FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Deadbolt Ransomware Targeting QNAP NAS Devices

QNAP is urging customers of its NAS products to update QTS and avoid exposing the devices to the Internet.

  • May 19th 2022 at 21:37

Pro-Russian Information Operations Escalate in Ukraine War

By Jai Vijayan, Contributing Writer, Dark Reading
In the three months since the war started, Russian operatives and those allied with the nation's interests have unleashed a deluge of disinformation and fake news to try and sow fear and confusion in Ukraine, security vendor says.

  • May 19th 2022 at 19:41

DoJ Won't Charge 'Good Faith' Security Researchers

By Dark Reading Staff, Dark Reading
Revised policy means security analysts won't be charged under the Computer Fraud and Abuse Act.

  • May 19th 2022 at 19:29

Majority of Kubernetes API Servers Exposed to the Public Internet

By Ericka Chickowski, Contributing Writer, Dark Reading
Shadowserver Foundation researchers find 380,000 open Kubernetes API servers.

  • May 19th 2022 at 18:39

Dig Exits Stealth With $11M for Cloud Data Detection and Response Solution

CrowdStrike and CyberArk invest in Dig's seed round, which was led by Team8, alongside Merlin Ventures and chairs of MongoDB and Exabeam.
  • May 19th 2022 at 18:32

6 Scary Tactics Used in Mobile App Attacks

By Storm Swendsboe, Director of Intelligence, SafeGuard Cyber
Mobile attacks have been going on for many years, but the threat is rapidly evolving as more sophisticated malware families with novel features enter the scene.

  • May 19th 2022 at 14:00

Phishing Attacks for Initial Access Surged 54% in Q1

By Jai Vijayan, Contributing Writer, Dark Reading
For the first time in a year, security incidents involving email compromises surpassed ransomware incidents, a new analysis shows.

  • May 19th 2022 at 13:01

MITRE Creates Framework for Supply Chain Security

By Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
System of Trust includes data-driven metrics for evaluating the integrity of software, services, and suppliers.

  • May 18th 2022 at 21:29

CISA to Federal Agencies: Patch VMware Products Now or Take Them Offline

By Dark Reading Staff, Dark Reading
Last month attackers quickly reverse-engineered VMware patches to launch RCE attacks. CISA warns it's going to happen again.

  • May 18th 2022 at 21:05

How Pwn2Own Made Bug Hunting a Real Sport

By Andrada Fiscutean, Contributing Writer, Dark Reading
From a scrappy contest where hackers tried to win laptops, Pwn2Own has grown into a premier event that has helped normalize bug hunting.

  • May 18th 2022 at 20:19

Lacework Integrates Kubernetes Features to Enhance Security Across Multi-Cloud Environments

Polygraph Data Platform adds Kubernetes audit log monitoring, integration with Kubernetes admission controller, and Infrastructure as Code (IaC) security to help seamlessly integrate security into developer workflows.
  • May 18th 2022 at 19:15

CISA: Unpatched F5 BIG-IP Devices Under Active Attack

By Dark Reading Staff, Dark Reading
Publicly released proof-of-concept exploits are supercharging attacks against unpatched systems, CISA warns.

  • May 18th 2022 at 17:46

The Industry Must Better Secure Open Source Code From Threat Actors

By Andrew Useckas, Chief Technology Officer and Co-Founder, ThreatX
Build security in up front to secure open source code at the foundational level. Apply security controls, have engineering teams test, do code review, and use attacker-centric behavioral analytics to mitigate threats.

  • May 18th 2022 at 17:00

Microsoft Flags Attack Targeting SQL Servers With Novel Approach

By Dark Reading Staff, Dark Reading
Attackers appear to have found a way around PowerShell monitoring by using a default utility instead.

  • May 18th 2022 at 16:31

2022: The Year Zero Trust Becomes Mainstream

It has never been more important for organizations of all sizes to prioritize securing their users and their infrastructure secrets with zero-trust network access.

  • May 18th 2022 at 16:29

How Threat Actors Are a Click Away From Becoming Quasi-APTs

By Omer Carmi, VP, Cyber Threat Intelligence, Cybersixgill
As demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.

  • May 18th 2022 at 14:00

Critical VMware Bug Exploits Continue, as Botnet Operators Jump In

By Tara Seals, Managing Editor, News, Dark Reading
A critical VMware bug tracked as CVE-2022-22954 continues to draw cybercriminal moths to its remote code-execution flame, with recent attacks focused on botnets and Log4Shell.

  • May 17th 2022 at 21:02

FBI: E-Tailers, Beware Web Injections for Scraping Credit-Card Data, Backdoors

By Becky Bracken, Editor, Dark Reading
Law enforcement is warning about a wave of Web injection attacks on US online retailers that are successfully stealing credit-card information from online checkout pages.

  • May 17th 2022 at 20:32

(ISC)Β² Unveils 100K in the UK Scheme to Expand the UK Cybersecurity Workforce with 100,000 Free Entry-Level Certification Exams and Education Opportunities

Multi-million-pound commitment will empower everyone from recent graduates to career changers to IT professionals in the UK to begin a successful career in cybersecurity.
  • May 17th 2022 at 20:04

New Venture Capital Fund Focuses on Emerging Cybersecurity Tech

By Dark Reading Staff, Dark Reading
The founders behind more than 90 cybersecurity firms have set up a $300 million investment fund.

  • May 17th 2022 at 20:04

Widespread Attack on WordPress Sites Targets Tatsu Builder Plug-in

By Dark Reading Staff, Dark Reading
A widespread attack is underway to exploit known RCE flaw in Tatsu Builder WordPress plug-in, according to a new report.

  • May 17th 2022 at 18:49

Training to Beat a Bad Cybersecurity Culture

By Curtis Franklin, Senior Analyst, Omdia
Creating a company culture for security may need to start by tearing down an anti-security culture.

  • May 17th 2022 at 18:02

Local Government's Guide to Minimizing the Risk of a Cyberattack

By John Anthony Smith, Chief Listening Officer, CEO, & Founder, Conversant Group/Fenix 24
Most local leaders lack cybersecurity resources so they don't know where their weaknesses are and which areas threat actors are most likely to target, with little focus or understanding of risk.

  • May 17th 2022 at 17:00

Google Cloud Aims to Share Its Vetted Open Source Ecosystem

By Robert Lemos, Contributing Writer, Dark Reading
The online giant analyzes, patches, and maintains its own versions of open source software, and now the company plans to give others access to its libraries and components as a subscription.

  • May 17th 2022 at 16:00

Barracuda Expands Cloud-Native SASE Platform to Protect Hybrid Cloud Deployments

Expansion includes new capabilities for hybrid deployment models and industrial Internet of things (IIoT) environments.
  • May 17th 2022 at 14:23

Qualys Adds Custom Assessment and Remediation to Its Cloud Platform

Provides security architects with access to custom scripts that can be natively integrated with other Qualys solutions.
  • May 17th 2022 at 14:16

YouMail Launches YouMail Protective Services for Carriers and Enterprises

Protect enterprises from the harm of unwanted voice-based phishing perpetrated by bad actors.
  • May 17th 2022 at 14:13

Ericom’s New ZTEdge Web Application Isolation Addresses Security Concerns Associated With Third-Party Contractor Application Access

Enables organizations to provide simple, secure access to the private and public cloud or Web-based corporate apps that workers using unmanaged devices need for their work.
  • May 17th 2022 at 14:10

Bitdefender Launches Identity Theft Protection Service for U.S. Consumers

New offering provides credit and financial monitoring along with identity protection and restoration.
  • May 17th 2022 at 14:06

How Mobile Networks Have Become a Front in the Battle for Ukraine

By Cathal Mc Daid, CTO, AdaptiveMobile Security, an Enea Company
Since 2014's annexation of Crimea, Ukrainian mobile operators have taken multiple, proactive steps to defend networks in the country and ensure their resilience.

  • May 17th 2022 at 14:00

TorchLight Expands Cybersecurity Services With MDR Sentinel in Partnership With Microsoft

MDR Sentinel expands TorchLight’s leading managed detection and response (MDR) services with turnkey SIEM and SOAR capabilities from Microsoft; TorchLight also announces it attains elite Microsoft Gold Partner Status
  • May 17th 2022 at 21:37

RF Technologies Releases Safe Place Staff Protection for Healthcare Settings

RFT is expanding the Safe Place hospital market security system to include staff protection.
  • May 16th 2022 at 21:43

50% of Orgs Rely on Email to Manage Security

By Dark Reading Staff, Dark Reading
Even with dedicated identity management tools at their disposal, many companies β€” smaller ones especially β€” are sticking with email and spreadsheets for handling permissions.

  • May 16th 2022 at 21:10

iPhones Open to Attack Even When Off, Researchers Say

By Dark Reading Staff, Dark Reading
Wireless chips that run when the iPhone iOS is shut down can be exploited.

  • May 16th 2022 at 20:37

Open Source Security Gets $30M Boost From Industry Heavy Hitters

By Robert Lemos, Contributing Writer, Dark Reading
Maintainers of open source software (OSS) will gain additional security tools for their own projects, while the developers who use OSS β€” and about 97% of software does β€” will gain more data on security.

  • May 16th 2022 at 19:05

You Can't Opt Out of Citizen Development

By Michael Bargury, CTO & Co-Founder, Zenity
To see why low-code/no-code is inevitable, we need to first understand how it finds its way into the enterprise.

  • May 16th 2022 at 18:32

NSA Cyber Chief Vows 'No Backdoors' in Quantum Encryption Standards

By Dark Reading Staff, Dark Reading
New quantum encryption standards will stand up to spy-snooping, NSA cybersecurity director said.

  • May 16th 2022 at 17:15

Name That Toon: Knives Out

By John Klossner, Cartoonist
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

  • May 16th 2022 at 17:00

Critical Zyxel Firewall Bug Under Active Attack After PoC Exploit Debut

By Tara Seals, Managing Editor, News, Dark Reading
Just one day after disclosure, cyberattackers are actively going after the command-injection/code-execution vulnerability in Zyxel's gear.

  • May 16th 2022 at 16:30

US Cyber Director: Forging a Cybersecurity Social Contract Is Not Optional

By Becky Bracken, Editor, Dark Reading
In a Black Hat Asia keynote fireside chat, US national cyber director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.

  • May 16th 2022 at 15:49

Me, My Digital Self, and I: Why Identity Is the Foundation of a Decentralized Future

By Richard Searle, Vice President of Confidential Computing, Fortanix
A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.

  • May 16th 2022 at 14:00

How to Turn a Coke Can Into an Eavesdropping Device

By Robert Lemos, Contributing Writer, Dark Reading
Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.

  • May 14th 2022 at 14:37

US Agrees to International Electronic Cybercrime Evidence Swap

By Dark Reading Staff, Dark Reading
The Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals.

  • May 13th 2022 at 20:18

CISO Shares Top Strategies to Communicate Security's Value to the Biz

By Tara Seals, Managing Editor, News, Dark Reading
In a keynote address at Black Hat Asia in Singapore this week, CISO and former NASA security engineer George Do discussed his go-to model for measuring security effectiveness – and getting others in the organization to listen.

  • May 13th 2022 at 20:16

Black Hat Asia: Democracy's Survival Depends on Taming Technology

By Becky Bracken, Editor, Dark Reading
The conference opens with stark outlook on the future of global democracy β€” currently squeezed between Silicon Valley and China.

  • May 13th 2022 at 19:45

Linux, OpenSSF Champion Plan to Improve Open Source Security

By Dark Reading Staff, Dark Reading
The White House and tech industry pledge $150 million over two years to boost open source resiliency and supply chain security.

  • May 13th 2022 at 17:05

Log4Shell Exploit Threatens Enterprise Data Lakes, AI Poisoning

By Tara Seals, Managing Editor, News, Dark Reading
A brand-new attack vector lays open enterprise data lakes, threatening grave consequences for AI use cases like telesurgery or autonomous cars.

  • May 13th 2022 at 14:59

Data Transformation: 3 Sessions to Attend at RSA 2022

By Liat Hayun, Co-Founder and CEO, Eureka Security
Three RSA 2022 sessions take deep dives into the security considerations around data cloud transformation.

  • May 13th 2022 at 14:00

How to Avoid Falling Victim to PayOrGrief's Next Rebrand

By Oakley Cox, Director of Analysis, Darktrace
The group that shut down the second largest city in Greece was not new but a relaunch of DoppelPaymer.

  • May 13th 2022 at 13:41

Transforming SQL Queries Bypasses WAF Security

By Robert Lemos, Contributing Writer, Dark Reading
A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.

  • May 12th 2022 at 23:20

Black Hat Asia: Firmware Supply Chain Woes Plague Device Security

By Tara Seals, Managing Editor, News, Dark Reading
The supply chain for firmware development is vast, convoluted, and growing out of control: patching security vulnerabilities can take up to two years. For cybercriminals, it's a veritable playground.

  • May 12th 2022 at 22:57

3 Predictors of Cybersecurity Startup Success

By Ed Amoroso, CEO, TAG Cyber LLC
Before investing, venture capitalists should consider a trio of business characteristics that seem to correlate with commercial success, based on meetings with over 2,000 cybersecurity startups.

  • May 12th 2022 at 20:49

Egnyte Enhances Program for Managed Service Providers

Enhancements to the program include unique packages, faster response time for invoicing, and dedicated training for new solutions.
  • May 12th 2022 at 20:31

StackHawk Raises $20.7 Million in Series B Funding for Developer-First Application and API Security Testing

Round co-led by Sapphire Ventures and Costanoa Ventures to accelerate product leadership and market growth.
  • May 12th 2022 at 20:24

Cloud Firm Appian Awarded $2B in Trade Secret Cyber-Theft Lawsuit

By Dark Reading Staff, Dark Reading
Cloud competitor found liable for breaking into Appian back-end systems to steal company secrets.

  • May 12th 2022 at 19:01

Needs Improvement: Scoring Biden's Cyber Executive Order

By Ali N. Khan, Solution Demand Manager, ReversingLabs
One year after it was issued, has President Biden's Cyber Executive Order had an impact?

  • May 12th 2022 at 17:00

How Can Your Business Defend Itself Against Fraud-as-a-Service?

By Bruno Farinelli, Fraud Analytics Manager, ClearSale
By understanding how FaaS works and following best practices to prevent it, your business can protect its customers, revenue, and brand reputation.

  • May 12th 2022 at 14:00

Known macOS Vulnerabilities Led Researcher to Root Out New Flaws

By Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
Researcher shares how he unearthed newer bugs in Apple's operating system by closer scrutiny of previous research, including vulnerabilities that came out of the Pwn2Own competition.

  • May 12th 2022 at 13:45

5 Years That Altered the Ransomware Landscape

By Jai Vijayan, Contributing Writer, Dark Reading
WannaCry continues to be a reminder of the challenges that organizations face dealing with the ransomware threat.

  • May 12th 2022 at 13:00
❌