FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Microsoft Flags Attack Targeting SQL Servers With Novel Approach

By Dark Reading Staff, Dark Reading
Attackers appear to have found a way around PowerShell monitoring by using a default utility instead.

  • May 18th 2022 at 16:31

2022: The Year Zero Trust Becomes Mainstream

It has never been more important for organizations of all sizes to prioritize securing their users and their infrastructure secrets with zero-trust network access.

  • May 18th 2022 at 16:29

How Threat Actors Are a Click Away From Becoming Quasi-APTs

By Omer Carmi, VP, Cyber Threat Intelligence, Cybersixgill
As demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.

  • May 18th 2022 at 14:00

Critical VMware Bug Exploits Continue, as Botnet Operators Jump In

By Tara Seals, Managing Editor, News, Dark Reading
A critical VMware bug tracked as CVE-2022-22954 continues to draw cybercriminal moths to its remote code-execution flame, with recent attacks focused on botnets and Log4Shell.

  • May 17th 2022 at 21:02

FBI: E-Tailers, Beware Web Injections for Scraping Credit-Card Data, Backdoors

By Becky Bracken, Editor, Dark Reading
Law enforcement is warning about a wave of Web injection attacks on US online retailers that are successfully stealing credit-card information from online checkout pages.

  • May 17th 2022 at 20:32

(ISC)Β² Unveils 100K in the UK Scheme to Expand the UK Cybersecurity Workforce with 100,000 Free Entry-Level Certification Exams and Education Opportunities

Multi-million-pound commitment will empower everyone from recent graduates to career changers to IT professionals in the UK to begin a successful career in cybersecurity.
  • May 17th 2022 at 20:04

New Venture Capital Fund Focuses on Emerging Cybersecurity Tech

By Dark Reading Staff, Dark Reading
The founders behind more than 90 cybersecurity firms have set up a $300 million investment fund.

  • May 17th 2022 at 20:04

Widespread Attack on WordPress Sites Targets Tatsu Builder Plug-in

By Dark Reading Staff, Dark Reading
A widespread attack is underway to exploit known RCE flaw in Tatsu Builder WordPress plug-in, according to a new report.

  • May 17th 2022 at 18:49

Training to Beat a Bad Cybersecurity Culture

By Curtis Franklin, Senior Analyst, Omdia
Creating a company culture for security may need to start by tearing down an anti-security culture.

  • May 17th 2022 at 18:02

Local Government's Guide to Minimizing the Risk of a Cyberattack

By John Anthony Smith, Chief Listening Officer, CEO, & Founder, Conversant Group/Fenix 24
Most local leaders lack cybersecurity resources so they don't know where their weaknesses are and which areas threat actors are most likely to target, with little focus or understanding of risk.

  • May 17th 2022 at 17:00

Google Cloud Aims to Share Its Vetted Open Source Ecosystem

By Robert Lemos, Contributing Writer, Dark Reading
The online giant analyzes, patches, and maintains its own versions of open source software, and now the company plans to give others access to its libraries and components as a subscription.

  • May 17th 2022 at 16:00

Barracuda Expands Cloud-Native SASE Platform to Protect Hybrid Cloud Deployments

Expansion includes new capabilities for hybrid deployment models and industrial Internet of things (IIoT) environments.
  • May 17th 2022 at 14:23

Qualys Adds Custom Assessment and Remediation to Its Cloud Platform

Provides security architects with access to custom scripts that can be natively integrated with other Qualys solutions.
  • May 17th 2022 at 14:16

YouMail Launches YouMail Protective Services for Carriers and Enterprises

Protect enterprises from the harm of unwanted voice-based phishing perpetrated by bad actors.
  • May 17th 2022 at 14:13

Ericom’s New ZTEdge Web Application Isolation Addresses Security Concerns Associated With Third-Party Contractor Application Access

Enables organizations to provide simple, secure access to the private and public cloud or Web-based corporate apps that workers using unmanaged devices need for their work.
  • May 17th 2022 at 14:10

Bitdefender Launches Identity Theft Protection Service for U.S. Consumers

New offering provides credit and financial monitoring along with identity protection and restoration.
  • May 17th 2022 at 14:06

How Mobile Networks Have Become a Front in the Battle for Ukraine

By Cathal Mc Daid, CTO, AdaptiveMobile Security, an Enea Company
Since 2014's annexation of Crimea, Ukrainian mobile operators have taken multiple, proactive steps to defend networks in the country and ensure their resilience.

  • May 17th 2022 at 14:00

TorchLight Expands Cybersecurity Services With MDR Sentinel in Partnership With Microsoft

MDR Sentinel expands TorchLight’s leading managed detection and response (MDR) services with turnkey SIEM and SOAR capabilities from Microsoft; TorchLight also announces it attains elite Microsoft Gold Partner Status
  • May 17th 2022 at 21:37

RF Technologies Releases Safe Place Staff Protection for Healthcare Settings

RFT is expanding the Safe Place hospital market security system to include staff protection.
  • May 16th 2022 at 21:43

50% of Orgs Rely on Email to Manage Security

By Dark Reading Staff, Dark Reading
Even with dedicated identity management tools at their disposal, many companies β€” smaller ones especially β€” are sticking with email and spreadsheets for handling permissions.

  • May 16th 2022 at 21:10

iPhones Open to Attack Even When Off, Researchers Say

By Dark Reading Staff, Dark Reading
Wireless chips that run when the iPhone iOS is shut down can be exploited.

  • May 16th 2022 at 20:37

Open Source Security Gets $30M Boost From Industry Heavy Hitters

By Robert Lemos, Contributing Writer, Dark Reading
Maintainers of open source software (OSS) will gain additional security tools for their own projects, while the developers who use OSS β€” and about 97% of software does β€” will gain more data on security.

  • May 16th 2022 at 19:05

You Can't Opt Out of Citizen Development

By Michael Bargury, CTO & Co-Founder, Zenity
To see why low-code/no-code is inevitable, we need to first understand how it finds its way into the enterprise.

  • May 16th 2022 at 18:32

NSA Cyber Chief Vows 'No Backdoors' in Quantum Encryption Standards

By Dark Reading Staff, Dark Reading
New quantum encryption standards will stand up to spy-snooping, NSA cybersecurity director said.

  • May 16th 2022 at 17:15

Name That Toon: Knives Out

By John Klossner, Cartoonist
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

  • May 16th 2022 at 17:00

Critical Zyxel Firewall Bug Under Active Attack After PoC Exploit Debut

By Tara Seals, Managing Editor, News, Dark Reading
Just one day after disclosure, cyberattackers are actively going after the command-injection/code-execution vulnerability in Zyxel's gear.

  • May 16th 2022 at 16:30

US Cyber Director: Forging a Cybersecurity Social Contract Is Not Optional

By Becky Bracken, Editor, Dark Reading
In a Black Hat Asia keynote fireside chat, US national cyber director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.

  • May 16th 2022 at 15:49

Me, My Digital Self, and I: Why Identity Is the Foundation of a Decentralized Future

By Richard Searle, Vice President of Confidential Computing, Fortanix
A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.

  • May 16th 2022 at 14:00

How to Turn a Coke Can Into an Eavesdropping Device

By Robert Lemos, Contributing Writer, Dark Reading
Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.

  • May 14th 2022 at 14:37

US Agrees to International Electronic Cybercrime Evidence Swap

By Dark Reading Staff, Dark Reading
The Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals.

  • May 13th 2022 at 20:18

CISO Shares Top Strategies to Communicate Security's Value to the Biz

By Tara Seals, Managing Editor, News, Dark Reading
In a keynote address at Black Hat Asia in Singapore this week, CISO and former NASA security engineer George Do discussed his go-to model for measuring security effectiveness – and getting others in the organization to listen.

  • May 13th 2022 at 20:16

Black Hat Asia: Democracy's Survival Depends on Taming Technology

By Becky Bracken, Editor, Dark Reading
The conference opens with stark outlook on the future of global democracy β€” currently squeezed between Silicon Valley and China.

  • May 13th 2022 at 19:45

Linux, OpenSSF Champion Plan to Improve Open Source Security

By Dark Reading Staff, Dark Reading
The White House and tech industry pledge $150 million over two years to boost open source resiliency and supply chain security.

  • May 13th 2022 at 17:05

Log4Shell Exploit Threatens Enterprise Data Lakes, AI Poisoning

By Tara Seals, Managing Editor, News, Dark Reading
A brand-new attack vector lays open enterprise data lakes, threatening grave consequences for AI use cases like telesurgery or autonomous cars.

  • May 13th 2022 at 14:59

Data Transformation: 3 Sessions to Attend at RSA 2022

By Liat Hayun, Co-Founder and CEO, Eureka Security
Three RSA 2022 sessions take deep dives into the security considerations around data cloud transformation.

  • May 13th 2022 at 14:00

How to Avoid Falling Victim to PayOrGrief's Next Rebrand

By Oakley Cox, Director of Analysis, Darktrace
The group that shut down the second largest city in Greece was not new but a relaunch of DoppelPaymer.

  • May 13th 2022 at 13:41

Transforming SQL Queries Bypasses WAF Security

By Robert Lemos, Contributing Writer, Dark Reading
A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.

  • May 12th 2022 at 23:20

Black Hat Asia: Firmware Supply Chain Woes Plague Device Security

By Tara Seals, Managing Editor, News, Dark Reading
The supply chain for firmware development is vast, convoluted, and growing out of control: patching security vulnerabilities can take up to two years. For cybercriminals, it's a veritable playground.

  • May 12th 2022 at 22:57

3 Predictors of Cybersecurity Startup Success

By Ed Amoroso, CEO, TAG Cyber LLC
Before investing, venture capitalists should consider a trio of business characteristics that seem to correlate with commercial success, based on meetings with over 2,000 cybersecurity startups.

  • May 12th 2022 at 20:49

Egnyte Enhances Program for Managed Service Providers

Enhancements to the program include unique packages, faster response time for invoicing, and dedicated training for new solutions.
  • May 12th 2022 at 20:31

StackHawk Raises $20.7 Million in Series B Funding for Developer-First Application and API Security Testing

Round co-led by Sapphire Ventures and Costanoa Ventures to accelerate product leadership and market growth.
  • May 12th 2022 at 20:24

Cloud Firm Appian Awarded $2B in Trade Secret Cyber-Theft Lawsuit

By Dark Reading Staff, Dark Reading
Cloud competitor found liable for breaking into Appian back-end systems to steal company secrets.

  • May 12th 2022 at 19:01

Needs Improvement: Scoring Biden's Cyber Executive Order

By Ali N. Khan, Solution Demand Manager, ReversingLabs
One year after it was issued, has President Biden's Cyber Executive Order had an impact?

  • May 12th 2022 at 17:00

How Can Your Business Defend Itself Against Fraud-as-a-Service?

By Bruno Farinelli, Fraud Analytics Manager, ClearSale
By understanding how FaaS works and following best practices to prevent it, your business can protect its customers, revenue, and brand reputation.

  • May 12th 2022 at 14:00

Known macOS Vulnerabilities Led Researcher to Root Out New Flaws

By Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
Researcher shares how he unearthed newer bugs in Apple's operating system by closer scrutiny of previous research, including vulnerabilities that came out of the Pwn2Own competition.

  • May 12th 2022 at 13:45

5 Years That Altered the Ransomware Landscape

By Jai Vijayan, Contributing Writer, Dark Reading
WannaCry continues to be a reminder of the challenges that organizations face dealing with the ransomware threat.

  • May 12th 2022 at 13:00

Google Will Use Mobile Devices to Thwart Phishing Attacks

By Dark Reading Staff, Dark Reading
In an effort to combat phishing, Google will allow Android phones and iPhones to be used as security keys.

  • May 12th 2022 at 11:51

Nokia Opens Cybersecurity Testing Lab

By Dark Reading Staff, Dark Reading
The end-to-end cybersecurity 5G testing lab will help identify and prevent cyberattacks on 5G networks.

  • May 12th 2022 at 12:31

On the Air With Dark Reading News Desk at Black Hat Asia 2022

By Dark Reading Staff, Dark Reading
This year's Black Hat Asia is hybrid, with some sessions broadcast on the virtual platform and others live on stage in Singapore. News Desk is available on-demand with prerecorded interviews.

  • May 12th 2022 at 11:41

PlainID Debuts Authorization-as-a-Service Platform

Platform powered by policy-based access control (PBAC).
  • May 11th 2022 at 21:18

Threat Actors Are Stealing Data Now to Decrypt When Quantum Computing Comes

By Jeffrey Schwartz, Contributing Writer
The technique, called store-now, decrypt later (SNDL), means organizations need to prepare now for post-quantum cryptography.

  • May 11th 2022 at 20:14

Ready, IAM, Fire: How Weak IAM Makes You a Target

Proper identity and access management configuration serves as an effective starting point for organizations looking to secure their cloud infrastructure.
  • May 11th 2022 at 20:05

Microsoft Simplifies Security Patching Process for Exchange Server

By Dark Reading Staff, Dark Reading
Delivering hotfixes and system updates separately will allow manual patching without requiring elevated permissions, Microsoft said.

  • May 11th 2022 at 18:50

Orca Security Unveils Context-Aware Shift Left Security to Identify and Prevent Cloud Application Security Issues Earlier

Enterprises can now ship more secure code to production by unifying security across software development, DevOps, and security teams.
  • May 11th 2022 at 18:29

NSA Warns Managed Service Providers Are Now Prime Targets for Cyberattacks

By Dark Reading Staff, Dark Reading
International cybersecurity authorities issue guidance to help information and communications service providers secure their networks.

  • May 11th 2022 at 17:28

Keeper Security Partners with SHI International for New Fully Managed IT Service (SHI Complete)

The partnership integrates Keeper's zero-knowledge, zero-trust enterprise password manager (EPM) into SHI Complete, a comprehensive, fully managed IT service for small and medium-sized businesses (SMBs).
  • May 11th 2022 at 17:27

Top 6 Security Threats Targeting Remote Workers

By Sakshi Udavant, Freelance Writer
Remote work is here to stay, which means security teams must ensure that security extends beyond corporate devices and protects employees wherever they are.

  • May 11th 2022 at 17:13
❌