FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

US Banks Will Be Required to Report Cyberattacks Within 36 Hours

By Dark Reading Staff, Dark Reading
There is currently no specific time frame during which banks must report to federal regulators that a security incident had occurred. A new notification rules changes that to 36 hours.

  • November 19th 2021 at 22:29

3 Takeaways from the Gartner Risk Management Summit

By Fahmida Y. Rashid, Features Editor, Dark Reading
Security leaders can be treated as partners supporting the business and share accountability by establishing relationships with business stakeholders.

  • November 19th 2021 at 20:52

To Beat Ransomware, Apply Zero Trust to Servers Too

The path out of the ransomware crisis is full inspection and protection of all traffic flows. That means zero trust everywhere β€” even between servers.
  • November 19th 2021 at 15:35

Zero Trust: An Answer to the Ransomware Menace?

By Steve Durbin, CEO of the Information Security Forum
Zero trust isn't a silver bullet, but if implemented well it can help create a much more robust security defense.

  • November 19th 2021 at 15:00

US Indicts Iranian Nationals for Cyber-Enabled Election Interference

By Jai Vijayan, Contributing Writer
Among other things, the pair pretended to be Proud Boys volunteers and sent in a fake video and emails to Republican lawmakers purporting to show Democratic Party attempts to subvert the 2020 presidential elections.

  • November 19th 2021 at 08:40

Search CT Logs for Misconfigured SSL Certificates

By Dark Reading Staff, Dark Reading
Security defenders can run these queries against Certificate Transparency logs to identify misconfigured SSL certificates before they can be used by adversaries to map out attacks.

  • November 19th 2021 at 04:22

Cloud Security Startup Lacework Gets a Boost With New $1.3B Funding

By Dark Reading Staff, Dark Reading
Lacework's will use its $1.3 billion Series D to expand go-to-market strategies and its data-focused cloud security platform.

  • November 18th 2021 at 23:40

Microsoft Exchange Server Flaws Now Exploited for BEC Attacks

By Jai Vijayan, Contributing Writer
Attackers also are deploying ProxyShell and abusing the vulnerabilities in stealthier manner, researchers say.

  • November 18th 2021 at 23:03

Two Iranian Nationals Charged for Cyber-Enabled Disinformation and Threat Campaign Designed to Influence the 2020 US Presidential Election

An indictment was unsealed charging two Iranian nationals for their involvement in a cyber-enabled campaign to intimidate and influence American voters, and otherwise undermine voter confidence and sow discord, in connection with the 2020 US presidential election.
  • November 18th 2021 at 22:38

North Korean Hacking Group Targets Diplomats, Forgoes Malware

By Robert Lemos, Contributing Writer
The TA406 group uses credential harvesting to target diplomats and policy experts in the United States, Russia, China, and South Korea, rarely resorting to malware.

  • November 18th 2021 at 21:35

California Pizza Kitchen Suffers Data Breach

By Dark Reading Staff, Dark Reading
Personal data, including Social Security numbers, of more than 100K employees exposed.

  • November 18th 2021 at 20:22

Addressing the Low-Code Security Elephant in the Room

By Michael Bargury, CTO & Co-Founder, Zenity
The danger of anyone being able to spin up new applications is that few are thinking about security. Here's why everyone is responsible for the security of low-code/no-code applications.

  • November 18th 2021 at 18:32

Artificial Intelligence and Machine Learning, Cloud Computing, and 5G Will Be the Most Important Technologies in 2022, Says New IEEE Study

Chief information officers, chief technology officers, and technology leaders globally surveyed on key technology trends, priorities, and predictions for 2022 and beyond.
  • November 18th 2021 at 08:55

GBG Announces It Has Agreed to Acquire Acuant

GBG announces it has agreed to acquire Acuant, bringing together two leaders in the global digital identity market with combined revenue of c.Β£265 million.
  • November 18th 2021 at 08:45

Swarm Intelligence May Be Just the Ticket for Improved Network & Device Security

By Morey Haber, CTO and CISO, BeyondTrust
Based on the reaction of a single insect in a swarm, messages are passed along peer to peer, and an entire environment can respond without a central leader processing data and giving orders.

  • November 18th 2021 at 15:00

'PerSwaysion' Phishing Campaign Still Ongoing, and Pervasive

By Jai Vijayan, Contributing Writer
Research shows that multiple attack groups have been using the Microsoft file-sharing service - leveraging phishing kit for much longer than previously thought.

  • November 18th 2021 at 13:01

Sift Acquires Passwordless Authentication Pioneer Keyless to Provide Secure, Frictionless Authentication

Biometric authentication innovator eliminates password-based account takeover and enables PSD2 Strong Customer Authentication while preserving user privacy.
  • November 17th 2021 at 22:48

Palo Alto Networks Delivers What's Next in Security at Ignite '21

Cybersecurity company introduces solutions aimed at network security, cloud security and security operations.
  • November 17th 2021 at 22:45

Can I Have XDR Without EDR?

By Al Huger, Vice President and General Manager of Cisco Security Platform & Response
Yes, extended detection and response is possible without endpoint detection and response, but here's why having both is helpful.

  • November 17th 2021 at 22:06

Cyber Conflict Between US and Iran Heats Up

By Robert Lemos, Contributing Writer
The United States, United Kingdom, and Australia warn attacks from groups linked to Iran are on the rise, while the Iranian government blames the US and Israel for an attack on gas pumps.

  • November 17th 2021 at 21:02

Cybercriminals Contemplate 'Exploit-as-a-Service' Model

By Dark Reading Staff, Dark Reading
Researchers share their findings on the current zero-day market and how criminals' strategies may shift in the future.

  • November 17th 2021 at 19:15

5 Things ML Teams Should Know About Privacy and the GDPR

By Patricia Thaine, CEO & Co-Founder of Private AI
Machine learning delivers plenty of benefits. But as the emerging technology gets applied more broadly, be careful about how you handle all the data used in the process.

  • November 17th 2021 at 18:00

Is XDR Overhyped?

By Ericka Chickowski, Contributing Writer
Security experts weigh in on the value and pitfalls of extended detection and response (XDR), offering consideration and advice on this growing new category.

  • November 17th 2021 at 17:00

How to Navigate the Mitigation of Deepfakes

By Etay Maor, Sr. Director Security Strategy at Cato Networks
Deepfakes are already several steps ahead of the technology that can detect and warn us about them.

  • November 17th 2021 at 15:00

Belarus Linked to Big European Disinformation Campaign

By Jai Vijayan, Contributing Writer
EU officials and others previously had blamed Russia's intelligence operations for the so-called Ghostwriter campaign.

  • November 17th 2021 at 14:00

Team Cymru Acquires Amplicy

By Dark Reading Staff, Dark Reading
The combination of Team Cymru's threat intelligence and threat hunting capabilities and Amplicy's Internet asset discovery and vulnerability management will give enterprise defenders a comprehensive view of their organization's cyber risk.

  • November 17th 2021 at 00:48

Suppliers, Cloud Providers Are Threats to Enterprise Data, Survey Says

By Edge Editors, Dark Reading
Other threats to enterprise data include cybercriminals, authorized users, foreign governments, and application vulnerabilities, according to Dark Reading's recent Strategic Security Report.

  • November 16th 2021 at 23:06

New Global Rackspace Technology Survey Underscores Rapid Pace of Cloud Adoption

More than half of respondents have 100% of their infrastructure in the cloud; IT playing an increasingly critical role in driving corporate strategy.
  • November 16th 2021 at 22:27

Emotet Makes a Comeback

By Dark Reading Staff, Dark Reading
The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.

  • November 16th 2021 at 22:10

Cybercriminals Increasingly Employ Crypto-Mixers to Launder Stolen Profits

By Robert Lemos, Contributing Writer
Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.

  • November 16th 2021 at 20:16

The Old Ways Aren’t Working: Let’s Rethink OT Security

By Fahmida Y. Rashid, Features Editor, Dark Reading
Ransomware attacks against critical infrastructure go beyond locking up data. They can entirely shut down production in a facility. Here's how AI can help you fight back.

  • November 16th 2021 at 19:39

4 Considerations for Improving Cloud Security Hygiene

By Andy Ellis, Advisory CISO at Orca Security
Mixing cloud security and maintenance practices with legacy enterprise approaches usually ends up shortchanging cloud hygiene. Here are some ways to remedy that.

  • November 16th 2021 at 18:00

6 Tips To Keep in Mind for Ransomware Defense

By Angela Frechette, Security Business Group, Cisco
Ransomware is everywhere, including the nightly news. Most people know what it is, but how do ransomware attackers get in, and how can we defend against them?

  • November 15th 2021 at 21:59

Navigating the Complexity of Today's Digital Supply Chain

By Peter Albert, CISO at InfluxData
An efficient way to monitor security is to model user behavior using time series data and watching for anomalies.

  • November 16th 2021 at 15:00

The Troubling Rise of Initial Access Brokers

By Jai Vijayan, Contributing Writer
Criminal groups are ramping up use of IABs to get access to networks without having to deal with the initial reconnaissance and intrusion phases.

  • November 15th 2021 at 23:23

Immersive Labs Acquires Snap Labs to Power Cyber Simulations With New Depth and Realism

Integrated offering to deliver hyper-realistic team exercises specific to customer environments for more relevant cyber knowledge, skills, and judgment.
  • November 15th 2021 at 22:53

MacOS Zero-Day Used in Watering-Hole Attacks

By Robert Lemos, Contributing Writer
Attackers targeted Chinese pro-democracy groups using a vulnerability fixed in September along with a second vulnerability fixed early in the year, Google says.

  • November 15th 2021 at 22:23

Norton Special Report Reveals Nearly 1 in 2 Gamers Have Experienced a Cyberattack

Three in four say they were impacted financially as a result, losing more than $700 on average.
  • November 15th 2021 at 22:16

8 Tips To Keep in Mind for Ransomware Defense

By Angela Frechette, Security Business Group, Cisco
Ransomware is everywhere, including the nightly news. Most people know what it is, but how do ransomware attackers get in, and how can we defend against them?

  • November 15th 2021 at 21:59

FBI Attributes Abuse of Its Email Account to Software 'Misconfiguration'

By Dark Reading Staff, Dark Reading
A wave of phony emails from an FBI mail server originated from an issue with the agency's Law Enforcement Enterprise Portal.

  • November 15th 2021 at 21:51

Name That Toon: Cubicle for Four

By John Klossner, Cartoonist
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

  • November 15th 2021 at 21:40

3 Must-Know Technologies to Protect Your Hybrid Workforce

By Mary Blackowiak, Lead Product Marketing Manager, AT&T Cybersecurity
Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users.

  • November 15th 2021 at 21:21

How to Negotiate With Ransomware Attackers

By Kelly Sheridan, Senior Editor
Security researchers investigate the ransom negotiation process to create strategies businesses can use if they face an attack.

  • November 15th 2021 at 17:30

JupiterOne and Cisco Announce Launch of Secure Cloud Insights

The partnership is designed to provide businesses with a range of cybersecurity services.
  • November 15th 2021 at 16:33

How Visibility Became the Lifeblood of SecOps and Business Success

By PJ Kirner, CTO & Founder, Illumio
The best way to succeed in long-term cybersecurity is to invest in visibility because you can't protect or defend against what you can't see.

  • November 15th 2021 at 14:00

MSPAlliance Leadership Council Forms Vendor Council to Address Managed Services Supply Chain Risk

MSP supply chain threats will be mitigated through transparency, education, business continuity planning, and managed services channel certification.
  • November 12th 2021 at 22:58

BT to Deploy 'Epidemiological AI' Based on the Spread of Viruses in Humans to Combat Cyberattacks

Using the spread of viruses in human populations as a model to inform its AI, Inflame is a key component in BT’s recently-announced Eagle-i platform.
  • November 12th 2021 at 22:55

Ankura Launches Brooklyn Cyber Center

New initiative addresses shortage of professionals and lack of diversity in cybersecurity by recruiting, training and retaining diverse talent from underrepresented backgrounds.
  • November 12th 2021 at 22:48

Emerging Security Tools Tackle GraphQL Security

By Fahmida Y. Rashid, Features Editor, Dark Reading
New security tools are proactively protecting APIs built with GraphQL, before attacks against them become more commonplace.

  • November 12th 2021 at 22:45

Open Source Project Aims to Detect Living-Off-the-Land Attacks

By Robert Lemos, Contributing Writer
The machine learning classifier from Adobe can determine whether system commands are malicious and classify them using a variety of tags useful for security analysts.

  • November 12th 2021 at 22:05

Follow the Leaders: A Blueprint for Software Security Success

By Jacob Ewers, Principal Security Consultant, Synopsys Software Integrity Group
Organizations can study software security leaders and emulate their habits and initiatives in order to build a successful software security program of their own.

  • November 12th 2021 at 18:59

How to Hire ο»Ώβ€” and Retain ο»Ώβ€”ο»Ώ Effective Threat Hunters

By Stephen Jones, Senior Director, Cyber Security Services at Dataprise
Key characteristics that should be evaluated include curiosity, disposition, and fit with the culture.

  • November 12th 2021 at 15:00

In Appreciation: Alan Paller

By Dark Reading Staff, Dark Reading
Alan Paller, founder of the famed SANS Institute, passed away on Nov. 9.

  • November 12th 2021 at 10:34

'Lyceum' Threat Group Broadens Focus to ISPs

By Jai Vijayan, Contributing Writer
New report suggests attacker is targeting trusted supply chain companies in order to compromise large numbers of downstream customers.

  • November 11th 2021 at 23:41

Google Open Sources ClusterFuzzLite

By Dark Reading Staff, Dark Reading
ClusterFuzzLite is a stripped-down version of continuous fuzzing tool ClusterFuzz that integrates CI tools.

  • November 11th 2021 at 22:55

How Do I Know It's Time to Consider a SASE Migration?

By Shaila Shankar, SVP and General Manager, Cisco Cloud Network and Security
The rapid shift to a hybrid workplace and accelerated adoption of new technologies means it's time to rethink networking security approaches.

  • November 11th 2021 at 21:13

What Happens If Time Gets Hacked

By Kelly Jackson Higgins, Executive Editor
Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure.

  • November 11th 2021 at 18:40

Cloud Attack Analysis Unearths Lessons for Security Pros

By Kelly Sheridan, Senior Editor
Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.

  • November 11th 2021 at 18:11
❌