FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

New Phishing Attacks Shame, Scare Victims into Surrendering Twitter, Discord Credentials

By Nathan Eddy, Contributing Writer, Dark Reading
Scams pressure victims to "resolve an issue that could impact their status, business."

  • July 11th 2022 at 13:10

Microsoft Reverses Course on Blocking Office Macros by Default

By Jai Vijayan, Contributing Writer, Dark Reading
Security experts criticize company for reversing course, albeit temporarily, on a decision it made just this February to block macros in files downloaded from the Internet.

  • July 8th 2022 at 21:19

DoJ Charges CEO for Dealing $1B in Fake Cisco Gear

By Dark Reading Staff, Dark Reading
Fraudster allegedly passed off refurbished, modified Cisco equipment as new to hospitals, schools, and even the military.

  • July 8th 2022 at 18:12

Welcome-Back-to-the-Future Shock

By Jonathan Care, Contributing Writer, Dark Reading
This year's RSA Conference saw a strange mix of selling the future and the past β€” for good reason.

  • July 8th 2022 at 15:44

Coalition Closes $250 Million in Series F Funding, Valuing the Cyber Insurance Provider at $5 Billion

Funding from Allianz X, Valor Equity Partners, Kinetic Partners, and existing investors will accelerate Coalition’s vision to provide security for all.
  • July 8th 2022 at 14:41

Zero Trust Bolsters Our National Defense Against Rising Cyber Threats

By Mark Sincevich, Federal Director, Illumio
The Colonial Pipeline and JBS attacks, among others, showed us our national resilience is only as strong as public-private sector collaboration.

  • July 8th 2022 at 14:00

In Switch, Trickbot Group Now Attacking Ukrainian Targets

By Jai Vijayan, Contributing Writer, Dark Reading
Latest campaigns are a break from its usual financially motivated attacks and appear aligned with Russian interests, security researchers say.

  • July 8th 2022 at 13:45

What Do All of Those Cloud Cybersecurity Acronyms Mean?

By Jonathan Care, Contributing Writer, Dark Reading
Acronyms serve as a gatekeeper β€” if you don't sling the lingo, you don't belong. So here's a quick guide to the letter salad of cloud cybersecurity.

  • July 8th 2022 at 13:19

ICYMI: Critical Cisco RCE Bug, Microsoft Breaks Down Hive, SHI Cyberattack

By Tara Seals, Managing Editor, News, Dark Reading
Dark Reading's digest of the other don't-miss stories of the week, including a new ransomware targeting QNAP gear, and a destructive attack against the College of the Desert that lingers on.

  • July 8th 2022 at 13:10

Stealthy Cyber-Campaign Ditches Cobalt Strike for Rival 'Brute Ratel' Pen Test Tool

By Ericka Chickowski, Contributing Writer, Dark Reading
The latest criminal use of a legitimate red-teaming tool helps attackers stay under the radar and better access living-off-the-land binaries.

  • July 7th 2022 at 21:33

Cyber Skills Center Launches in Tulsa to Develop Diverse, Local Tech Talent Pipeline

New program offers free tech skills training and paid apprenticeships to make education and career pathways more accessible.
  • July 7th 2022 at 21:33

China's Tonto Team APT Ramps Up Spy Operations Against Russia

By Robert Lemos, Contributing Writer, Dark Reading
In a significant spike of activity, the state-sponsored group is going after intelligence on Russian government agencies.

  • July 7th 2022 at 17:53

Buggy 'Log in With Google' API Implementation Opens Crypto Wallets to Account Takeover

By Nathan Eddy, Contributing Writer, Dark Reading
Improper implementations of authentication APIs at a global crypto wallet service provider could have resulted in the loss of account control β€” and millions of dollars β€” from personal and business accounts.

  • July 7th 2022 at 14:37

Empower Your Security Operations Team to Combat Emerging Threats

When examining the modern threat landscape, empowering your security operations and overcoming the limitations inherent with other malware prevention solutions is imperative.

  • July 7th 2022 at 14:04

Cybersecurity Has a Talent Shortage & Non-Technical People Offer a Way Out

By Gage Mele, Manager of Cyber Intelligence, Anomali
It's time to tap the large reservoir of talent with analytical skills to help tackle cybersecurity problems. Train workers in cybersecurity details while using their ability to solve problems.

  • July 7th 2022 at 14:00

Inside NIST's 4 Crypto Algorithms for a Post-Quantum World

By Robert Lemos, Contributing Writer, Dark Reading
With the world potentially less than a decade away from breaking current encryption around critical data, researchers weigh in on planning for the post-quantum world.

  • July 7th 2022 at 13:00

Prevention Takes Priority Over Response

By Dark Reading Staff, Dark Reading
Cybersecurity teams continue to emphasize intrusion prevention over incident response, despite US government action.

  • July 6th 2022 at 22:49

North Korean State Actors Deploy Surgical Ransomware in Ongoing Cyberattacks on US Healthcare Orgs

By Jai Vijayan, Contributing Writer, Dark Reading
US government warns healthcare and public-health organizations to expect continued attacks involving the manually operated "Maui" ransomware.

  • July 6th 2022 at 21:08

Apple Debuts Spyware Protection for State-Sponsored Cyberattacks

By Dark Reading Staff, Dark Reading
Apple's new Lockdown Mode protects devices targeted by sophisticated state-sponsored mercenary spyware attacks.

  • July 6th 2022 at 19:56

I Built a Cheap 'Warshipping' Device in Just 3 Hours β€” and So Can You

By Will Plummer, Chief Security Officer, RaySecur
Here's how I did it and how you can protect your company against such physical/digital hybrid attacks.

  • July 6th 2022 at 17:57

Marriott Data Breach Exposes PII, Credit Cards

By Becky Bracken, Editor, Dark Reading
The hospitality giant said data from 300-400 individuals was compromised by a social-engineering scam targeting the Baltimore airport.

  • July 6th 2022 at 17:57

How to Keep EVs From Taking Down the Electrical Grid

By Michael Sanchez, CEO, Itegriti
They may be environmentally friendly, but the surging popularity of electric cars and plug-in hybrids puts the nation's electrical grid at greater risk for malfeasance.

  • July 6th 2022 at 17:00

Cloud Misconfig Exposes 3TB of Sensitive Airport Data in Amazon S3 Bucket: 'Lives at Stake'

By Nathan Eddy, Contributing Writer, Dark Reading
The unsecured server exposed more than 1.5 million files, including airport worker ID photos and other PII, highlighting the ongoing cloud-security challenges worldwide.

  • July 6th 2022 at 16:02

Identity Access Management Is Set for Exploding Growth, Big Changes β€” Report

By Ericka Chickowski, Contributing Writer, Dark Reading
New research says IAM spending will grow on the back of affordable subscription services, spurred by cloud and mobile adoption, IoT, and continued remote working.

  • July 6th 2022 at 15:23

The Cyber-Asset Management Playbook for Supply Chain Modernization

By Keith Neilson, Technical Evangelist, CloudSphere
Organizations must balance the risk and reward of new cyber-asset management technologies.

  • July 6th 2022 at 14:00

Roundtable: Amid Cyberattack Frenzy, How Can QNAP Customers Protect the Business?

By Tara Seals, Managing Editor, News, Dark Reading
Our roundtable of cybersecurity experts weighs in on what makes QNAP network-attached storage catnip for attackers, and what organizations can do about it.

  • July 6th 2022 at 13:15

NIST Picks 4 Quantum-Resistant Cryptographic Algorithms

By Dark Reading Staff, Dark Reading
The US Department of Commerce's National Institute of Standards and Technology has announced the first group of encryption tools that will become part of its post-quantum cryptographic standard.

  • July 5th 2022 at 23:56

HackerOne Employee Fired for Stealing and Selling Bug Reports for Personal Gain

By Jai Vijayan, Contributing Writer, Dark Reading
Company says it is making changes to its security controls to prevent malicious insiders from doing the same thing in future; reassures bug hunters their bounties are safe.

  • July 5th 2022 at 21:29

Supply Chain Attack Deploys Hundreds of Malicious NPM Modules to Steal Data

By Dark Reading Staff, Dark Reading
A widespread campaign uses more than 24 malicious NPM packages loaded with JavaScript obfuscators to steal form data from multiple sites and apps, analysts report.

  • July 5th 2022 at 20:40

Why Browser Vulnerabilities Are a Serious Threat β€” and How to Minimize Your Risk

By Michael Walters, President & Co-Founder, Action1 Corporation
As a result of browser market consolidation, adversaries can focus on uncovering vulnerabilities in just two main browser engines.

  • July 5th 2022 at 17:00

Google Chrome WebRTC Zero-Day Faces Active Exploitation

By Tara Seals, Managing Editor, News, Dark Reading
The heap buffer-overflow issue in Chrome for Android could be used for DoS, code execution, and more.

  • July 5th 2022 at 16:35

3 Cyber Threats Resulting From Today's Technology Choices to Hit Businesses by 2024

By Steve Durbin, CEO, Information Security Forum
Companies need to consider the cost to disengage from the cloud along with proactive risk management that looks at governance issues resulting from heavy use of low- and no-code tools.

  • July 5th 2022 at 14:00

Name That Edge Toon: On Guard

By John Klossner, Cartoonist
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

  • July 5th 2022 at 13:30

ICYMI: A Microsoft Warning, Follina, Atlassian, and More

By Tara Seals, Managing Editor, News, Dark Reading
Dark Reading's digest of the other don't-miss stories of the week, including YouTube account takeovers and a sad commentary on cyber-pro hopelessness.

  • July 1st 2022 at 20:58

OpenSea NFT Marketplace Faces Insider Hack

By Becky Bracken, Editor, Dark Reading
OpenSea warns users that they are likely to be targeted in phishing attacks after a vendor employee accessed and downloaded its email list.

  • July 1st 2022 at 19:09

Time Constraints Hamper Security Awareness Programs

By Edge Editors, Dark Reading
Even as more attacks target humans, lack of dedicated staff, relevant skills, and time are making it harder to develop a security-aware and engaged workforce, SANS says.

  • July 1st 2022 at 19:08

Criminals Use Deepfake Videos to Interview for Remote Work

By Ericka Chickowski, Contributing Writer, Dark Reading
The latest evolution in social engineering could put fraudsters in a position to commit insider threats.

  • July 1st 2022 at 17:01

DragonForce Malaysia Releases LPE Exploit, Threatens Ransomware

By Nathan Eddy, Contributing Writer, Dark Reading
The hacktivist group is ramping up its activities and ready to assault governments and businesses with escalating capabilities.

  • July 1st 2022 at 15:14

When It Comes to SBOMs, Do You Know the Ingredients in Your Ingredients?

By Donald Fischer, CEO and Co-Founder, Tidelift
Transitive dependencies can complicate the process of developing software bills of materials.

  • July 1st 2022 at 14:00

Microsoft Going Big on Identity with the Launch of Entra

By Don Tait, Senior Analyst, Omdia
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Microsoft has a new response.

  • July 1st 2022 at 13:52

Google: Hack-for-Hire Groups Present a Potent Threat

By Jai Vijayan, Contributing Writer, Dark Reading
Cyber mercenaries in countries like India, Russia, and the UAE are carrying out data theft and hacking missions for a wide range of clients across regions, a couple of new reports said.

  • June 30th 2022 at 20:21

18 Zero-Days Exploited So Far in 2022

By Tara Seals, Managing Editor, News, Dark Reading
It didn't have to be this way: So far 2022's tranche of zero-days shows too many variants of previously patched security bugs, according Google Project Zero.

  • June 30th 2022 at 19:39

API Security Losses Total Billions, But It's Complicated

By Robert Lemos, Contributing Writer, Dark Reading
A recent analysis of breaches involving application programming interfaces (APIs) arrives at some eye-popping damage figures, but which companies are most affected, and in what ways?

  • June 30th 2022 at 19:31

Exchange Servers Backdoored Globally by SessionManager

By Becky Bracken, Editor, Dark Reading
Malicious IIS module exploitation is the latest trend among threat actors targeting Exchange servers, analysts say.

  • June 30th 2022 at 18:29

Study Reveals Traditional Data Security Tools Have a 60% Failure Rate Against Ransomware and Extortion

Titaniam’s β€˜State of Data Exfiltration & Extortion Report’ also finds that while over 70% of organizations had heavy investments in prevention, detection, and backup solutions, the majority of victims ended up giving into attackers' demands.
  • June 30th 2022 at 16:57

A Fintech Horror Story: How One Company Prioritizes Cybersecurity

By Cesar Cerrudo, Chief Research Officer, Strike
A password link that didn't expire leads to the discovery of exposed personal information at a payments service.

  • June 30th 2022 at 16:54

NXM Announces Platform That Protects Space Infrastructure and IoT Devices From Cyberattacks

NXM Autonomous Security protects against network-wide device hacks and defends against critical IoT vulnerabilities.
  • June 30th 2022 at 16:54

Critical ManageEngine ADAudit Plus Vulnerability Allows Network Takeover, Mass Data Exfiltration

By Nathan Eddy, Contributing Writer, Dark Reading
An unauthenticated remote code execution vulnerability found in Zoho’s compliance tool could leave organizations exposed to an information disclosure catastrophe, new analysis shows.

  • June 30th 2022 at 15:17

Zero-Days Aren't Going Away Anytime Soon & What Leaders Need to Know

By Dan Schiappa, Chief Product Officer, Arctic Wolf
There were a record number of zero-day attacks last year, but some basic cyber-hygiene strategies can help keep your organization more safe.

  • June 30th 2022 at 14:00

Patch Now: Linux Container-Escape Flaw in Azure Service Fabric

By Jai Vijayan, Contributing Writer, Dark Reading
Microsoft is urging organizations that don't have automatic updates enabled to update to the latest version of Linux Server Fabric to thwart the "FabricScape" cloud bug.

  • June 29th 2022 at 20:08

What's Your AppSec Personality?

By Jeff Williams, CTO, Contrast Security
It's time to decide which role to play to best serve your organization's security needs: an auditor, a lawyer, or a developer.

  • June 29th 2022 at 16:00

ZuoRAT Hijacks SOHO Routers From Cisco, Netgear

By Nathan Eddy, Contributing Writer, Dark Reading
The malware has been in circulation since 2020, with sophisticated, advanced malicious actors taking advantage of the vulnerabilities in SOHO routers as the work-from-home population expands rapidly.

  • June 29th 2022 at 18:41

Broken Authentication Vuln Threatens Amazon Photos Android App

By Dark Reading Staff, Dark Reading
The now-patched bug allows an attacker to gain full access to a user's Amazon files.

  • June 29th 2022 at 17:25

How to Master the Kill Chain Before Your Attackers Do

By J.R. Cunningham, Chief Security Officer, Nuspire
In the always-changing world of cyberattacks, preparedness is key.

  • June 29th 2022 at 17:00

Cyberattacks via Unpatched Systems Cost Orgs More Than Phishing

By Robert Lemos, Contributing Writer, Dark Reading
External attacks focused on vulnerabilities are still the most common ways that companies are successfully attacked, according to incident data.

  • June 29th 2022 at 15:03

Shifting the Cybersecurity Paradigm From Severity-Focused to Risk-Centric

By Ran Abramson, Threat Intelligence Analyst, Skybox Security
Embrace cyber-risk modeling and ask security teams to pinpoint the risks that matter and prioritize remediation efforts.

  • June 29th 2022 at 14:00
❌