FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

How Proactive Threat Hunting Redefines the Zero-Day

By Nick Lowe, Director, Falcon OverWatch, CrowdStrike
Threat hunters are continuously and actively scouring the environment for clues of a malicious incursion.

  • February 16th 2022 at 23:25

4 Keys to Bridging the Gap Between Security and Developers

By Om Vyas, CPO & Co-Founder, oak9
Security personnel's priority is protecting the organization. Developers are trying to hit tight timelines. Here's how both groups can get get their needs met.

  • February 17th 2022 at 15:00

Russian Actors Targeting US Defense Contractors in Cyber Espionage Campaign, CISA Warns

By Jai Vijayan, Contributing Writer
Sensitive data stolen on US weapons development and deployment, product development, foreign partnerships, contracts, and more.

  • February 16th 2022 at 23:33

SentinelOne Launches DataSet

With the launch, SentinelOne has appointed Rahul Ravulur to lead the new data analytics solution.
  • February 16th 2022 at 22:30

FBI: Cybercriminals Using Virtual Meeting Platforms to Wage BEC Attacks

By Dark Reading Staff, Dark Reading
Attackers are increasingly executing business email compromise (BEC) scams by impersonation of executives via virtual meetings.

  • February 16th 2022 at 22:09

MITRE Engenuity Center for Threat-Informed Defense Unveils New Affiliate Program

Program showcases industry adoption of the center's R&D resources to increase community awareness and advance threat-informed defense.
  • February 16th 2022 at 22:00

Cybercriminals Have Changed Tactics

Truesec's annual Threat Intelligence Report for 2022 shows a sharp increase in the number of cyber attacks against organizations in Scandinavia and worldwide.
  • February 16th 2022 at 21:30

Kryptowire Receives Funding from USVP and Crosslink Capital

New funding will be used to accelerate the adoption of intrusion-free mobile security into targeted verticals.
  • February 16th 2022 at 21:00

Pixelating Text Leads to Information Leakage, Warns Firm

By Robert Lemos, Contributing Writer
Blurring text isn't enough to obscure sensitive information. An offensive-security firm releases a tool showing how information can still be exposed.

  • February 16th 2022 at 18:30

How to Fight the Novel Software Supply Chain Attacks of Tomorrow

By Justin Fier, Director for Cyber Intelligence & Analytics at Darktrace
In the past year, attackers have focused on the lucrative supply chain. Organizations need to defend against such attacks, even inside their perimeters.

  • February 17th 2022 at 14:30

Pixelating Text Leads to Information Leakage, Warns Firm

By Robert Lemos, Contributing Writer
Blurring text isn't enough to obscure sensitive information. An offensive-security firm releases a tool showing how information can still be exposed.

  • February 16th 2022 at 18:30

SANS Institute Launches Cybersecurity Education Scholarship for HBCU Students and Alumni

Applications will be open throughout all Black History Month and accepted until March 1, 2022.
  • February 16th 2022 at 18:00

Laminar Announces General Availability of Cloud Data Security Platform

Solution monitors and protects public cloud data.
  • February 16th 2022 at 17:30

DoD Awards Attivo Networks Contract for Ransomware Mitigation

Contract extends Attivo’s strategic support to the three major branches of the DoD – Air Force, Army, and Navy.
  • February 16th 2022 at 17:10

Where AI Falls Down in Cybersecurity

By Pam Baker, Contributing Writer
Almost every cybersecurity product claims to incorporate AI. Sometimes, though, that's a mirage.

  • February 16th 2022 at 16:35

Hybrid Work Accelerated Fraud; Now, CSOs Are Taking a Seat at the Executive Table

By Chaim Mazal, Senior VP of Technology and CISO, Kandji
The days of security as a second-class citizen are over.

  • February 16th 2022 at 15:00

Be Flexible About Where People Work β€” But Not on Data Privacy

By Jessica Walton, Director for the Display Materials & Systems Division, 3M
If your policies don't keep up with your work models, your company's sensitive information could be at risk.

  • February 16th 2022 at 14:30

Infineon’s Latest Chip Tackles Post-Quantum Security

By Dark Reading Staff, Dark Reading
Infineon’s latest Trusted Platform Module has a mechanism to still update device firmware after quantum computing breaks existing algorithms.

  • February 16th 2022 at 12:38

Securonix Secures Over $1B in Growth Investment From Vista Equity

By Jai Vijayan, Contributing Writer
Deal is the second one topping $1 billion since November and sets the stage for what could be another record-breaking year for investment in the cybersecurity industry.

  • February 15th 2022 at 23:16

Akamai To Acquire Linode

Akamai will discuss the acquisition on its Q4 and year end 2021 financial results conference call today, February 15, at 4:30 p.m. ET.
  • February 15th 2022 at 23:10

FBI, US Secret Service Issue Mitigations for BlackByte Ransomware

By Dark Reading Staff, Dark Reading
Joint Cybersecurity Advisory from federal law enforcement includes indicators of compromise associated with the ransomware variant.

  • February 15th 2022 at 22:33

Machine Learning in 2022: Data Threats and Backdoors?

By Robert Lemos, Contributing Writer
While research illustrates some sly threats, experts say attackers will likely focus on data exposure and finding ways to fool algorithms.

  • February 15th 2022 at 22:10

How Nonprofits Can Evade Ransomware Attacks

By Kat Friedrich, Contributing Writer
Just as small businesses can't be complacent, nonprofits also need to prepare for cyberattacks.

  • February 15th 2022 at 21:45

Red Canary Launches Partner Program

Red Canary Partner Connect will unite a diverse ecosystem of incident response, risk and managed services partners.
  • February 15th 2022 at 20:00

The Unsettling Reason Why Your Help Desk May Be Your Greatest Security Vulnerability

A rogue help-desk employee could gain access to user accounts through unauthorized password resets. It's time to bring zero trust to the help desk.
  • February 15th 2022 at 18:42

3 Critical Software Development Security Trends and Best Practices

By Chetan Conikee, Chief Technology Officer, ShiftLeft, Inc.
Organizations should focus on proactive, development-based approaches to security.

  • February 15th 2022 at 18:00

Netacea Announces $12M Series A Investment

New funding will be used to grow Netacea’s presence in US and UK bot mitigation markets.
  • February 15th 2022 at 18:00

2022 Executive Women's Forum Annual Conference to Be In Person for 20th Anniversary Celebration

This year’s theme is β€œCelebrating 20 Years of Building Women Leaders.”
  • February 15th 2022 at 17:30

NYU Tandon Launches Chief Information Security Officer Program

Featuring in-depth core sessions and topical electives, the nine-month program takes a risk-based approach to cyber strategy.
  • February 15th 2022 at 17:20

Bugcrowd Announces Real-Time Customer Visibility and Improved Crowd-matching For Penetration Testing as a Service Solution

New features include a rich dashboard with customer visibility into the progress of methodology-based pen tests.
  • February 15th 2022 at 17:10

CompTIA ISAO and IT-ISAC Urge Technology Companies to Elevate Cybersecurity Monitoring, Readiness in Response to Rising Geopolitical Tensions

The CompTIA ISAO and IT-ISAC teams will continue to provide updated reporting and share new threat information as it becomes available.
  • February 15th 2022 at 17:00

How to Make Cybersecurity Effective and Invisible

By Sudhir Reddy, Executive Vice President & Group CIO, Capgemini
Cybersecurity should be a shield that protects the business, not a barrier that holds it back.

  • February 15th 2022 at 15:00

San Francisco 49ers Hit With a Ransomware Attack

By Dark Reading Staff, Dark Reading
AP report says NFL team organization acknowledged a "network security incident" that affected its corporate IT network.

  • February 14th 2022 at 22:28

8 of the Biggest Cybersecurity M&As & Investment Deals in 2021

By Jai Vijayan, Contributing Writer
There were more financial deals in cybersecurity last year than in any previous year.

  • February 14th 2022 at 21:15

(ISC)Β² to Pilot Online Proctored Exams for CISSP in U.S., U.K. and Singapore

Second pilot program will assess feasibility and security of offering online exams to increase global accessibility for certification candidates.
  • February 14th 2022 at 15:52

LogRhythm Unveils New Brand Identity

Announcement comes in advance of new technology offerings in 2022.
  • February 14th 2022 at 15:49

Could Biology Hold the Clue to Better Cybersecurity?

By Samuel Greengard, Freelance Writer
Sophisticated malware attacks underscore the need for a more dynamic security framework, inspired by biological concepts.

  • February 14th 2022 at 15:10

Ransomware Threat Intel: You're Soaking In It!

By Hrvoje Samardžić, Threat Intelligence Researcher, ReversingLabs
Organizations need to improve their ability to detect and prevent emerging ransomware attacks.

  • February 14th 2022 at 15:00

5 Reasons Why Civil Discourse Is Good for Security

By Joshua Goldfarb, Director of Product Management at F5
A cordial environment helps valuable input reach those who can use it to improve the organization's security posture.

  • February 14th 2022 at 14:45

DDoS Attacks on a Tear in Q4 2021

By Dark Reading Staff, Dark Reading
New data from Kaspersky shows distributed denial-of-service attacks increased by more than 50% in the fourth quarter of last year compared with the third quarter.

  • February 11th 2022 at 22:23

Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics

New capabilities added to Aviatrix ThreatIQ improve enterprise security posture to reduce business risk.
  • February 11th 2022 at 22:17

Seven Key Ingredients to Effective Incident Response

By Tim Parisi, director of incident response services, CrowdStrike
With ransomware attacks on the rise, organizations need to upgrade their incident response processes to improve speed and precision.

  • February 11th 2022 at 21:12

Google Paid Record $8.7 Million to Bug Hunters in 2021

By Jai Vijayan, Contributing Writer
Company's Chrome and Android technologies continued to be target-rich environments for security researchers from around the world.

  • February 11th 2022 at 20:35

BlackBerry Seeks to Restore Its Past Glory With Services Push

By Andrada Fiscutean, Contributing Writer
Selling security software might prove easier than selling phones, but can BlackBerry outsmart its competition?

  • February 11th 2022 at 15:25

What CISOs Should Tell the Board About Log4j

By Liran Tancman, CEO & Co-Founder, Rezilion
It's time for a reset with the board of directors. Very few have a dedicated, board-level cybersecurity committee, which means cybersecurity isn't viewed as a critical executive function.

  • February 11th 2022 at 15:00

Retailers' Offboarding Procedures Leave Potential Risks

By Tatiana Walk-Morris, Contributing Writer
IT teams need to consider unforeseen threats to avoid violating privacy regulations and supplier contracts.

  • February 10th 2022 at 23:00

Credential-Stuffing Attacks on Remote Windows Systems Took Off in 2021

By Robert Lemos, Contributing Writer
Password-guessing became last year's weapon of choice, as attackers attempted to brute-force vulnerable Remote Desktop Protocol (RDP) servers, SQL databases, and SMB file shares.

  • February 10th 2022 at 22:35

Apple Releases Security Update for Webkit Flaw

By Dark Reading Staff, Dark Reading
A Webkit use-after-free vulnerability in iOS, iPadOS, Monterey, and Safari may already have been exploited, Apple said in a security advisory issued today.

  • February 10th 2022 at 21:49

Defense Contractors Need to Check Their Six

By Dark Reading Staff, Dark Reading
Companies overall met government standards, but poor credential management left vulnerabilities.

  • February 10th 2022 at 20:50

Dynatrace Adds Real-Time Attack Detection and Blocking, Advancing Cloud Application Security

Application Security Module unifies multicloud observability and advanced AIOps with real-time vulnerability management and defense.
  • February 10th 2022 at 19:15

Dynatrace Launches DevSecOps Automation Alliance Partner Program

Program enables alliance and solution partners to extend the capabilities of their DevSecOps offerings through seamless integrations with the Dynatrace platform.
  • February 10th 2022 at 19:05

Orca Security Adds Expanded CIEM Capabilities and Multi-Cloud Security Score to Cloud Platform

Expands cloud infrastructure entitlement management capabilities, adds cloud security benchmarking, and support for Kubernetes compliance frameworks.
  • February 10th 2022 at 19:00

Allure Security Raises $6.8 Million Seed Funding Round

Funding led by Gutbrain Ventures.
  • February 10th 2022 at 18:30

Titaniam Secures $6 Million in Seed Funding

Funding round led by Refinery Ventures, with participation from Fusion Fund and Shasta Ventures.
  • February 10th 2022 at 18:00

Data Transparency Hasn't Made Us Safer Yet. Can It Uncover Breach Causality?

By Michael Roytman, Chief Data Scientist, Kenna Security
Advanced machine learning models within an XDR framework could uncover what actually causes breaches, but first we need better data transparency.

  • February 10th 2022 at 15:00

Bot Marketplaces as a Source of Future Data Breaches

By Fahmida Y. Rashid, Features Editor, Dark Reading
Of the four bot marketplaces Cognyte analyzed, the Russian Market is the most dominant, but the others are all active, updated daily, and well-known, too.

  • February 10th 2022 at 13:38

Putting AI to Practical Use in Cybersecurity

By Pam Baker, Contributing Writer
Almost every cybersecurity product has an AI component. Here is where it's working in the real world.

  • February 10th 2022 at 02:00

Experts: Several CVEs From Microsoft's February Security Update Require Prompt Attention

By Jai Vijayan, Contributing Writer
Microsoft's release of relatively sparse vulnerability information makes it difficult for organizations to prioritize mitigation efforts, security experts say.

  • February 9th 2022 at 23:00

Linux Malware on the Rise

By Robert Lemos, Contributing Writer
Ransomware, cryptojacking, and a cracked version of the penetration-testing tool Cobalt Strike have increasingly targeted Linux in multicloud infrastructure, report states.

  • February 9th 2022 at 22:20
❌