributing Writer
Six previously "under-attacked" vertical industries saw a surge in data breaches last year due to COVID-19 related disruptions and other factors, new data shows.

  • June 17th 2021 at 22:30

One in Five Manufacturing Firms Targeted by Cyberattacks

By Robert Lemos Contributing Writer
Information-stealing malware makes up about a third of attacks, a study finds, but companies worry most about ransomware shutting down production.

  • June 17th 2021 at 22:00

Carnival Cruise Line Reports Security Breach

By Dark Reading Staff
The cruise ship operator says the incident affected employee and guest data.

  • June 17th 2021 at 21:23

Google Launches SLSA, a New Framework for Supply Chain Integrity

By Dark Reading Staff
The "Supply chain Levels for Software Artifacts" aims to ensure the integrity of components throughout the software supply chain.

  • June 17th 2021 at 20:50

Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?

By Tim Sadler CEO and co-founder of Tessian
Consider four factors and behaviors that impact a particular employee's risk, and how security training should take them into account.

  • June 17th 2021 at 17:00

Mission Critical: What Really Matters in a Cybersecurity Incident

By Beth Burgin Waller Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC
The things you do before and during a cybersecurity incident can make or break the success of your response.

  • June 17th 2021 at 14:00

Ukraine Police Disrupt Cl0p Ransomware Operation

By Jai Vijayan Contributing Writer
Growing list of similar actions in recent months may finally be scaring some operators into quitting, but threat is far from over, security experts say.

  • June 16th 2021 at 21:50

Ransomware Operators' Strategies Evolve as Attacks Rise

By Kelly Sheridan Staff Editor, Dark Reading
Security researchers find ransomware operators rely less on email and more on criminal groups for initial access into target networks.

  • June 16th 2021 at 21:18

Biden Tells Putin Critical Infrastructure Sectors 'Off Limits' to Russian Hacking

By Dark Reading Staff
President Joe Biden said he and Russian President Vladimir Putin agreed to discuss boundaries in cyber activity.

  • June 16th 2021 at 19:53

Security Flaw Discovered In Peloton Equipment

By Dark Reading Staff
The vulnerability could give attackers remote root access to the bike's tablet, researchers report.

  • June 16th 2021 at 19:44

Cars, Medicine, Electric Grids: Future Hackers Will Hit Much More Than Networks in an IT/OT Integrated World

By Greg Valentine Senior Cybersecurity Director, Capgemini North America
Intelligent systems must include the right cybersecurity protections to prevent physical threats to operational technology.

  • June 16th 2021 at 19:00

Russian National Convicted on Charges Related to Kelihos Botnet

By Dark Reading Staff
Oleg Koshkin was arrested in 2019 and faces a maximum penalty of 15 years in prison, the DoJ reports.

  • June 16th 2021 at 18:55

Is an Attacker Living Off Your Land?

By Samuel Greengard Freelance Writer
Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.

  • June 16th 2021 at 18:05

Keeping Your Organization Secure When Dealing With the Unexpected

By Zane Lackey Co-Founder and CSO of Signal Sciences
There's no way to anticipate every possible scenario, but the right approach to business continuity can help you respond effectively in any situation.

  • June 16th 2021 at 17:00

Don't Get Stymied by Security Indecision

By Alex Pezold Founder & Chief Executive Officer, TokenEx
You might be increasing cyber-risk by not actively working to reduce it.

  • June 16th 2021 at 14:00

Thousands of VMware vCenter Servers Remain Open to Attack Over the Internet

By Jai Vijayan Contributing Writer
Three weeks after company disclosed two critical vulnerabilities in the workload management utility, many organizations have not patched the technology yet, security vendor says.

  • June 15th 2021 at 22:05

Microsoft Disrupts Large-Scale BEC Campaign Across Web Services

By Kelly Sheridan Staff Editor, Dark Reading
Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.

  • June 15th 2021 at 21:45

Security Experts Scrutinize Apple, Amazon IoT Networks

By Robert Lemos Contributing Writer
Both companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices worries some security researchers.

  • June 15th 2021 at 21:05

Andariel Group Targets South Korean Entities in New Campaign

By Dark Reading Staff
Andariel, designated as a sub-group of the Lazarus Group APT, has historically targeted South Korean organzations.

  • June 15th 2021 at 20:43

Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities

By Dark Reading Staff
Terbium Labs' products and services will become part of Deloitte's Detect & Respond lineup, the company confirms.

  • June 15th 2021 at 18:44

What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain

By Chen Fradkin Security Researcher at Claroty
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.

  • June 15th 2021 at 17:00

How President Biden Can Better Defend the US From Russian Hacks

By Carlo Massimo Freelance Writer
Wilson Center cybersecurity expert Meg King pinpoints five ambitious steps the administration should take, including a comprehensive national data breach notification protocol.

  • June 15th 2021 at 16:05

How Does the Government Buy Its Cybersecurity?

By Josh Ladick President of GSA Focus, Inc.
The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.

  • June 15th 2021 at 14:00

VPN Attacks Surged in First Quarter

By Jai Vijayan Contributing Writer
But volume of malware, botnet, and other exploit activity declined because of the Emotet botnet takedown.

  • June 14th 2021 at 23:20

Cyber Analytics Database Exposed 5 Billion Records Online

By Dark Reading Staff
In an ironic twist, Cognyte's data alerts customers to third-party data exposures.

  • June 14th 2021 at 20:50

Google Workspace Adds Client-Side Encryption

By Dark Reading Staff
Users given control over encryption keys, Google says.

  • June 14th 2021 at 20:03

New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'

By Kelly Jackson Higgins Executive Editor at Dark Reading
Best practices guide encompasses integrity, hardening, resilience, and monitoring of PLCs in industrial networks.

  • June 14th 2021 at 18:45

Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work

By Michael Daniel President & CEO, Cyber Threat Alliance
We lack reliable, representative, actionable data about ransomware's actual scope, scale, and impact. The Ransom Incident Response Network could change that.

  • June 14th 2021 at 14:00

Name That Toon: Sight Unseen

By John Klossner Cartoonist
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

  • June 14th 2021 at 13:05

Colonial Pipeline Cyberattack Proves a Single Password Isn't Enough

By Hollie Hennessy Senior Analyst, IoT Cybersecurity, Omdia
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar -- but a focus on credentials is vital.

  • June 14th 2021 at 13:00

Trickbot Investigation Shows Details of Massive Cybercrime Effort

By Robert Lemos Contributing Writer
Nearly a score of cybercriminals allegedly worked together to create the Trickbot malware and deploy it against more than a million users, an unsealed indictment claims.

  • June 11th 2021 at 20:35

McDonald's Data Breach Exposed Business & Customer Data

By Dark Reading Staff
An investigation has revealed company data has been breached in the United States, South Korea, and Taiwan.

  • June 11th 2021 at 20:06

Details Emerge on How Gaming Giant EA Was Hacked

By Dark Reading Staff
Hacking group stole source code to FIFA 21 and the company's Frostbite engine.

  • June 11th 2021 at 16:09

Many Mobile Apps Intentionally Using Insecure Connections for Sending Data

By Jai Vijayan Contributing Writer
A new analysis of iOS and Android apps released to Apple's and Google's app stores over the past five years found many to be deliberately breaking HTTPS protections.

  • June 11th 2021 at 14:45

Secure Access Trade-offs for DevSecOps Teams

By Ev Kontsevoy CEO of Teleport
Thanks to recent advancements in access technologies, everyone can apply identity-based authentication and authorization and zero-trust principles for their computing resources.

  • June 11th 2021 at 14:00

New Ransomware Group Claiming Connection to REvil Gang Surfaces

By Jai Vijayan Contributing Writer
"Prometheus" is the latest example of how the ransomware-as-a-service model is letting new gangs scale up operations quickly.

  • June 10th 2021 at 22:30

'Fancy Lazarus' Criminal Group Launches DDoS Extortion Campaign

By Kelly Sheridan Staff Editor, Dark Reading
The group has re-emerged after a brief hiatus with a new email campaign threatening a DDoS attack against businesses that don't pay ransom.

  • June 10th 2021 at 22:05

Healthcare Device Security Firm COO Charged With Hacking Medical Center

By Dark Reading Staff
Vikas Singla, chief operating officer of security firm that provides products and services to the healthcare industry, faces charges surrounding a cyberattack he allegedly conducted against Duluth, Ga.-based Gwinnett Medical Center.

  • June 10th 2021 at 22:01

JBS CEO Says Company Paid $11M in Ransom

By Dark Reading Staff
The decision to pay attackers was a difficult one, CEO Andre Nogueira said in a statement.

  • June 10th 2021 at 21:50
โŒ