FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Patch Now: Atlassian Confluence Bug Under Active Exploit

By Tara Seals, Managing Editor, News, Dark Reading
Attackers almost immediately leapt on a just-disclosed bug, CVE-2022-26138, affecting Atlassian Confluence, which allows remote, unauthenticated actors unfettered access to Confluence data.

  • July 28th 2022 at 18:22

What the White House's Cybersecurity Workforce Plan Should Look Like

By Nick Schneider, CEO and President, Arctic Wolf
By embracing cybersecurity as a critical part of our national security and education strategy, and working together to invest in opportunities for all, we can create a safer, more secure world.

  • July 28th 2022 at 17:00

APT-Like Phishing Threat Mirrors Landing Pages

By Nathan Eddy, Contributing Writer, Dark Reading
By dynamically mirroring an organization’s login page, threat actors are propagating legitimate-looking phishing attacks that encourage victims to offer up access to the corporate crown jewels.

  • July 28th 2022 at 16:41

What Women Should Know Before Joining the Cybersecurity Industry

By Karin Ophir Zimet, VP, People & Ops, Torq
Three observations about our industry that might help demystify security for women entrants.

  • July 28th 2022 at 14:00

1,000s of Phishing Attacks Blast Off From InterPlanetary File System

By Nathan Eddy, Contributing Writer, Dark Reading
The peer-to-peer network IPFS offers an ingenious base for cyberattacks and is seeing a stratospheric increase in malicious hosting.

  • July 28th 2022 at 13:00

In a Post-Macro World, Container Files Emerge as Malware-Delivery Replacement

By Jai Vijayan, Contributing Writer, Dark Reading
With Microsoft disabling Office macros by default, threat actors are increasingly using ISO, RAR, LNK, and similar files to deliver malware because they can get around Windows protections.

  • July 28th 2022 at 09:00

When Human Security Meets PerimeterX

By Jonathan Care, Contributing Writer, Dark Reading
Dark Reading's analysis suggests that the merger between Human Security and PerimeterX will bring modern defense strategies to disrupt cybercrime and fraud.

  • July 28th 2022 at 00:44

Overcoming the Fail-to-Challenge Vulnerability With a Friendly Face

By Karen Spiegelman, Features Editor
Ahead of their Black Hat USA talk in August, Simon Pavitt and Stephen Dewsnip explain the value of helping people practice cyber defense via a "malicious floorwalker" exercise.

  • July 27th 2022 at 23:10

Multiple Windows, Adobe Zero-Days Anchor Knotweed Commercial Spyware

By Tara Seals, Managing Editor, News, Dark Reading
Microsoft flagged the company's Subzero tool set as on offer to unscrupulous governments and shady business interests.

  • July 27th 2022 at 18:49

US Offers $10M Double-Reward for North Korea Cyberattacker Info

By Becky Bracken, Editor, Dark Reading
North Korean state-sponsored actors, who help economically prop up Kim Jong Un's dictatorship, continue to pummel US infrastructure.

  • July 27th 2022 at 17:42

Average Data Breach Costs Soar to $4.4M in 2022

By Robert Lemos, Contributing Writer, Dark Reading
Call it a "cyber tax": Those costs are usually passed on to consumers, not investors, as compromised businesses raise prices for goods and services.

  • July 27th 2022 at 17:21

Is Your Home or Small Business Built on Secure Foundations? Think Again…

By IFSEC Global, Staff
Did you know that the standard router relied upon in homes and by thousands of small businesses is the most frequently attacked IoT device? James Willison, Project and Engagement Manager, IoT Security Foundation, explores the issue and reveals an ongoing initiative from the foundation that is designed to better secure the devices.

  • July 27th 2022 at 17:00

First Cohort Graduates from PSM Cyber Stars Program at Liverpool FC

New careers in IT open up for former footballers.
  • July 27th 2022 at 16:10

The Great BizApp Hack: Cyber-Risks in Your Everyday Business Applications

By Gil Hoffer, Co-Founder and Chief Technology Officer, Salto
IT admins can lock some of the obvious open doors in business applications, but system visibility is key. Build automatic monitoring defenses and adopt a Git-like tool so you can "version" your business apps to restore prior states.

  • July 27th 2022 at 14:00

8 Hot Summer Fiction Reads for Cybersecurity Pros

By Steve Zurier, Contributing Writer, Dark Reading
A reading list of recommended novels curated by cybersecurity experts for cybersecurity experts.

  • July 27th 2022 at 13:30

Norton Consumer Cyber Safety Pulse Report: Phishing for New Bait on Social Media

Year-long analysis from Norton Labs finds nearly three-quarters of phishing sites imitate Facebook.
  • July 26th 2022 at 22:23

LockBit 3.0: Significantly Improved Ransomware Helps the Gang Stay on Top

By Robert Lemos, Contributing Writer, Dark Reading
Just ahead of its headline-grabbing attack on the Italian tax agency, the infamous ransomware group debuted an improved version of the malware featuring parts from Egregor and BlackMatter.

  • July 26th 2022 at 21:01

Microsoft Tops Brands Phishers Prefer

By Dark Reading Staff, Dark Reading
Wide use of Microsoft 365 applications by business lets phishers easily launch data theft, BEC, ransomware, and other attacks, new report finds.

  • July 26th 2022 at 20:53

Economic Downturn Raises Risk of Insiders Going Rogue

By Jai Vijayan, Contributing Writer, Dark Reading
Insiders could become more vulnerable to cybercrime recruitment efforts, new report says.

  • July 26th 2022 at 20:45

AI Can Help Fintechs Fight Fraud-as-a-Service

By James Brodhurst, Principal Consultant, Resistant AI
Artificial intelligence tools can help companies strike the right balance between preventing financial crime and maintaining customer service and satisfaction.

  • July 26th 2022 at 20:12

Discord, Telegram Services Hijacked to Launch Array of Cyberattacks

By Becky Bracken, Editor, Dark Reading
Attackers are easily turning popular messaging apps and their associated services β€” like bots, cloud infrastructure, and CDNs β€” against users, researchers warn.

  • July 26th 2022 at 19:59

Flying Blind in Security Operations

Too many organizations are STILL getting breached. Every day across large and small organizations, intrusions and breaches happen.
  • July 26th 2022 at 17:46

How Risk-Based Vulnerability Management Has Made Security Easier

By Ed Bellis, Co-Founder and CTO, Kenna Security, now a part of Cisco
Trying to remediate everything was never a winning strategy. RBVM is an approach that gets organizations better results with less effort.

  • July 26th 2022 at 17:00

Ducktail Spear-Phishing Campaign Uses LinkedIn to Hijack Facebook Business Accounts

By Nathan Eddy, Contributing Writer, Dark Reading
Ducktail targets marketing and HR professionals through LinkedIn to hijack Facebook accounts and run malvertising schemes.

  • July 26th 2022 at 16:28

The Beautiful Lies of Machine Learning in Security

By Anna Belak, Director of Thought Leadership, Sysdig
Machine learning should be considered an extension of β€” not a replacement for β€” existing security methods, systems, and teams.

  • July 26th 2022 at 14:00

Siemens Energy Takes Next Step to Protect Critical Infrastructure

Company joins AWS Partner Network to provide customers with industrial cybersecurity solution to ensure reliable electricity and fuel supplies.
  • July 26th 2022 at 13:27

OpenFHE Brings New Encryption Tools to Developers

By Dark Reading Staff, Dark Reading
The open source fully homomorphic encryption library from Duality Technologies is intended to help developers build their own FHE-enabled applications.

  • July 26th 2022 at 01:16

Rare 'CosmicStrand' UEFI Rootkit Swings into Cybercrime Orbit

By Tara Seals, Managing Editor, News, Dark Reading
The firmware threat offers ultimate stealth and persistence β€” and may be distributed via tainted firmware components in a supply chain play, researchers theorize.

  • July 25th 2022 at 20:35

Supercharged Version of Amadey Infostealer & Malware Dropper Bypasses AVs

By Jai Vijayan, Contributing Writer, Dark Reading
Several threat actors used Amadey Bot previously to steal information and distribute malware such as the GandCrab ransomware and the FlawedAmmy RAT.

  • July 25th 2022 at 19:47

T-Mobile Pitches $4-Per-Customer Settlement for Data Leak Impacting 80M People

By Dark Reading Staff, Dark Reading
After leaking 80 million US customer data records in a cyberattack last summer, T-Mobile offers to settle a wide-ranging class action suit for just $350 million.

  • July 25th 2022 at 19:10

Why Layer 8 Is Great

By Joshua Goldfarb, Fraud Solutions Architect - EMEA and APCJ, F5
To help discern legitimate traffic from fraud, it helps to understand user intent as shown through their behavior.

  • July 25th 2022 at 18:36

Qakbot Is Back With a New Trick: DLL Sideloading

By Dark Reading Staff, Dark Reading
In the latest iteration, Qakbot operators are using DLL sideloading to deliver malware, a technique that places legitimate and malicious files together in a common directory to avoid detection.

  • July 25th 2022 at 16:54

Critical Filewave MDM Vulnerabilities Allow Attackers Full Mobile Device Control

By Nathan Eddy, Contributing Writer, Dark Reading
Two previously unknown critical vulnerabilities within FileWave’s multiplatform MDM system could grant malicious actors access to the platform's most privileged user account.

  • July 25th 2022 at 13:33

Getting Ahead of Supply Chain Attacks

By Wesley Mullins, CTO, Deepwatch
Attackers are willing to replicate entire networks, purchase domains, and persist for months, not to mention spend significantly to make these campaigns successful.

  • July 25th 2022 at 14:00

Understanding Proposed SEC Rules Through an ESG Lens

By Stephen Lawton, Contributing Writer
Cyber threats are putting environmental, social, and governance discussions at the forefront of board meetings and C-suite discussions around the globe.

  • July 22nd 2022 at 22:54

ICYMI: Neopets & the Gaming Problem; SolarWinds Hackers Are Back; Google Ads Abused

By Tara Seals, Managing Editor, News, Dark Reading
Dark Reading's weekly roundup of all the OTHER important stories of the week.

  • July 22nd 2022 at 21:26

Critical Bugs Threaten to Crack Atlassian Confluence Workspaces Wide Open

By Jai Vijayan, Contributing Writer, Dark Reading
A hardcoded password associated with the Questions for Confluence app has been publicly released, which will likely lead to exploit attempts that give cyberattackers access to all Confluence content.

  • July 22nd 2022 at 19:42

Google Chrome Zero-Day Weaponized to Spy on Journalists

By Becky Bracken, Editor, Dark Reading
Candiru attackers breached a news agency employee website to target journalists with DevilsTongue spyware, researchers say.

  • July 22nd 2022 at 18:02

Snowballing Ransomware Variants Highlight Growing Threat to VMware ESXi Environments

By Jai Vijayan, Contributing Writer, Dark Reading
Luna, Black Basta add to rapidly growing list of malware tools targeted at virtual machines deployed on VMware's bare-metal hypervisor technology.

  • July 22nd 2022 at 16:43

Phishing Bonanza: Social-Engineering Savvy Skyrockets as Malicious Actors Cash In

By Nathan Eddy, Contributing Writer, Dark Reading
The ever-evolving threat from phishing is growing more sophisticated as attackers design high-pressure situations and leverage ever-more-convincing social engineering tactics to increase their success rates.

  • July 22nd 2022 at 15:46

Thales Expands Cybersecurity Portfolio With OneWelcome Acquisition

By Don Tait, Senior Analyst, Omdia
With more staff working remotely, identity, authentication, and access have never been more important.

  • July 22nd 2022 at 15:28

What Firewalls Can β€” and Can't β€” Accomplish

By Pat McGarry, Chief Technology Officer, ThreatBlockr
Understanding the limitations of firewalls is important to protecting the organization from evolving threats.

  • July 22nd 2022 at 14:00

Mysterious, Cloud-Enabled macOS Spyware Blows Onto the Scene

By Tara Seals, Managing Editor, News, Dark Reading
The CloudMensis spyware, which can lift reams of sensitive information from Apple machines, is the first Mac malware observed to exclusively rely on cloud storage for C2 activities.

  • July 21st 2022 at 20:25

Equitable Digital Identity Verification Requires Moving Past Flawed Legacy Systems

By Jordan Burris, Senior Director of Product Market Strategy for the Public Sector, Socure
Data science can be used to improve access to government assistance while reducing fraud.

  • July 21st 2022 at 18:35

Google Becomes First Cloud Operator to Join Healthcare ISAC

By Dark Reading Staff, Dark Reading
Google Cloud pledges experts and other resources to Health Information Sharing and Analysis Center, a community of healthcare infrastructure operators and owners.

  • July 21st 2022 at 17:57

The Market Is Teeming: Bargains on Dark Web Give Novice Cybercriminals a Quick Start

By Robert Lemos, Contributing Writer, Dark Reading
A study of the unregulated dark markets shows that the vast majority of malware, exploits, and attacker tools sell for less than $10, giving would-be criminals a fast entry point.

  • July 21st 2022 at 16:30

Cybercrime Group TA4563 Targets DeFi Market With Evolving Evilnum Backdoor

By Nathan Eddy, Contributing Writer, Dark Reading
The cyber campaign, aimed at siphoning funds, uses an improved version of the malware, which can adjust infection paths based on recognized antivirus software.

  • July 21st 2022 at 13:27

The Kronos Ransomware Attack: What You Need to Know So Your Business Isn't Next

By Mike Wilkes, Chief Information Security Officer, SecurityScorecard
Identify your business's security posture and head off ransomware attacks with third-party risk management and vendor security assessments.

  • July 21st 2022 at 14:00

Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration

New global study from ESG and ISSA reveals nearly half of organizations are consolidating or plan on consolidating the number of vendors they do business with
  • July 20th 2022 at 22:03

Lax Security Fuels Massive 8220 Gang Botnet Army Surge

By Dark Reading Staff, Dark Reading
The threat group 8220 Gang's cryptocurrency miner and botnet reach has exploded to 30,000 global hosts, a notable increase over the past month, researchers say.

  • July 20th 2022 at 19:46

'AIG' Threat Group Launches With Unique Business Model

By Jai Vijayan, Contributing Writer, Dark Reading
The rapidly growing Atlas Intelligence Group relies on cyber-mercenaries to carry out its missions.

  • July 20th 2022 at 19:40

Feds Recoup $500K From Maui Ransomware Gang

By Dark Reading Staff, Dark Reading
Law enforcement hopes that retuning ransom payments to impacted businesses will demonstrate that working with the feds following a cybersecurity breach is "good business."

  • July 20th 2022 at 18:22

Mutare Voice Network Threat Survey Shows Nearly Half of Organizations Experienced Vishing or Social Engineering Attacks in Past Year

Unsecured voice traffic, skyrocketing adoption of Teams-centric enterprise collaboration tools widen enterprise cybersecurity gaps and increase risk of breach.
  • July 20th 2022 at 18:17

What InfoSec Pros Can Teach the Organization About ESG

By Richard Marcus, Head of Information Security, AuditBoard
Security pros' experience with transparency and evaluating third-party partners positions them to act as key environmental, social, and governance advisers.

  • July 20th 2022 at 17:00

Chaotic LAPSUS$ Group Goes Quiet, but Threat Likely Persists

By Nathan Eddy, Contributing Writer, Dark Reading
The LAPSUS$ group emerged with a big splash at the end of 2021, targeting companies, including Okta, with a "reckless and disruptive" approach to hacking.

  • July 20th 2022 at 15:05
❌