FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Third-Party Software Risks Grow, but So Do Solutions

By Robert Lemos, Contributing Writer
Enterprises are more dependent than ever on open source software and need to manage the risk posed by vulnerabilities in components and third-party vendors.

  • November 11th 2021 at 17:26

Insider IP Theft Is Surging β€” and Most Can't Stop It

The Great Resignation is upon us, and insider IP theft is surging as a result. But it is a solvable problem.

  • November 11th 2021 at 16:15

Should Our Security Controls Be More Like North Korea or Norway?

By Sounil Yu, CISO and Head of Research of JupiterOne
When the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.

  • November 11th 2021 at 14:00

New Application Security Toolkit Uncovers Dependency Confusion Attacks

By Fahmida Y. Rashid, Features Editor, Dark Reading
The Dependency Combobulator is an open source Python-based toolkit that helps developers discover malicious software components that may have accidentally been added to their projects.

  • November 11th 2021 at 00:41

Hacker-for-Hire Group Spied on More Than 3,500 Targets in 18 Months

By Jai Vijayan, Contributing Writer
Russian-speaking "Void Balaur" group's victims include politicians, dissidents, human rights activists, doctors, and journalists, security vendor discloses at Black Hat Europe 2021.

  • November 10th 2021 at 22:40

ChaosDB: Researchers Share Technical Details of Azure Flaw

By Kelly Sheridan, Senior Editor
Wiz researchers who discovered a severe flaw in the Azure Cosmos DB database discussed the full extent of the vulnerability at Black Hat Europe.

  • November 10th 2021 at 21:25

Firms Will Struggle to Secure Extended Attack Surface in 2022

By Robert Lemos, Contributing Writer
Companies are relying more heavily on third parties, remote employees, and partners, expanding their attack surface area beyond traditional boundaries.

  • November 10th 2021 at 20:57

SquirrelWaffle Leverages Malspam to Deliver Qakbot, Cobalt Strike

By Edmund Brumaghin, Cisco Talos Threat Researcher
Threat is spreading widely via spam campaigns, infecting systems with a new malware loader.

  • November 10th 2021 at 20:40

SolarWinds Vulnerability Exploited in First Stage of Clop Ransomware Attacks

By Dark Reading Staff, Dark Reading
Russian cybercrime group known as T505 is targeting SolarWinds Server-U systems that haven't been patched for a remote code execution vulnerability fixed this summer.

  • November 10th 2021 at 18:23

Defining the Hierarchy of Value in Cyber Intelligence

By Adam Darrah, Director of Threat Intelligence Services, ZeroFox
One size won't fit all as we try to reconcile the need to demonstrate expertise and value with keeping clients and researchers safe.

  • November 10th 2021 at 17:00

CISA and State and Local Partners Test Emergency Response Plans at Chevron Salt Lake Refinery

The exercise included several objectives related to response procedures at the refinery, including evacuation and shelter-in-place decision-making; roles and responsibilities during investigations; communication with first responders; and public messaging before and following an incident.
  • November 10th 2021 at 16:09

4 Tips to Secure the OT Cybersecurity Budget You Require

By Jim Crowley, CEO at Industrial Defender
OT security engineers and personnel should approach senior management with an emphasis on risk reduction benefits and with a concrete plan to secure budget and funding before it's too late.

  • November 10th 2021 at 15:00

Securing the Public: Who Should Take Charge?

By Kelly Sheridan, Senior Editor
International policy expert Marietke Schaake explores the intricacies of protecting the public as governments depend on private companies to build and secure digital infrastructure.

  • November 10th 2021 at 14:44

Researcher Details Vulnerabilities Found in AWS API Gateway

By Kelly Jackson Higgins, Executive Editor
AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.

  • November 10th 2021 at 14:30

Dark Reading Video News Desk Comes to Black Hat Europe

By Dark Reading Staff, Dark Reading
While attendees join Black Hat Europe 2021 virtually and live in London, we bring you prerecorded interviews from remote offices around the world.

  • November 10th 2021 at 11:00

Microsoft Fixes Exchange Server Zero-Day

By Jai Vijayan, Contributing Writer
November security update contains patches for 55 bugs β€” including six zero-days across various products.

  • November 9th 2021 at 23:05

Are You Planning for the Quantum, Transhumanist Threat?

By Robert Lemos, Contributing Writer
Breaking encryption in a day and hacking without visible devices are two threats that could become a reality in the next decade and beyond, experts say.

  • November 9th 2021 at 22:24

Why Self-Learning AI Is Changing the Paradigm of ICS Security

By Oakley Cox, Director of Analysis, Darktrace
By focusing on the organization rather than the threat, AI can identify subtle changes in your digital environment that point to a cyber threat.

  • November 9th 2021 at 19:52

Zoho ManageEngine Flaw Highlights Risks of Race to Patch

By Robert Lemos, Contributing Writer
Attackers used a pre-auth vulnerability in a component of the enterprise management software suite to compromise businesses, highlighting the dangers of Internet-facing software.

  • November 9th 2021 at 17:51

How to Minimize Ransomware's Trail of Destruction and Its Associated Costs

By Jake Williams, CTO of BreachQuest
One of the biggest mistakes an organization can make is blindly throwing technology at the problem instead of properly investing in building a security team.

  • November 9th 2021 at 17:00

SafeBreach Closes $53.5 Million Series D in New Funding to Fuel Momentum

The new capital will fuel the company's plans to expand its market footprint to new geographies and evolve its offerings in response to client needs.
  • November 9th 2021 at 15:38

The State of the CISO

Dark Reading survey shows security officer influence is on the rise.
  • November 9th 2021 at 15:00

Building Bridges to a More Secure Hybrid Workplace

By Ian Pratt, Global Head of Security for Personal Systems at HP Inc.
Wherever workers choose to do their jobs, they need technology that's unobtrusive, secure by design, and intuitive to use.

  • November 9th 2021 at 15:00

Edge Chat With Cisco Secure CTO TK Keanini on Achieving Better Security Outcomes

By Edge Editors, Dark Reading
Now is the time for organizations to rethink their security strategies with a platform- and architecture-based approach in mind. Keanini explains.

  • November 9th 2021 at 06:37

UL Launches SafeCyber Platform to Secure IoT

By Dark Reading Staff, Dark Reading
UL’s SafeCyber will allow organizations to manage cybersecurity governance and processes as well as speed up time spent on firmware development.

  • November 8th 2021 at 23:19

US Charges Ukrainian National for Kaseya Ransomware Attack

By Jai Vijayan, Contributing Writer
Yaroslav Vasinskyi is one of seven individuals believed to be responsible for deploying REvil ransomware in attacks against 5,000 organizations.

  • November 8th 2021 at 23:07

What Security Strategies Are Driving InfoSec's Decisions Around Defense?

By Dark Reading Staff, Dark Reading
The data shows security leaders are focusing on multilayered defenses, including multifactor authentication, threat intelligence, and incident response.

  • November 8th 2021 at 22:03

Investor Group to Acquire McAfee for $14B

By Dark Reading Staff, Dark Reading
The group, made up of Advent, Permira, Crosspoint Capital, CPP Investments, GIC, and ADIA, will take ownership of McAfee.

  • November 8th 2021 at 20:50

What My Optometrist Taught Me About InfoSec Presentations

By Joshua Goldfarb, Director of Product Management at F5
A broken pair of eyeglasses brings into focus an important lesson about how to tailor security messages to the right audience.

  • November 8th 2021 at 19:15

Arctic Wolf Security Operations Cloud Reaches Massive Scale and a Global Footprint

Global business momentum and technical advancements position the Arctic Wolf platform as a category-defining Security Operations solution
  • November 8th 2021 at 16:46

Kaspersky Finds DDoS Attacks in Q3 Grow by 24%, Become More Sophisticated

The total number of smart attacks (advanced DDoS attacks that are often targeted) increased by 31% when compared to the same period last year.
  • November 8th 2021 at 16:31

Banking Malware Threats Surging as Mobile Banking Increases – Nokia Threat Intelligence Report

The Nokia 2021 Threat Intelligence Report announced today shows that banking malware threats are sharply increasing as cyber criminals target the rising popularity of mobile banking on smartphones, with plots aimed at stealing personal banking credentials and credit card information.
  • November 8th 2021 at 16:27

Valeo Networks Acquires On Time Tech, Accelerating National Growth Strategy

Through this latest acquisition, the company adds two more California locations.
  • November 8th 2021 at 16:01

Could Cyber Diplomacy Be the Ultimate Answer to American Ransomware Woes?

By Cristin J. Monahan, Cyber Vault Fellow at National Security Archive
Incentives for good conduct and deterrents for bad behavior in cyberspace are impossible to effectively establish and enforce without international collaboration and commitment.

  • November 8th 2021 at 14:00

3 Ways to Deal With the Trojan Source Attack

By Dark Reading Staff, Dark Reading
These scripts and commands provide short-term fixes for blocking the Trojan Source attack that abuses Unicode to inject malicious backdoors int source code.

  • November 5th 2021 at 22:03

SecureAuth Buys Acceptto to Deliver Low-Friction Authentication to Enterprises

By Dark Reading Staff, Dark Reading
Acceptto’s contextual behavior threat intelligence technology will help SecureAuth deliver AI-driven MFA and continuous password-less authentication, SecureAuth says.

  • November 6th 2021 at 01:34

US Defense Contractor Discloses Data Breach

By Dark Reading Staff, Dark Reading
Electronic Warfare Associates says an attackers infiltrated EWA email in August, which led to the exfiltration of files with personal data.

  • November 5th 2021 at 20:45

Who's Minding Your Company's Crypto Decisions?

By Tatiana Walk-Morris, Contributing Writer
Security teams must first evaluate security protocols and the reputation of the cryptocurrency payment platform before their companies can proceed to accept the alternative currency as payment.

  • November 5th 2021 at 20:25

How InfoSec Should Use the Minimum Viable Secure Product Checklist

By Kelly Sheridan, Senior Editor
Google and Salesforce executives discuss the need for the newly released MVSP, how tech companies came together to work on it, and how organizations should use it.

  • November 5th 2021 at 17:30

To Secure DevOps, Security Teams Must be Agile

By Robert Lemos, Contributing Writer
The evolution of agile development and infrastructure-as-code has given security teams the tools they need to gain visibility, find vulnerabilities early, and continuously evaluate infrastructure.

  • November 5th 2021 at 15:25

4 Tips on How Small to Midsize Businesses Can Combat Cyberattacks

By John Roman, President and COO of FoxPointe Solutions
The first step in improving your cybersecurity is understanding your risk of attack.

  • November 5th 2021 at 14:00

How Is Zero Trust Different From Traditional Security?

By Ash Devata, General Manager, Cisco Zero Trust and Duo Security
Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.

  • November 4th 2021 at 21:55

API Security Issues Hinder Application Delivery

By Jai Vijayan, Contributing Writer
A new survey explains why nearly all organizations experience API security problems to varying degrees.

  • November 4th 2021 at 21:25

Ripping Off the Blindfold: Illuminating OT Environments

By Oakley Cox, Director of Analysis, Darktrace
A security tool that monitors OT devices can't disrupt operations. This is why the Self-Learning AI acts only on information obtained by passive monitoring of the network.

  • November 4th 2021 at 21:18

US Offers $10M Reward For ID, Location of DarkSide Leadership

By Dark Reading Staff, Dark Reading
The State Department offers multimillion-dollar rewards for information related to the leaders and members involved in DarkSide ransomware.

  • November 4th 2021 at 21:05

Phishing Attack Blends Spoofed Amazon Order and Fraudulent Customer Service Agents

By Steve Zurier, Contributing Writer
It's the latest in a series of clever brand impersonation scams that use multiple vectors to lure victims.

  • November 4th 2021 at 20:44

Appsian Security Announces Acquisition of Q Software, a Leader in JD Edwards Security and Compliance

The acquisition provides customers of JD Edwards, along with Oracle EBS and Oracle Cloud, with expanded capabilities for data masking, threat detection and response, and real-time analytics across multiple ERP applications.
  • November 4th 2021 at 15:36

Having Trouble Finding Cybersecurity Talent? You Might Be the Problem

By Jamie Tomasello, Head of Security Programs and Security GRC at Gusto
Hiring managers must rethink old-school practices to find the right candidates and be ready to engage in meaningful conversations about their company's values. Here are three ways to start.

  • November 4th 2021 at 14:00

How to Avoid Another Let's Encrypt-Like Meltdown

By Andrada Fiscutean, Contributing Writer
Experts weigh in on steps network and security administrators need to take before the next time a root certificate expires.

  • November 4th 2021 at 00:55

Researchers Scan the Web to Uncover Malware Infections

By Robert Lemos, Contributing Writer
Dozens of companies and universities regularly scan the Internet to gather data on connected devices, but some firms are looking deeper to uncover the extent of detectable malware infections.

  • November 3rd 2021 at 22:10

CISA Issues New Directive for Patching Known Exploited Vulnerabilities

By Jai Vijayan, Contributing Writer
The goal is to reduce civilian federal agency exposure to attacks that threat actors are actively using in campaigns, agency says.

  • November 3rd 2021 at 20:45

5 MITRE ATT&CK Tactics Most Frequently Detected by Cisco Secure Firewalls

By Ben Nahorney, Threat Intelligence Analyst, Cisco Security
Cisco Security examines the most frequently encountered MITRE ATT&CK tactics and techniques.

  • November 3rd 2021 at 20:07

Cloud Data Security Startup Launches

By Dark Reading Staff, Dark Reading
TrustLogix aims to streamline and simplify data governance in the cloud.

  • November 3rd 2021 at 20:00

Where Is Cloud Permissions Management Headed?

By Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
Cloud permissions management emerged as a standalone cloud security technology but is quickly becoming part of a broader set of capabilities

  • November 3rd 2021 at 19:53

US Blacklists Israeli Firms NSO Group and Candiru

By Dark Reading Staff, Dark Reading
The US Commerce Department has also added Russia's Positive Technologies and Singapore's Computer Security Initiative Consultancy.

  • November 3rd 2021 at 19:35

Infosec and Business Alignment Lowers Breach Cost, Boosts Security

By Kelly Sheridan, Senior Editor
As attacks and security budgets continue to rise, data shows the most secure organizations are the ones that strike a security-business balance.

  • November 3rd 2021 at 19:26

Is Sandboxing Dead?

By Gilad David Maayan, Technology Writer
Organizations should start to evaluate other security measures to replace or complement the once-venerable security sandbox.

  • November 3rd 2021 at 17:00

Valtix Delivers Free Cloud Security for Departmental, Development, and Test Applications

Company aims to make cloud network security more accessible to all organizations.
  • November 3rd 2021 at 14:30
❌