FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Survey: Small Cybersecurity Teams Face Greater Risk from Attacks than Larger Enterprises

Cynet CISO survey reveals lack of staff, skills, and resources driving smaller teams to outsource security with advanced tools, technologies, and services.
  • July 13th 2022 at 15:08

Microsoft: 10,000 Orgs Targeted in Phishing Attack That Bypasses Multifactor Authentication

By Dark Reading Staff, Dark Reading
The massive phishing campaign does not exploit a vulnerability in MFA. Instead, it spoofs an Office 365 authentication page to steal credentials.

  • July 13th 2022 at 14:54

US Government and QuSecure Orchestrate First-Ever Post-Quantum Encryption Communication over a Government Network

QuSecure’s QuProtect leverages unique post-quantum cryptographic algorithm on government legacy systems to achieve world’s first and only post-quantum resilient channel within a government facility.
  • July 13th 2022 at 14:17

New Research Reveals 93% of Organizations Surveyed Have Had Failed IIoT/OT Security Projects

Barracuda research finds organizations are struggling to protect operational technology and getting breached as a result.
  • July 13th 2022 at 14:01

Keep Humans in the Loop in SOC Operations

By A.N. Ananth, President, Netsurion
Machine learning and automation can help free up security pros for higher-value tasks.

  • July 13th 2022 at 14:00

Exostar Empowers SMBs with Enhanced, Low-Cost, Easy-to-Use Microsoft 365 and CMMC 2.0 Solutions

Upgrades to the Exostar platform promote secure, compliant collaboration and handling of controlled unclassified information.
  • July 13th 2022 at 13:39

QuickBooks Vishing Scam Targets Small Businesses

By Nathan Eddy, Contributing Writer, Dark Reading
Businesses receive an invoice via email with a credit card charge and are asked to call a fake number and hand over personal information to receive a refund.

  • July 13th 2022 at 12:00

Getting Up and Running with Windows Autopatch

By Dark Reading Staff, Dark Reading
This Tech Tip outlines how system administrators can get started with automated continuous patching for their Windows devices and applications.

  • July 13th 2022 at 00:33

PyPI Mandates 2FA, Plans Google Titan Key Giveaway

By Dark Reading Staff, Dark Reading
Python's most popular package manager is intent on securing the supply chain by requiring developers to enable two-factor authentication.

  • July 12th 2022 at 22:42

Microsoft Issues Fixes for 84 Vulnerabilities: Here's What to Patch Now

By Jai Vijayan, Contributing Writer, Dark Reading
July's security update included fixes for one actively exploited flaw, more than 30 bugs in Azure Site Recovery, and four privilege escalation bugs in Windows Print Spooler.

  • July 12th 2022 at 21:52

Understanding the Omdia Threat Detection Data Life Cycle

By Eric Parizo, Principal Analyst, Omdia
Data quality is key in an effective TDIR solution. Omdia's threat detection data life cycle highlights the considerations for effective data-driven threat detection.

  • July 12th 2022 at 20:11

Don't Have a COW: Containers on Windows and Other Container-Escape Research

By Ericka Chickowski, Contributing Writer, Dark Reading
Several pieces of Black Hat USA research will explore container design weaknesses and escalation of privilege attacks that can lead to container escapes.

  • July 12th 2022 at 18:28

One-Third of Users Without Security Awareness Training Click on Phishing URLs

By Dark Reading Staff, Dark Reading
New data from security training provider shows half of untrained users in consulting, energy, and healthcare industries fall for phishing attacks.

  • July 12th 2022 at 17:27

5 Traits That Differentiate CISOs From CIROs

By James Christiansen, VP of Cloud Security Transformation, Netskope
Chief information risk officers must have a keen understanding of β€” and interaction with β€” the business.

  • July 12th 2022 at 17:00

How Confidential Computing Locks Down Data, Regardless of Its State

By Ijlal Loutfi, Product Manager, Ubuntu Security
Whether data's in motion, at rest, or in use, confidential computing makes moving workloads to the public cloud safer, and can enhance data security in other deployments.

  • July 12th 2022 at 14:00

Accessible Cybersecurity Awareness Training Reduces Your Risk of Cyberattack

By Lise Lapointe, CEO and Founder, Terranova Security
If you're not teaching all of your employees proper security hygiene, you are leaving the door open to risk. Close that door by providing accessible training.

  • July 12th 2022 at 13:07

Ransomware Scourge Drives Price Hikes in Cyber Insurance

By Nathan Eddy, Contributing Writer, Dark Reading
Cybersecurity insurance costs are rising, and insurers are likely to demand more direct access to organizational metrics and measures to make more accurate risk assessments.

  • July 12th 2022 at 12:00

Paladin Cloud Launches New Cloud Security and Governance Platform

By Dark Reading Staff, Dark Reading
The new open source security-as-code platform will help developers and security teams automatically detect security policy violations across the organization's cloud infrastructure.

  • July 11th 2022 at 23:47

Fake Google Software Updates Spread New Ransomware

By Jai Vijayan, Contributing Writer, Dark Reading
"HavanaCrypt" is also using a command-and-control server that is hosted on a Microsoft Hosting Service IP address, researchers say.

  • July 11th 2022 at 22:18

'Luna Moth' Group Ransoms Data Without the Ransomware

By Dark Reading Staff, Dark Reading
Unsophisticated campaigns use off-the-shelf RATs and other tools to exfiltrate data and demand a ransom to keep it private.

  • July 11th 2022 at 21:38

Online Payment Fraud Expected to Cost $343B Over Next 5 Years

By Dark Reading Staff, Dark Reading
Fraudster innovation will continue to drive successful phishing, business email compromise, and socially engineered attacks, researchers say.

  • July 11th 2022 at 17:37

Proposed SEC Rules Require More Transparency About Cyber-Risk

By Stephen Lawton, Contributing Writer
The new guidelines would require public companies to file periodic disclosures about their cybersecurity practices and notify the SEC within 96 hours of a material breach.

  • July 11th 2022 at 14:01

Diversity in Cybersecurity: Fostering Gender-Inclusive Teams That Perform Better

By Anupama Akkapeddi, IT Security Evangelist, ManageEngine
Proactive steps in recruiting women to cybersecurity teams, along with policies focused on diversity, equity, and inclusion, help make cybersecurity teams more effective. Addressing specific barriers that female candidates face will make those teams more inclusive and more representative.

  • July 11th 2022 at 14:00

New Phishing Attacks Shame, Scare Victims into Surrendering Twitter, Discord Credentials

By Nathan Eddy, Contributing Writer, Dark Reading
Scams pressure victims to "resolve an issue that could impact their status, business."

  • July 11th 2022 at 13:10

Microsoft Reverses Course on Blocking Office Macros by Default

By Jai Vijayan, Contributing Writer, Dark Reading
Security experts criticize company for reversing course, albeit temporarily, on a decision it made just this February to block macros in files downloaded from the Internet.

  • July 8th 2022 at 21:19

DoJ Charges CEO for Dealing $1B in Fake Cisco Gear

By Dark Reading Staff, Dark Reading
Fraudster allegedly passed off refurbished, modified Cisco equipment as new to hospitals, schools, and even the military.

  • July 8th 2022 at 18:12

Welcome-Back-to-the-Future Shock

By Jonathan Care, Contributing Writer, Dark Reading
This year's RSA Conference saw a strange mix of selling the future and the past β€” for good reason.

  • July 8th 2022 at 15:44

Coalition Closes $250 Million in Series F Funding, Valuing the Cyber Insurance Provider at $5 Billion

Funding from Allianz X, Valor Equity Partners, Kinetic Partners, and existing investors will accelerate Coalition’s vision to provide security for all.
  • July 8th 2022 at 14:41

Zero Trust Bolsters Our National Defense Against Rising Cyber Threats

By Mark Sincevich, Federal Director, Illumio
The Colonial Pipeline and JBS attacks, among others, showed us our national resilience is only as strong as public-private sector collaboration.

  • July 8th 2022 at 14:00

In Switch, Trickbot Group Now Attacking Ukrainian Targets

By Jai Vijayan, Contributing Writer, Dark Reading
Latest campaigns are a break from its usual financially motivated attacks and appear aligned with Russian interests, security researchers say.

  • July 8th 2022 at 13:45

What Do All of Those Cloud Cybersecurity Acronyms Mean?

By Jonathan Care, Contributing Writer, Dark Reading
Acronyms serve as a gatekeeper β€” if you don't sling the lingo, you don't belong. So here's a quick guide to the letter salad of cloud cybersecurity.

  • July 8th 2022 at 13:19

ICYMI: Critical Cisco RCE Bug, Microsoft Breaks Down Hive, SHI Cyberattack

By Tara Seals, Managing Editor, News, Dark Reading
Dark Reading's digest of the other don't-miss stories of the week, including a new ransomware targeting QNAP gear, and a destructive attack against the College of the Desert that lingers on.

  • July 8th 2022 at 13:10

Stealthy Cyber-Campaign Ditches Cobalt Strike for Rival 'Brute Ratel' Pen Test Tool

By Ericka Chickowski, Contributing Writer, Dark Reading
The latest criminal use of a legitimate red-teaming tool helps attackers stay under the radar and better access living-off-the-land binaries.

  • July 7th 2022 at 21:33

Cyber Skills Center Launches in Tulsa to Develop Diverse, Local Tech Talent Pipeline

New program offers free tech skills training and paid apprenticeships to make education and career pathways more accessible.
  • July 7th 2022 at 21:33

China's Tonto Team APT Ramps Up Spy Operations Against Russia

By Robert Lemos, Contributing Writer, Dark Reading
In a significant spike of activity, the state-sponsored group is going after intelligence on Russian government agencies.

  • July 7th 2022 at 17:53

Buggy 'Log in With Google' API Implementation Opens Crypto Wallets to Account Takeover

By Nathan Eddy, Contributing Writer, Dark Reading
Improper implementations of authentication APIs at a global crypto wallet service provider could have resulted in the loss of account control β€” and millions of dollars β€” from personal and business accounts.

  • July 7th 2022 at 14:37

Empower Your Security Operations Team to Combat Emerging Threats

When examining the modern threat landscape, empowering your security operations and overcoming the limitations inherent with other malware prevention solutions is imperative.

  • July 7th 2022 at 14:04

Cybersecurity Has a Talent Shortage & Non-Technical People Offer a Way Out

By Gage Mele, Manager of Cyber Intelligence, Anomali
It's time to tap the large reservoir of talent with analytical skills to help tackle cybersecurity problems. Train workers in cybersecurity details while using their ability to solve problems.

  • July 7th 2022 at 14:00

Inside NIST's 4 Crypto Algorithms for a Post-Quantum World

By Robert Lemos, Contributing Writer, Dark Reading
With the world potentially less than a decade away from breaking current encryption around critical data, researchers weigh in on planning for the post-quantum world.

  • July 7th 2022 at 13:00

Prevention Takes Priority Over Response

By Dark Reading Staff, Dark Reading
Cybersecurity teams continue to emphasize intrusion prevention over incident response, despite US government action.

  • July 6th 2022 at 22:49

North Korean State Actors Deploy Surgical Ransomware in Ongoing Cyberattacks on US Healthcare Orgs

By Jai Vijayan, Contributing Writer, Dark Reading
US government warns healthcare and public-health organizations to expect continued attacks involving the manually operated "Maui" ransomware.

  • July 6th 2022 at 21:08

Apple Debuts Spyware Protection for State-Sponsored Cyberattacks

By Dark Reading Staff, Dark Reading
Apple's new Lockdown Mode protects devices targeted by sophisticated state-sponsored mercenary spyware attacks.

  • July 6th 2022 at 19:56

I Built a Cheap 'Warshipping' Device in Just 3 Hours β€” and So Can You

By Will Plummer, Chief Security Officer, RaySecur
Here's how I did it and how you can protect your company against such physical/digital hybrid attacks.

  • July 6th 2022 at 17:57

Marriott Data Breach Exposes PII, Credit Cards

By Becky Bracken, Editor, Dark Reading
The hospitality giant said data from 300-400 individuals was compromised by a social-engineering scam targeting the Baltimore airport.

  • July 6th 2022 at 17:57

How to Keep EVs From Taking Down the Electrical Grid

By Michael Sanchez, CEO, Itegriti
They may be environmentally friendly, but the surging popularity of electric cars and plug-in hybrids puts the nation's electrical grid at greater risk for malfeasance.

  • July 6th 2022 at 17:00

Cloud Misconfig Exposes 3TB of Sensitive Airport Data in Amazon S3 Bucket: 'Lives at Stake'

By Nathan Eddy, Contributing Writer, Dark Reading
The unsecured server exposed more than 1.5 million files, including airport worker ID photos and other PII, highlighting the ongoing cloud-security challenges worldwide.

  • July 6th 2022 at 16:02

Identity Access Management Is Set for Exploding Growth, Big Changes β€” Report

By Ericka Chickowski, Contributing Writer, Dark Reading
New research says IAM spending will grow on the back of affordable subscription services, spurred by cloud and mobile adoption, IoT, and continued remote working.

  • July 6th 2022 at 15:23

The Cyber-Asset Management Playbook for Supply Chain Modernization

By Keith Neilson, Technical Evangelist, CloudSphere
Organizations must balance the risk and reward of new cyber-asset management technologies.

  • July 6th 2022 at 14:00

Roundtable: Amid Cyberattack Frenzy, How Can QNAP Customers Protect the Business?

By Tara Seals, Managing Editor, News, Dark Reading
Our roundtable of cybersecurity experts weighs in on what makes QNAP network-attached storage catnip for attackers, and what organizations can do about it.

  • July 6th 2022 at 13:15

NIST Picks 4 Quantum-Resistant Cryptographic Algorithms

By Dark Reading Staff, Dark Reading
The US Department of Commerce's National Institute of Standards and Technology has announced the first group of encryption tools that will become part of its post-quantum cryptographic standard.

  • July 5th 2022 at 23:56

HackerOne Employee Fired for Stealing and Selling Bug Reports for Personal Gain

By Jai Vijayan, Contributing Writer, Dark Reading
Company says it is making changes to its security controls to prevent malicious insiders from doing the same thing in future; reassures bug hunters their bounties are safe.

  • July 5th 2022 at 21:29

Supply Chain Attack Deploys Hundreds of Malicious NPM Modules to Steal Data

By Dark Reading Staff, Dark Reading
A widespread campaign uses more than 24 malicious NPM packages loaded with JavaScript obfuscators to steal form data from multiple sites and apps, analysts report.

  • July 5th 2022 at 20:40
❌