FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Disclosure, Panic, Patch: Can We Do Better?

By Robert Lemos, Contributing Writer
Companies struggle to understand the extent to which they are affected by vulnerabilities in open source software, but security specialists and maintainers are striving to secure the ecosystem.

  • February 1st 2022 at 22:00

ShiftLeft CORE 'Velocity Update' Streamlines Triage, Automates Build Security Controls

New features empower developers and AppSec teams to streamline the triage process and automate security controls.
  • February 1st 2022 at 20:00

7 Red Flags That Can Stop Your Company From Becoming a Unicorn

By Pam Baker, Contributing Writer
Investors and venture capitalists share the reasons that make them turn away from investing in your security tech.

  • February 1st 2022 at 19:00

Complexity vs. Capability: How to Bridge the Security Effectiveness Gap

By Martin Roesch, CEO, Netography
Consolidation and automation are among the strategies for balancing security complexity and capability.

  • February 1st 2022 at 18:00

Qualys Adds Advanced Remediation Capabilities to Minimize Vulnerability Risk

Update to Qualys Cloud Platform enables organizations to fix asset misconfigurations in addition to patching to achieve comprehensive remediation.
  • February 1st 2022 at 15:15

Mastercard Launches Global Cybersecurity Alliance Program to Further Secure The Digital Ecosystem

New program helps partners accelerate growth and provide scaled delivery of critical cybersecurity and risk services.
  • February 1st 2022 at 15:05

Critical Log4j Vulnerabilities Are the Ultimate Gift for Cybercriminals

By Ariel Parnes, Co-Founder and Chief Operating Officer, Mitiga
It's important to assume you have been vulnerable for months if not years, and to plan β€” and patch β€” accordingly.

  • February 1st 2022 at 15:00

NortonLifeLock Introduces Social Media Monitoring

New feature helps protect against social media account takeovers and cyberbullying.
  • February 1st 2022 at 15:00

Coalition Launches Executive Risks Products With Personalized Risk Assessment

Coalition now offering Directors & Officers (D&O) and Employment Practices Liability (EPL) with new tools and features to all broker partners.
  • February 1st 2022 at 13:22

Cymulate Launches Service to Augment In-House Security Teams

Amplify bolsters organizations with limited resources to optimize their security posture.
  • February 1st 2022 at 13:20

Security Service Edge Boosters Form New Forum to Encourage Adoption

By David Bisson, Contributing Writer
IT leaders who formed the SSE Forum say the technology offers cloud-forward security for modern workplaces.

  • February 1st 2022 at 00:00

Mandiant: 1 in 7 Ransomware Extortion Attacks Exposes OT Data

By Dark Reading Staff, Dark Reading
Analysis of "shaming site" data dumps found sensitive documentation from OT organizations, including oil and gas.

  • January 31st 2022 at 23:12

BlackBerry Agrees to Sell Legacy Patents for $600M

It has entered into a patent sale agreement with Catapult IP Innovations.
  • January 31st 2022 at 22:29

Aggressive BlackCat Ransomware on the Rise

By Robert Lemos, Contributing Writer
The cybercriminals behind the malware claim to have compromised more than a dozen companies; they have aggressively outed victims and purportedly paid a significant share of ransoms back to affiliates.

  • January 31st 2022 at 21:43

7 Privacy Tips for Security Pros

By Steve Zurier, Contributing Writer
How best to integrate privacy into your organization's security program.

  • January 31st 2022 at 15:50

The Zero-Trust Timer Is on for Federal Agencies β€” How Ready Are They?

By Ericka Chickowski, Contributing Writer
A new study coincides with OMB’s finalization of its zero-trust strategy through 2024.

  • January 31st 2022 at 15:17

Crypto Agility: Solving for the Inevitable

By David Ott, Senior Researcher, VMware Research
The advent of viable quantum computers will threaten today’s encryption standards, which are the basis of Internet security. Cryptographic agility is the key to post-quantum computing security, although implementing it will be a formidable challenge.

  • January 31st 2022 at 15:00

The Looming CISO Mental Health Crisis β€” and What to Do About It, Part 2

By Shamla Naidoo, Head of Cloud Strategy & Innovation, Netskope
Letting mental health issues fester may result in burnout and attrition, which affect both the company and the humans it employs.

  • January 31st 2022 at 14:00

Energy Sector Still Needs to Shut the Barn Door

By Dark Reading Staff, Dark Reading
One third of the companies studied haven't fixed their credential management β€” the same issue that led to the Colonial Pipeline hack last May.

  • January 28th 2022 at 21:35

The Looming CISO Mental Health Crisis β€” and What to Do About It, Part 1

By Shamla Naidoo, Head of Cloud Strategy & Innovation, Netskope
The next big threat to corporate security may not be a new strain of malware or innovative attacker tactics, techniques, and processes. It may be our own mental health.

  • January 28th 2022 at 18:30

More Security Flaws Found in Apple's OS Technologies

By Jai Vijayan, Contributing Writer
Apple's latest updates included fixes for two zero-day flaws, several code execution bugs, and vulnerabilities that allowed attackers to bypass its core security protections.

  • January 28th 2022 at 15:00

Navigating Nobelium: Lessons From Cloud Hopper & NotPetya

By James Campbell, Co-Founder and CEO, Cado Security
Nearly every organization should assume that it is at risk, but there are ways of countering the tactics used by advanced persistent threats.

  • January 28th 2022 at 15:00

Data Privacy Day 2022: How Can AI Help in the Fight Against Ransomware?

By Maxine Holt, Research Director, Omdia
Fewer than one-quarter of organizations believe they are fully prepared for a ransomware attack, threatening data privacy

  • January 28th 2022 at 09:00

Phishing Simulation Study Shows Why These Attacks Remain Pervasive

By Robert Lemos, Contributing Writer
Email purportedly from human resources convinced more than one-fifth of recipients to click, the majority of whom did so within an hour of receiving the fraudulent message.

  • January 27th 2022 at 22:53

Security Service Edge: 4 Core Tenets for Your SASE Journey

By Jason Clark, Chief Security Officer & Chief Strategy Officer, Netskope
Historically we've held network conversations to address security problems, but that doesn't work in a cloud-based world.

  • January 27th 2022 at 22:35

IFSEC Seeks Security Pros for New Survey on Physical Access Control

By IFSEC Global, Staff
Take part in an IFSEC Global survey to better understand the state of access control in 2022.

  • January 27th 2022 at 18:00

With Cloud the Norm, Insiders Are Everywhere β€” and Pose Greater Risk

By Robert Lemos, Contributing Writer
After companies accelerated their adoption of cloud infrastructure, remote workers are now insiders and pose significant risks, and costs, to companies.

  • January 27th 2022 at 16:36

Barracuda Expands Email and Endpoint Protection Capabilities in MSP Security Offerings

Barracuda enhances SKOUT Managed XDR offering via new integration with Barracuda Email Protection and alliance with SentinelOne for endpoint protection.
  • January 27th 2022 at 15:25

Log4j Proved Public Disclosure Still Helps Attackers

By Alex Haynes, Chief Information Security Officer, CDL
Disclosure also puts organizations in the awkward position of trying to mitigate a vulnerability without something like a vendor patch to do the job.

  • January 27th 2022 at 15:00

IT Pros May Use Cloud, But They Trust On-Prem More

By Edge Editors, Dark Reading
While opinions about the trustworthiness of the cloud are split, everyone believes that's where hackers will focus their efforts.

  • January 27th 2022 at 02:00

JFrog's New Tools Flag Malicious JavaScript Packages

By Dark Reading Staff, Dark Reading
The three open source tools flag malicious JavaScript packages before they are downloaded and installed from the npm package manager.

  • January 26th 2022 at 23:54

Millions of Routers, IoT Devices at Risk as Malware Source Code Surfaces on GitHub

By Jai Vijayan, Contributing Writer
"BotenaGo" contains exploits for more than 30 vulnerabilities in multiple vendor products and is being used to spread Mirai botnet malware, security vendor says.

  • January 26th 2022 at 23:30

ArmorCode Closes $11 Million Seed Funding Round

Company will use new funds to extend its AppSecOps platform capabilities.
  • January 26th 2022 at 23:25

OMB Issues Zero-Trust Strategy for Federal Agencies

By Dark Reading Staff, Dark Reading
Federal officials tout the strategy as a more proactive approach to securing government networks.

  • January 26th 2022 at 22:27

Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit

By Robert Lemos, Contributing Writer
The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit.

  • January 26th 2022 at 18:30

Cybersecurity Is Broken: How We Got Here & How to Start Fixing It

By David Ratner, CEO, Hyas
It's not just your imagination β€” malicious threats have exponentially increased organizational risk.

  • January 26th 2022 at 18:00

VPNLab.net Shuttered in Latest Spate of Global Takedowns

By Robert Lemos, Contributing Writer
Europol and 10 nations seized servers and disconnected the anonymous network allegedly used by many cybercriminals in the latest effort to hobble cybercrime groups.

  • January 26th 2022 at 15:43

Why It's Time to Rethink Incident Response

By J.R. Cunningham, Chief Security Officer, Nuspire
The incident response landscape has changed drastically, largely from shifting attitudes among insurance companies and, to some extent, business customers feeling the pain of security incidents.

  • January 26th 2022 at 15:00

Fighting Supply Chain Email Attacks With AI

By Tony Jarvis, Director of Enterprise Security, Asia Pacific and Japan, Darktrace
Supply chain account takeover is the most pressing issue facing email security today, but artificial intelligence can head off such attempts.

  • January 26th 2022 at 11:00

Revelstoke Launches With SOAR Platform to Automate SOCs

By Dark Reading Staff, Dark Reading
The SOAR platform helps CISOs automate the security operations center via a low-code/no-code platform.

  • January 26th 2022 at 00:39

Threat Actors Use Microsoft OneDrive for Command-and-Control in Attack Campaign

By Jai Vijayan, Contributing Writer
Signs hint at Russia's APT28, aka Fancy Bear, being behind the attacks, according to new research.

  • January 25th 2022 at 22:55

How Does Threat Modeling Work in Software Development?

By Archie Agarwal, Founder and CEO, ThreatModeler
Threat modeling should be a continuous process alongside development, not a one-time project.

  • January 25th 2022 at 22:35

Link11 Sets New Standards in DDoS Protection as Test Winner

In a recent performance test, cybersecurity provider Link11 was benchmarked against leading international security vendors and emerged as the winner. The study by Frost & Sullivan emphasized the importance of precise detection and speed in mitigating DDoS (Distributed Denial of Service) attacks.
  • January 25th 2022 at 22:15

8 Security Startups to Watch in 2022

By Kelly Sheridan, Senior Editor
Cloud security, API security, and incident response are among the issues up-and-coming security companies are working on.

  • January 25th 2022 at 18:10

Striking a Balance Between Cybersecurity Awareness and Anxiety

By Zack Schuler, Founder and CEO, NINJIO
Employees don't have to be paralyzed by fear to keep the company safe. They just have to understand what threats look like and how to stop them.

  • January 25th 2022 at 18:00

As IoT Attacks Increase, Experts Fear More Serious Threats

By Robert Lemos, Contributing Writer
Variants of the Mirai codebase are still a popular way to compromise and subvert Internet of Things devices, but experts fear more serious threats may be ahead.

  • January 25th 2022 at 16:36

4 Steps Toward Knowing Your Exploitable Attack Surface

Actionable steps you can take today to identify the true risk your organization faces β€” learn how to separate the exploitable vulnerabilities from the rest.
  • January 25th 2022 at 15:28

Cyber-Physical Security: What It Is and What You Should Do

By Morey Haber, Chief Security Officer, BeyondTrust
Ancillary installations like the Internet of Things, operational technology, and industrial control systems enable lots of great functionality, and they face most of the same risks as IT infrastructure.

  • January 25th 2022 at 15:00

Test Your Team, Not Just Your Disaster Recovery Plan

By Dave Russell, Vice President of Enterprise Strategy, Veeam Software
Cyberattacks imperil business continuity, but there is a much more common security threat β€” unintentional human error.

  • January 25th 2022 at 14:15

Tales from the Dark Web, Part 2: Ransomware Stacked With Distribution Services Creates the Perfect Storm

By Bart Lenaerts-Bergmans, Senior Product Marketing Manager, Threat Intelligence,CrowdStrike
Security professionals need to understand the actors behind ransomware threats, how they operate and how they continuously find new victims to target

  • January 25th 2022 at 00:29

Trickbot Injections Get Harder to Detect & Analyze

By Jai Vijayan, Contributing Writer
The authors of the infamous malware family have added measures for better protecting malicious code injections against inspection and research.

  • January 24th 2022 at 23:05

Registration for the (ISC)Β² Entry-Level Cybersecurity Certification Exam Pilot Program Is Now Open

New certification validates students' and career changers' foundational skills and helps kickstart their cybersecurity careers.
  • January 24th 2022 at 22:24

DHS Sounds Alarm on Potential for Major Russian Cyberattacks on US

By Dark Reading Staff, Dark Reading
Latest bulletin out of DHS advises state and local governments, critical infrastructure operators to be on alert.

  • January 24th 2022 at 21:34

The Case for Backing Up Source Code

By Kelly Sheridan, Senior Editor
As enterprise data security concerns grow, security experts urge businesses to back up their GitLab, GitHub, and BitBucket repositories.

  • January 24th 2022 at 21:20

Ransomware Operators Are Feeling the Heat

Ransomware has maintained its dominance the past few years; however, increased law enforcement attention may result in changes to how it looks in the future.
  • January 24th 2022 at 19:19

Are You Prepared to Defend Against a USB Attack?

By Benny Czarny, Founder & CEO, OPSWAT
Recent "BadUSB" attacks serve as a reminder of the big damage that small devices can cause.

  • January 24th 2022 at 15:00

A Level-Set on Russia-Borne Cyber Threats

By Tanner Johnson, Principal Analyst, Data Security, Omdia
As hostilities mount between Russia and Ukraine, new and more dangerous cyberattacks are likely to develop. Pinpointing sources and motives will remain elusive, but enterprises should prepare for an escalation in cyberspace.

  • January 24th 2022 at 14:00

IT Leaders Consider Security Tech a Part of Business Transformation

By Dark Reading Staff, Dark Reading
Security makes the top 10 list of technologies changing how organizations operate, an indicator of how information security is increasingly viewed as a strategic business initiative.

  • January 22nd 2022 at 02:00

Fraud Is On the Rise, and It's Going to Get Worse

By Edge Editors, Dark Reading
The acceleration of the digital transformation resulted in a surge of online transactions, greater adoption of digital payments, and increased fraud.

  • January 21st 2022 at 21:30
❌