FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Shadow IT Spurs 1 in 3 Cyberattacks

By Dark Reading Staff, Dark Reading
Cerby platform emerges from stealth mode to let users automate security for applications outside of the standard IT purview.

  • June 27th 2022 at 18:55

Thrive Acquires DSM

DSM is now the third acquisition by Thrive in Florida in the past six months.
  • June 27th 2022 at 14:31

It's a Race to Secure the Software Supply Chain β€” Have You Already Stumbled?

By Kayla Underkoffler, Senior Security Technologist, HackerOne
If you haven't properly addressed the issue, you're already behind. But even if you've had a false start, it's never too late to get back up.

  • June 27th 2022 at 14:00

Threat Intelligence Services Are Universally Valued by IT Staff

By Dark Reading Staff, Dark Reading
Most of those surveyed are concerned about AI-based attacks and deepfakes but suggest that their organizations are ready.

  • June 24th 2022 at 23:25

Why We're Getting Vulnerability Management Wrong

Security is wasting time and resources patching low or no risk bugs. In this post, we examine why security practitioners need to rethink vulnerability management.
  • June 24th 2022 at 21:32

APT Groups Swarming on VMware Servers with Log4Shell

By Dark Reading Staff, Dark Reading
CISA tells organizations running VMware servers without Log4Shell mitigations to assume compromise.

  • June 24th 2022 at 18:55

Only 3% of Open Source Software Bugs Are Actually Attackable, Researchers Say

By Ericka Chickowski, Contributing Writer, Dark Reading
A new study says 97% of open source vulnerabilities linked to software supply chain risks are not attackable β€” but is "attackability" the best method for prioritizing bugs?

  • June 24th 2022 at 16:23

7 Steps to Stronger SaaS Security

By John Whelan, Senior Director of Product Management, AppOmni
Continuous monitoring is key to keeping up with software-as-a-service changes, but that's not all you'll need to get better visibility into your SaaS security.

  • June 24th 2022 at 14:00

The Cybersecurity Talent Shortage Is a Myth

By Ricardo Villadiego, Founder and CEO of Lumu
We have a tech innovation problem, not a staff retention (or recruitment) problem.

  • June 24th 2022 at 12:25

Without Conti on the Scene, LockBit 2.0 Leads Ransomware Attacks

By Dark Reading Staff, Dark Reading
Analysts say an 18% drop in ransomware attacks seen in May is likely fleeting, as Conti actors regroup.

  • June 24th 2022 at 12:00

Chinese APT Group Likely Using Ransomware Attacks as Cover for IP Theft

By Jai Vijayan, Contributing Writer, Dark Reading
Bronze Starlight’s use of multiple ransomware families and its victim-targeting suggest there’s more to the group’s activities than just financial gain, security vendor says.

  • June 23rd 2022 at 19:58

Johnson Controls Acquires Tempered Networks to Bring Zero Trust Cybersecurity to Connected Buildings

Johnson Controls will roll out the Tempered Networks platform across deployments of its OpenBlue AI-enabled platform.
  • June 23rd 2022 at 18:45

ShiftLeft: Focus On 'Attackability' To Better Prioritize Vulnerabilities

By Dark Reading Staff, Dark Reading
ShiftLeft's Manish Gupta join Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about looking at vulnerability management through the lens of "attackability."

  • June 23rd 2022 at 17:55

Pair of Brand-New Cybersecurity Bills Become Law

By Dark Reading Staff, Dark Reading
Bipartisan legislation allows cybersecurity experts to work across multiple agencies and provides federal support for local governments.

  • June 23rd 2022 at 17:33

The Rise, Fall, and Rebirth of the Presumption of Compromise

By Oleg Brodt, R&D Director of Deutsche Telekom Innovation Labs, Israel, and Chief Innovation Officer for Cyber@Ben-Gurion University
The concept might make us sharp and realistic, but it's not enough on its own.

  • June 23rd 2022 at 17:00

Reinventing How Farming Equipment Is Remotely Controlled and Tracked

By Xavier Dupont, Senior Director of Product Line, Lantronix
Farmers are incorporating high-tech solutions like IoT and drones to address new challenges facing agriculture.

  • June 23rd 2022 at 16:32

Cyberattackers Abuse QuickBooks Cloud Service in 'Double-Spear' Campaign

By Tara Seals, Managing Editor, News, Dark Reading
Malicious invoices coming from the accounting software's legitimate domain are used to harvest phone numbers and carry out fraudulent credit-card transactions.

  • June 23rd 2022 at 16:14

Palo Alto Networks Bolsters Its Cloud Native Security Offerings With Out-of-Band WAAS

Latest Prisma Cloud platform updates help organizations continuously monitor and secure web applications with maximum flexibility.
  • June 23rd 2022 at 15:09

How APTs Are Achieving Persistence Through IoT, OT, and Network Devices

By Brian Contos, Chief Security Officer, Phosphorus Cybersecurity,
To prevent these attacks, businesses must have complete visibility into, and access and management over, disparate devices.

  • June 23rd 2022 at 14:00

80% of Legacy MSSP Users Planning MDR Upgrade

By Dark Reading Staff, Dark Reading
False positives and staff shortages are inspiring a massive managed detection and response (MDR) services migration, research finds.

  • June 23rd 2022 at 13:00

MetaMask Crypto-Wallet Theft Skates Past Microsoft 365 Security

By Nathan Eddy, Contributing Writer, Dark Reading
The credential-phishing attack leverages social engineering and brand impersonation techniques to lead users to a spoofed MetaMask verification page.

  • June 23rd 2022 at 12:00

Organizations Battling Phishing Malware, Viruses the Most

By Edge Editors, Dark Reading
Organizations may not frequently encounter malware targeting cloud systems or networking equipment, but the array of malware they do encounter just occasionally is no less disruptive or damaging. That is where the focus needs to be.

  • June 23rd 2022 at 01:24

Microsoft 365 Users in US Face Raging Spate of Attacks

By Tara Seals, Managing Editor, News, Dark Reading
A voicemail-themed phishing campaign is hitting specific industry verticals across the country, bent on scavenging credentials that can be used for a range of nefarious purposes.

  • June 22nd 2022 at 20:33

Synopsys Completes Acquisition of WhiteHat Security

Addition of WhiteHat Security provides Synopsys with SaaS capabilities and dynamic application security testing (DAST) technology.
  • June 22nd 2022 at 20:22

Aqua Security Collaborates With Center for Internet Security to Create Guide for Software Supply Chain Security

In addition, Aqua Security unveiled a new open source tool, Chain-Bench, for auditing the software supply chain to ensure compliance with the new CIS guidelines.
  • June 22nd 2022 at 20:05

Neustar Security Services Launches Public UltraDNS Health Check Site

Open service generates free report detailing potential gaps in compliance, configuration, and security for a user’s multiple domain names.
  • June 22nd 2022 at 20:04

Russia's APT28 Launches Nuke-Themed Follina Exploit Campaign

By Jai Vijayan, Contributing Writer, Dark Reading
Researchers have spotted the threat group, also known as Fancy Bear and Sofacy, using the Windows MSDT vulnerability to distribute information stealers to users in Ukraine.

  • June 22nd 2022 at 19:11

Fresh Magecart Skimmer Attack Infrastructure Flagged by Analysts

By Dark Reading Staff, Dark Reading
Don't sleep on Magecart attacks, which security teams could miss by relying solely on automated crawlers and sandboxes, experts warn.

  • June 22nd 2022 at 18:19

Getting a Better Handle on Identity Management in the Cloud

By Matt Quirion, Director of Design and Engineering, Kion
Treat identity management as a first-priority problem, not something to figure out later while you get your business up and running in the cloud.

  • June 22nd 2022 at 17:00

Tanium Partners With ScreenMeet to Enable Employees to Securely Connect to Their Remote Desktops

Partnership lets users access one-click ScreenMeet sessions from the Tanium platform.
  • June 22nd 2022 at 16:04

Zscaler and AWS Expand Relationship

Zscaler also announced innovations built on Zscaler’s Zero Trust architecture and AWS.
  • June 22nd 2022 at 15:57

Zscaler Launches Posture Control Solution

Enables DevOps and security teams to prioritize and remediate risks in cloud-native applications earlier in the development life cycle.
  • June 22nd 2022 at 15:54

Zscaler Adds New AI/ML Capabilities for the Zscaler Zero Trust Exchange

Organizations can strengthen their network defense with a number of intelligent security innovations.
  • June 22nd 2022 at 15:51

Evolving Beyond the Password: Vanquishing the Password

By Samuel Greengard, Freelance Writer
Using WebAuthn, physical keys, and biometrics, organizations can adopt more advanced passwordless MFA and true passwordless systems. (Part 2 of 2)

  • June 22nd 2022 at 15:43

The Risk of Multichannel Phishing Is on the Horizon

The cybersecurity community is buzzing with concerns of multichannel phishing attacks, particularly on smishing and business text compromise, as hackers turn to mobile to launch attacks.
  • June 22nd 2022 at 14:40

GitHub's MFA Plans Should Spur Rest of Industry to Raise the Bar

By Chris Niggel, Regional CSO, Americas, Okta
We as industry leaders should be building on what individual platforms like GitHub are doing in two critical ways: demanding third parties improve security and creating more interoperable architectures.

  • June 22nd 2022 at 14:00

80% of Firms Suffered Identity-Related Breaches in Last 12 Months

By Robert Lemos, Contributing Writer, Dark Reading
With almost every business experiencing growth in human and machine identities, firms have made securing those identities a priority.

  • June 22nd 2022 at 13:47

Risk Disconnect in the Cloud

By Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
New Cloud Security Alliance (CSA) and Google Cloud study shows many enterprises struggle to measure and manage risk in their cloud workloads.

  • June 22nd 2022 at 12:00

Linux Foundation Announces Open Programmable Infrastructure Project to Drive Open Standards for New Class of Cloud Native Infrastructure

Data Processing and Infrastructure Processing Units – DPU and IPU – are changing the way enterprises deploy and manage compute resources across their networks.
  • June 21st 2022 at 23:27

7 Ways to Avoid Worst-Case Cyber Scenarios

By Sakshi Udavant, Freelance Writer
In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.

  • June 21st 2022 at 22:10

VPNs Persist Despite Zero-Trust Fervor

By Ericka Chickowski, Contributing Writer, Dark Reading
Most organizations still rely on virtual private networks for secure remote access.

  • June 21st 2022 at 21:34

China-Linked ToddyCat APT Pioneers Novel Spyware

By Jai Vijayan, Contributing Writer, Dark Reading
ToddyCat's Samurai and Ninja tools are designed to give attackers persistent and deep access on compromised networks, security vendor says.

  • June 21st 2022 at 20:57

RIG Exploit Kit Replaces Raccoon Stealer Trojan With Dridex

By Becky Bracken, Editor, Dark Reading
After the Raccoon Stealer Trojan disappeared, the RIG Exploit Kit seamlessly adopted Dridex for credential theft.

  • June 21st 2022 at 20:35

Gartner: Regulation, Human Costs Will Create Stormy Cybersecurity Weather Ahead

By Becky Bracken, Editor, Dark Reading
Experts tell teams to prepare for more regulation, platform consolidation, management scrutiny, and attackers with the ability to claim human casualties.

  • June 21st 2022 at 18:44

Why Financial Institutions Must Double Down on Open Source Investments

By Gabriele Columbro, Executive Director, FINOS
Open source is here to stay, and it's imperative that CIOs have a mature, open source engagement strategy, across consumption, contribution, and funding as a pillar of digital transformation.

  • June 21st 2022 at 17:00

Evolving Beyond the Password: It's Time to Up the Ante

By Samuel Greengard, Freelance Writer
While there's an immediate need to improve MFA adoption, it's also critical to move to more advanced and secure passwordless frameworks, including biometrics. (Part 1 of 2)

  • June 21st 2022 at 15:23

BRATA Android Malware Evolves Into an APT

By Nathan Eddy, Contributing Writer, Dark Reading
The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities.

  • June 21st 2022 at 14:30

Reducing Risk With Zero Trust

By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
Zero trust isn’t just about authentication. Organizations can combine identity data with business awareness to address issues such as insider threat.

  • June 21st 2022 at 14:27

56 Vulnerabilities Discovered in OT Products From 10 Different Vendors

By Jai Vijayan, Contributing Writer, Dark Reading
Deep-dive study unearthed security flaws that could allow remote code execution, file manipulation, and malicious firmware uploads, among other badness.

  • June 21st 2022 at 14:05

AI Is Not a Security Silver Bullet

By Mark Lambert, Vice President of Product, Armorcode
AI can help companies more effectively identify and respond to threats, as well as harden applications.

  • June 21st 2022 at 14:00

Open Source Software Security Begins to Mature

By Robert Lemos, Contributing Writer, Dark Reading
Only about half of firms have an open source software security policy in place to guide developers in the use of components and frameworks, but those that do exhibit better security.

  • June 21st 2022 at 12:00

Capital One Attacker Exploited Misconfigured AWS Databases

By Tara Seals, Managing Editor, News, Dark Reading
After bragging in underground forums, the woman who stole 100 million credit applications from Capital One has been found guilty.

  • June 20th 2022 at 21:25

Feds Take Down Russian 'RSOCKS' Botnet

By Dark Reading Staff, Dark Reading
RSOCKS commandeered millions of devices in order to offer proxy services used to mask malicious traffic.

  • June 20th 2022 at 19:39

Name That Toon: Cuter Than a June Bug

By John Klossner, Cartoonist
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

  • June 20th 2022 at 17:00

DDoS Attacks Delay Putin Speech at Russian Economic Forum

By Dark Reading Staff, Dark Reading
A Kremlin spokesman said that the St. Petersburg International Economic Forum accreditation and admissions systems were shut down by a DDoS attack.

  • June 20th 2022 at 16:32

Credential Sharing as a Service: The Hidden Risk of Low-Code/No-Code

By Michael Bargury, CTO & Co-Founder, Zenity
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.

  • June 20th 2022 at 16:26

Security Lessons From Protecting Live Events

By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
Security defenders working for large venues and international events need to be able to move at machine speed because they have a limited time to detect and recover from attacks. The show must go on, always.

  • June 20th 2022 at 15:00

The Cybersecurity Diversity Gap: Advice for Organizations Looking to Thrive

By Rita Gurevich, CEO and Founder, SPHERE
Companies need to fill some of the 3.5 million empty cybersecurity seats with workers who bring different experiences, perspectives, and cultures to the table. Cut a few doors and windows into the security hiring box.

  • June 20th 2022 at 14:00

Credential Sharing as a Service: The Hidden Risk of Low-Code/No-Code

By Michael Bargury, CTO & Co-Founder, Zenity
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.

  • June 20th 2022 at 13:35

Ransomware and Phishing Remain IT's Biggest Concerns

By Edge Editors, Dark Reading
Security teams β€” who are already fighting off malware challenges β€” are also facing renewed attacks on cloud assets and remote systems.

  • June 17th 2022 at 20:40
❌