FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Cerberus Sentinel Completes Acquisition of Creatrix, Inc.

U.S. cybersecurity services firm expands security and identity management services with woman-owned business.
  • June 2nd 2022 at 21:03

Research Reveals 75% of CISOs Are Worried Too Many Application Vulnerabilities Leak Into Production, Despite a Multi-Layered Security Approach

79% of CISOs say continuous runtime vulnerability management is an essential capability to keep up with the expanding complexity of modern multi-cloud environments.
  • June 2nd 2022 at 20:54

Intel Chipset Firmware Actively Targeted by Conti Group

By Dark Reading Staff, Dark Reading
Conti threat actors are betting chipset firmware is updated less frequently than other software β€” and winning big, analysts say.

  • June 2nd 2022 at 20:50

Gurucul Launches Cloud-Native SOC Platform Pushing the Boundaries of Next-Gen SIEM and XDR with Identity Threat Detection and Response

Gurucul automating threat detection, investigation and response (TDIR) with advanced analytics, comprehensive threat content, and a flexible enterprise risk engine for hybrid and multi-cloud environments.
  • June 2nd 2022 at 20:44

Phishers Having a Field Day on WhatsApp, Telegraph

By Dark Reading Staff, Dark Reading
A pair of phishing campaigns against users of WhatsApp and Telegram's Telegraph expose them to extortion, credential harvesting, and even account takeover.

  • June 2nd 2022 at 19:54

New Cloud Pricing and Products Proof of RSA’s Transformation

RSA pivots to exclusive focus. Identity is once again the β€˜beating heart’ of RSA.
  • June 2nd 2022 at 19:52

Microsoft Philanthropies Collaborates With WiCyS to Help Close the Cybersecurity Skills Gap

Microsoft Philanthropies is expanding its cybersecurity skills for jobs campaign to 23 countries and partnering with Women in CyberSecurity (WiCyS) to build a cybersecurity workforce that is not just larger but also more diverse.
  • June 2nd 2022 at 19:47

US Sanctions Force Evil Corp to Change Tactics

By Jai Vijayan, Contributing Writer, Dark Reading
The threat actor behind the notorious Dridex campaign has switched from using its exclusive credential-harvesting malware to a ransomware-as-a-service model, to make attribution harder.

  • June 2nd 2022 at 19:45

Neosec Introduces Expert Managed Threat Hunting Service for Detecting and Investigating API Abuse and Vulnerabilities

Neosec threat hunters from the 'ShadowHunt' team jumpstart the API Security process quickly and help build the knowledge in today's overstretched security teams.
  • June 2nd 2022 at 19:36

Turbulent Cyber Insurance Market Sees Rising Prices and Sinking Coverage

By Stephen Lawton, Contributing Writer
As insurers and brokers reckon with unexpected losses, they're charging more for policies and setting higher requirements.

  • June 2nd 2022 at 18:25

Building America's Cybersecurity Infrastructure

By Mike McNerney, Senior VP of Security, Resilience
The government is putting the right skills and expertise in place to fight the rising cyber threat.

  • June 2nd 2022 at 17:00

'Clipminer' Malware Actors Steal $1.7 Million Using Clipboard Hijacking

By Nathan Eddy, Contributing Writer, Dark Reading
The malware targets Windows users via Trojanized downloads of cracked or pirated software and then starts in on cryptocurrency mining and clipboard hijacking.

  • June 2nd 2022 at 15:00

Fighting Follina: Application Vulnerabilities and Detection Possibilities

By Joe Slowik, Senior Manager, Gigamon
Although organizations should perform proper risk analysis and patch as soon as practical after there's a fix for this vulnerability, defenders still have options before that's released.

  • June 2nd 2022 at 14:00

Neutralizing Novel Trickbot Attacks With AI

By Tony Jarvis, Director of Enterprise Security, Asia Pacific and Japan, Darktrace
Artificial intelligence technology can detect the latest wave of Trickbot ransomware and block the attack before it causes damage.

  • June 2nd 2022 at 13:00

Darktrace's Brianna Leddy on How Ransomware Groups Adapt to New Defenses

By Dark Reading Staff, Dark Reading
In this Tech Talk, Darktrace's Brianna Leddy and Dark Reading's Terry Sweeney discuss ways ransomware groups adapt their activities as enterprise security teams evolve their defenses and controls.

  • June 1st 2022 at 22:40

Managing Extended Software Supply Chain Risks

Supply chain woes have dominated headlines, but there's another type of supply chain that's also increasingly at risk: the cloud supply chain.
  • June 1st 2022 at 22:30

Hunting for Threats Using Network Traffic Flows

By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
SeclarityIO's NetworkSage platform analyzes network traffic data to identify attacks before they become real problems.

  • June 1st 2022 at 21:30

FluBot Android Malware Operation Disrupted, Infrastructure Seized

By Jai Vijayan, Contributing Writer, Dark Reading
Security researchers have described the malware as among the fastest-spreading mobile threats in recent years.

  • June 1st 2022 at 21:08

NetSPI's New Breach and Attack Simulation Enhancements Help Organizations Achieve Behavior-Based Threat Detection

Organizations leverage the platform-driven, human-delivered service to measure and continuously improve the efficacy of detective controls and MSSP coverage.
  • June 1st 2022 at 20:49

Netenrich Debuts Resolution Intelligence Secure Digital Operations Platform at RSA 2022

New operational analytics and AI/ML platform drives contextual intelligence and prioritized actions to anticipate risky behaviors, disrupt threats and insure business resilience.
  • June 1st 2022 at 20:46

12K Misconfigured Elasticsearch Buckets Ravaged by Extortionists

By Tara Seals, Managing Editor, News, Dark Reading
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.

  • June 1st 2022 at 20:45

Darktrace's David Masson on What Attacks on Critical Infrastructure Look Like

By Dark Reading Staff, Dark Reading
In this Tech Talk, Darktrace's David Masson and Dark Reading's Terry Sweeney discuss the rise of destructive attacks against critical infrastructure.

  • June 1st 2022 at 20:30

Feds Seize Domains Dealing Stolen Personal Data

By Dark Reading Staff, Dark Reading
WeLeakInfo.to and two related domains let users search data stolen in more than 10,000 different breaches.

  • June 1st 2022 at 20:28

Netskope Acquires WootCloud, Extending Zero Trust Capabilities to Enterprise IoT

Contextual Intelligence derived with machine learning helps customers identify, assess and remediate threats from IoT devices on their networks, achieving full visibility and control.
  • June 1st 2022 at 20:13

ReliaQuest to Acquire Digital Shadows

Combined company creates world-class security operations platform to offer customers unmatched visibility and detection to defend against threats.
  • June 1st 2022 at 20:09

Lookout Acquires SaferPass To Address The Rising Threat Of Identity Theft

Password management solution delivers proactive, seamless approach to protecting privacy and login credentials for consumers and businesses; Password Management market expected to reach $3 billion by 2026.
  • June 1st 2022 at 20:03

EnemyBot Puts Enterprises in the Crosshairs With Raft of '1-Day' Bugs

By Tara Seals, Managing Editor, News, Dark Reading
EnemyBot DDoS botnet is rapidly weaponizing security bugs disclosed in CMS systems like WordPress plug-ins, Android devices, commercial Web servers, and other enterprise applications.

  • June 1st 2022 at 19:20

Security at the Edge: Why It's Complicated

By Paul Kurtz, Chief Cybersecurity Adviser, Splunk Public Sector
Edge technology widens the attack surface by bringing data analysis closer to where it's collected. Now is the time for public and private sector groups to establish guidelines and identify security best-practices frameworks.

  • June 1st 2022 at 17:00

Consumer Reports Launches IoT Cybersecurity 'Nutrition Label'

By Dark Reading Staff, Dark Reading
Stalwart consumer advocacy group says it intends to educate people about cybersecurity and how to choose the safest products.

  • June 1st 2022 at 17:00

10 No-BS Tips for Building a Diverse and Dynamic Security Team

By Ericka Chickowski, Contributing Writer, Dark Reading
Advice from women and nonbinary security leaders on creating well-rounded security teams, stronger CISO leadership, and a more resilient industry.

  • June 1st 2022 at 16:55

Help Organizations to Mitigate Risk in Microsoft 365 with 'Vectra Protect'

Vectra offers a free of charge security assessment for your cloud tenant.
  • June 1st 2022 at 16:37

Ordr Secures $40 Million in Series C Funding to Answer Increased Demand for Connected Device Security

Rising threat of data breaches and ransomware attacks drives need for complete and accurate real-time information about devices and their risks.
  • June 1st 2022 at 16:33

StorCentric Launches Nexsan EZ-NAS -Network-Attached Storage for SMBs and Enterprise Edge Deployments

EZ-NAS also provides add-on data backup, cloud connector and ransomware anomaly detection.
  • June 1st 2022 at 16:29

Distinguishing AI Hype From Reality in SecOps

By Nash Borges, VP of Engineering and Data Science, Secureworks
AI and ML are important SecOps tools, but human involvement is still required.

  • June 1st 2022 at 14:00

3.6M MySQL Servers Found Exposed Online

By Dark Reading Staff, Dark Reading
Researchers from Shadowserver recommend removing the servers from the Internet to shrink external attack surface.

  • May 31st 2022 at 21:05

New Microsoft Zero-Day Attack Underway

By Jai Vijayan, Contributing Writer, Dark Reading
"Follina" vulnerability in Microsoft Support Diagnostic Tool (MSDT) affects all currently supported Windows versions and can be triggered via specially crafted Office documents.

  • May 31st 2022 at 20:37

Biometric Data Offers Added Security β€” But Don't Lose Sight of These Important Risks

By Tatiana Walk-Morris, Contributing Writer
With rising fraud, businesses are seeking authentication methods that are security- and user-friendly. But with that comes a few complications.

  • May 31st 2022 at 20:20

Fewer DDoS Attacks in 2021, Still Above Pre-Pandemic Levels

By Dark Reading Staff, Dark Reading
New research finds a rise in TCP acknowledgement (ACK) DDoS attacks, which rely on a smaller amount of traffic to disrupt targets.

  • May 31st 2022 at 17:44

How to Keep Your Enterprise Safe From Digital Supply Chain Attacks

By Ran Nahmias, Co-Founder & Chief Business Officer, Cyberpion
Digital supply chains are more vulnerable than ever; here's what you need to do to secure them.

  • May 31st 2022 at 14:00

6 Steps to Ensure Cyber Resilience

By Grayson Milbourne, Security Intelligence Director, OpenText Security Solutions
To minimize the impact of cyber incidents, organizations must be pragmatic and develop a strategy of resilience for dealing with break-ins, advanced malware, and data theft.

  • May 30th 2022 at 14:00

Critical OAS Bugs Open Industrial Systems to Takeover

By Jai Vijayan, Contributing Writer, Dark Reading
The most serious flaw gives attackers a way to remotely execute code on systems that many organizations use to move data in critical ICS environments, security vendor says.

  • May 28th 2022 at 14:00

Exposed Kubernetes Clusters, Kubelet Ports Can Be Abused in Cyberattacks

By Nathan Eddy, Contributing Writer, Dark Reading
Organizations must ensure their kubelets and related APIs aren’t inadvertently exposed or lack proper access control, offering an easy access point for malicious actors.

  • May 27th 2022 at 20:54

Space Force Expands Cyber Defense Operations

By Dark Reading Staff, Dark Reading
Space Force's Delta 6 cyber-defense group adds squadrons, updates legacy Satellite Control Network.

  • May 27th 2022 at 20:25

Scammer Behind $568M International Cybercrime Syndicate Gets 4 Years

By Dark Reading Staff, Dark Reading
The 14th defendant behind The Infraud Organization contraband marketplace has been sentenced, this time for one count of racketeering.

  • May 27th 2022 at 17:02

New Chaos Malware Variant Ditches Wiper for Encryption

By Tara Seals, Managing Editor, News, Dark Reading
The Chaos ransomware-builder was known for creating destructor malware that overwrote files and made them unrecoverable -- but the new Yashma version finally generates binaries that can encrypt files of all sizes.

  • May 27th 2022 at 16:07

ChromeLoader Malware Hijacks Browsers With ISO Files

By Nathan Eddy, Contributing Writer, Dark Reading
The malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.

  • May 27th 2022 at 15:49

Physical Security Teams' Impact Is Far-Reaching

By Tom Kopecky, Chief Strategy Officer and Co-Founder, Ontic
Here's how physical security teams can integrate with the business to identify better solutions to security problems.

  • May 27th 2022 at 14:00

Taking the Danger Out of IT/OT Convergence

By Dave Masson, Director of Enterprise Security, Darktrace
The Colonial Pipeline attack highlighted the risks of convergence. Unified security provides a safer way to proceed.

  • May 27th 2022 at 11:23

Microsoft Unveils Dev Box, a Workstation-as-a-Service

By Dark Reading Staff, Dark Reading
Microsoft Dev Box will make it easier for developers and hybrid teams to get up and running with workstations already preconfigured with required applications and tools.

  • May 26th 2022 at 22:54

Broadcom Snaps Up VMware in $61B Deal

By Dark Reading Staff, Dark Reading
Massive merger will put Broadcom's Symantec and VMware's Carbon Black under one roof.

  • May 26th 2022 at 22:27

Lacework Announces Layoffs, Restructuring

By Dark Reading Staff, Dark Reading
The cloud-security company blames "seismic" market shifts for shakeup.

  • May 26th 2022 at 20:46

Third-Party Scripts on Websites Present a 'Broad & Open' Attack Vector

By Jai Vijayan, Contributing Writer, Dark Reading
Nearly half of the world's largest websites use externally generated JavaScript that makes them ripe targets for cyberattackers interested in stealing data, skimming credit cards, and executing other malicious actions.

  • May 26th 2022 at 20:20

Twitter Fined $150M for Security Data Misuse

By Dark Reading Staff, Dark Reading
Twitter is charged with using emails and phone numbers ostensibly collected for account security to sell targeted ads.

  • May 26th 2022 at 18:00

The FDA's New Cybersecurity Guidance for Medical Devices Reminds Us That Safety & Security Go Hand in Hand

By Roman Kesler, VP of Research, Cybellum
The new draft guidance on premarket submissions incorporates quality system regulations and doubles down on a life-cycle approach to product security.

  • May 26th 2022 at 17:00
❌