FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

DoJ: Foreign Adversaries Breach US Federal Court Records

By Dark Reading Staff, Dark Reading
A Justice Department official testifies to a House committee that the cyberattack is a "significant concern."

  • August 1st 2022 at 20:47

Ransomware Hit on European Pipeline & Energy Supplier Encevo Linked to BlackCat

By Dark Reading Staff, Dark Reading
Customers across several European countries are urged to update credentials in the wake of the attack that affected a gas-pipeline operator and power company.

  • August 1st 2022 at 19:36

Credential Canaries Create Minefield for Attackers

By Robert Lemos, Contributing Writer, Dark Reading
Canary tokens β€” also known as honey tokens β€” force attackers to second-guess their potential good fortune when they come across user and application secrets.

  • August 1st 2022 at 18:57

Chromium Browsers Allow Data Exfiltration via Bookmark Syncing

By Jai Vijayan, Contributing Writer, Dark Reading
"Bruggling" emerges as a novel technique for pilfering data out from a compromised environment β€” or for sneaking in malicious code and attack tools.

  • August 1st 2022 at 17:42

Name That Edge Toon: Up a Tree

By John Klossner, Cartoonist
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

  • August 1st 2022 at 16:41

For Big Tech, Neutrality Is Not an Option β€” and Never Really Was

By Francis Dinha, CEO & Co-Founder, OpenVPN
Tech companies play a vital role in global communication, which has profound effects on how politics, policies, and human rights issues play out.

  • August 1st 2022 at 14:00

AWS Focuses on Identity Access Management at re:Inforce

By Jeffrey Schwartz, Contributing Writer
Identity and access management was front and center at AWS re:inforce this week.

  • July 29th 2022 at 20:56

Attackers Have 'Favorite' Vulnerabilities to Exploit

By Edge Editors, Dark Reading
While attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.

  • July 29th 2022 at 20:28

ICYMI: Dark Web Happenings Edition With Evil Corp., MSP Targeting & More

By Tara Seals, Managing Editor, News, Dark Reading
Dark Reading's digest of other "don't-miss" stories of the week β€” including a Microsoft alert connecting disparate cybercrime activity together, and an explosion of Luca Stealer variants after an unusual Dark Web move.

  • July 29th 2022 at 19:58

Why Bug-Bounty Programs Are Failing Everyone

By Ericka Chickowski, Contributing Writer, Dark Reading
In a Black Hat USA talk, Katie Moussouris will discuss why bug-bounty programs are failing in their goals, and what needs to happen next to use bounties in a way that improves security outcomes.

  • July 29th 2022 at 18:33

Security Teams Overwhelmed With Bugs, Bitten by Patch Prioritization

By Robert Lemos, Contributing Writer, Dark Reading
The first half of the year saw more than 11,800 reported security vulnerabilities, but figuring out which ones to patch first remains a thankless job for IT teams.

  • July 29th 2022 at 16:56

Amazon Adds Malware Detection to GuardDuty TDR Service

By Jeffrey Schwartz, Contributing Writer
The new GuardDuty Malware Protection and Amazon Detective were among 10 products and services unveiled at AWS re:Inforce in Boston this week.

  • July 29th 2022 at 16:55

Big Questions Remain Around Massive Shanghai Police Data Breach

By Jai Vijayan, Contributing Writer, Dark Reading
Why was PII belonging to nearly 1 billion people housed in a single, open database? Why didn't anyone notice it was downloaded?

  • July 29th 2022 at 15:43

Malicious npm Packages Scarf Up Discord Tokens, Credit Card Info

By Nathan Eddy, Contributing Writer, Dark Reading
The campaign uses four malicious packages to spread "Volt Stealer" and "Lofy Stealer" malware in the open source npm software package repository.

  • July 29th 2022 at 14:06

3 Tips for Creating a Security Culture

By Mark Lambert, Vice President of Product, Armorcode
Trying to get the whole organization on board with better cybersecurity is much tougher than it may sound.

  • July 29th 2022 at 14:00

Patch Now: Atlassian Confluence Bug Under Active Exploit

By Tara Seals, Managing Editor, News, Dark Reading
Attackers almost immediately leapt on a just-disclosed bug, CVE-2022-26138, affecting Atlassian Confluence, which allows remote, unauthenticated actors unfettered access to Confluence data.

  • July 28th 2022 at 18:22

What the White House's Cybersecurity Workforce Plan Should Look Like

By Nick Schneider, CEO and President, Arctic Wolf
By embracing cybersecurity as a critical part of our national security and education strategy, and working together to invest in opportunities for all, we can create a safer, more secure world.

  • July 28th 2022 at 17:00

APT-Like Phishing Threat Mirrors Landing Pages

By Nathan Eddy, Contributing Writer, Dark Reading
By dynamically mirroring an organization’s login page, threat actors are propagating legitimate-looking phishing attacks that encourage victims to offer up access to the corporate crown jewels.

  • July 28th 2022 at 16:41

What Women Should Know Before Joining the Cybersecurity Industry

By Karin Ophir Zimet, VP, People & Ops, Torq
Three observations about our industry that might help demystify security for women entrants.

  • July 28th 2022 at 14:00

1,000s of Phishing Attacks Blast Off From InterPlanetary File System

By Nathan Eddy, Contributing Writer, Dark Reading
The peer-to-peer network IPFS offers an ingenious base for cyberattacks and is seeing a stratospheric increase in malicious hosting.

  • July 28th 2022 at 13:00

In a Post-Macro World, Container Files Emerge as Malware-Delivery Replacement

By Jai Vijayan, Contributing Writer, Dark Reading
With Microsoft disabling Office macros by default, threat actors are increasingly using ISO, RAR, LNK, and similar files to deliver malware because they can get around Windows protections.

  • July 28th 2022 at 09:00

When Human Security Meets PerimeterX

By Jonathan Care, Contributing Writer, Dark Reading
Dark Reading's analysis suggests that the merger between Human Security and PerimeterX will bring modern defense strategies to disrupt cybercrime and fraud.

  • July 28th 2022 at 00:44

Overcoming the Fail-to-Challenge Vulnerability With a Friendly Face

By Karen Spiegelman, Features Editor
Ahead of their Black Hat USA talk in August, Simon Pavitt and Stephen Dewsnip explain the value of helping people practice cyber defense via a "malicious floorwalker" exercise.

  • July 27th 2022 at 23:10

Multiple Windows, Adobe Zero-Days Anchor Knotweed Commercial Spyware

By Tara Seals, Managing Editor, News, Dark Reading
Microsoft flagged the company's Subzero tool set as on offer to unscrupulous governments and shady business interests.

  • July 27th 2022 at 18:49

US Offers $10M Double-Reward for North Korea Cyberattacker Info

By Becky Bracken, Editor, Dark Reading
North Korean state-sponsored actors, who help economically prop up Kim Jong Un's dictatorship, continue to pummel US infrastructure.

  • July 27th 2022 at 17:42

Average Data Breach Costs Soar to $4.4M in 2022

By Robert Lemos, Contributing Writer, Dark Reading
Call it a "cyber tax": Those costs are usually passed on to consumers, not investors, as compromised businesses raise prices for goods and services.

  • July 27th 2022 at 17:21

Is Your Home or Small Business Built on Secure Foundations? Think Again…

By IFSEC Global, Staff
Did you know that the standard router relied upon in homes and by thousands of small businesses is the most frequently attacked IoT device? James Willison, Project and Engagement Manager, IoT Security Foundation, explores the issue and reveals an ongoing initiative from the foundation that is designed to better secure the devices.

  • July 27th 2022 at 17:00

First Cohort Graduates from PSM Cyber Stars Program at Liverpool FC

New careers in IT open up for former footballers.
  • July 27th 2022 at 16:10

The Great BizApp Hack: Cyber-Risks in Your Everyday Business Applications

By Gil Hoffer, Co-Founder and Chief Technology Officer, Salto
IT admins can lock some of the obvious open doors in business applications, but system visibility is key. Build automatic monitoring defenses and adopt a Git-like tool so you can "version" your business apps to restore prior states.

  • July 27th 2022 at 14:00

8 Hot Summer Fiction Reads for Cybersecurity Pros

By Steve Zurier, Contributing Writer, Dark Reading
A reading list of recommended novels curated by cybersecurity experts for cybersecurity experts.

  • July 27th 2022 at 13:30

Norton Consumer Cyber Safety Pulse Report: Phishing for New Bait on Social Media

Year-long analysis from Norton Labs finds nearly three-quarters of phishing sites imitate Facebook.
  • July 26th 2022 at 22:23

LockBit 3.0: Significantly Improved Ransomware Helps the Gang Stay on Top

By Robert Lemos, Contributing Writer, Dark Reading
Just ahead of its headline-grabbing attack on the Italian tax agency, the infamous ransomware group debuted an improved version of the malware featuring parts from Egregor and BlackMatter.

  • July 26th 2022 at 21:01

Microsoft Tops Brands Phishers Prefer

By Dark Reading Staff, Dark Reading
Wide use of Microsoft 365 applications by business lets phishers easily launch data theft, BEC, ransomware, and other attacks, new report finds.

  • July 26th 2022 at 20:53

Economic Downturn Raises Risk of Insiders Going Rogue

By Jai Vijayan, Contributing Writer, Dark Reading
Insiders could become more vulnerable to cybercrime recruitment efforts, new report says.

  • July 26th 2022 at 20:45

AI Can Help Fintechs Fight Fraud-as-a-Service

By James Brodhurst, Principal Consultant, Resistant AI
Artificial intelligence tools can help companies strike the right balance between preventing financial crime and maintaining customer service and satisfaction.

  • July 26th 2022 at 20:12

Discord, Telegram Services Hijacked to Launch Array of Cyberattacks

By Becky Bracken, Editor, Dark Reading
Attackers are easily turning popular messaging apps and their associated services β€” like bots, cloud infrastructure, and CDNs β€” against users, researchers warn.

  • July 26th 2022 at 19:59

Flying Blind in Security Operations

Too many organizations are STILL getting breached. Every day across large and small organizations, intrusions and breaches happen.
  • July 26th 2022 at 17:46

How Risk-Based Vulnerability Management Has Made Security Easier

By Ed Bellis, Co-Founder and CTO, Kenna Security, now a part of Cisco
Trying to remediate everything was never a winning strategy. RBVM is an approach that gets organizations better results with less effort.

  • July 26th 2022 at 17:00

Ducktail Spear-Phishing Campaign Uses LinkedIn to Hijack Facebook Business Accounts

By Nathan Eddy, Contributing Writer, Dark Reading
Ducktail targets marketing and HR professionals through LinkedIn to hijack Facebook accounts and run malvertising schemes.

  • July 26th 2022 at 16:28

The Beautiful Lies of Machine Learning in Security

By Anna Belak, Director of Thought Leadership, Sysdig
Machine learning should be considered an extension of β€” not a replacement for β€” existing security methods, systems, and teams.

  • July 26th 2022 at 14:00

Siemens Energy Takes Next Step to Protect Critical Infrastructure

Company joins AWS Partner Network to provide customers with industrial cybersecurity solution to ensure reliable electricity and fuel supplies.
  • July 26th 2022 at 13:27

OpenFHE Brings New Encryption Tools to Developers

By Dark Reading Staff, Dark Reading
The open source fully homomorphic encryption library from Duality Technologies is intended to help developers build their own FHE-enabled applications.

  • July 26th 2022 at 01:16

Rare 'CosmicStrand' UEFI Rootkit Swings into Cybercrime Orbit

By Tara Seals, Managing Editor, News, Dark Reading
The firmware threat offers ultimate stealth and persistence β€” and may be distributed via tainted firmware components in a supply chain play, researchers theorize.

  • July 25th 2022 at 20:35

Supercharged Version of Amadey Infostealer & Malware Dropper Bypasses AVs

By Jai Vijayan, Contributing Writer, Dark Reading
Several threat actors used Amadey Bot previously to steal information and distribute malware such as the GandCrab ransomware and the FlawedAmmy RAT.

  • July 25th 2022 at 19:47

T-Mobile Pitches $4-Per-Customer Settlement for Data Leak Impacting 80M People

By Dark Reading Staff, Dark Reading
After leaking 80 million US customer data records in a cyberattack last summer, T-Mobile offers to settle a wide-ranging class action suit for just $350 million.

  • July 25th 2022 at 19:10

Why Layer 8 Is Great

By Joshua Goldfarb, Fraud Solutions Architect - EMEA and APCJ, F5
To help discern legitimate traffic from fraud, it helps to understand user intent as shown through their behavior.

  • July 25th 2022 at 18:36

Qakbot Is Back With a New Trick: DLL Sideloading

By Dark Reading Staff, Dark Reading
In the latest iteration, Qakbot operators are using DLL sideloading to deliver malware, a technique that places legitimate and malicious files together in a common directory to avoid detection.

  • July 25th 2022 at 16:54

Critical Filewave MDM Vulnerabilities Allow Attackers Full Mobile Device Control

By Nathan Eddy, Contributing Writer, Dark Reading
Two previously unknown critical vulnerabilities within FileWave’s multiplatform MDM system could grant malicious actors access to the platform's most privileged user account.

  • July 25th 2022 at 13:33

Getting Ahead of Supply Chain Attacks

By Wesley Mullins, CTO, Deepwatch
Attackers are willing to replicate entire networks, purchase domains, and persist for months, not to mention spend significantly to make these campaigns successful.

  • July 25th 2022 at 14:00

Understanding Proposed SEC Rules Through an ESG Lens

By Stephen Lawton, Contributing Writer
Cyber threats are putting environmental, social, and governance discussions at the forefront of board meetings and C-suite discussions around the globe.

  • July 22nd 2022 at 22:54

ICYMI: Neopets & the Gaming Problem; SolarWinds Hackers Are Back; Google Ads Abused

By Tara Seals, Managing Editor, News, Dark Reading
Dark Reading's weekly roundup of all the OTHER important stories of the week.

  • July 22nd 2022 at 21:26

Critical Bugs Threaten to Crack Atlassian Confluence Workspaces Wide Open

By Jai Vijayan, Contributing Writer, Dark Reading
A hardcoded password associated with the Questions for Confluence app has been publicly released, which will likely lead to exploit attempts that give cyberattackers access to all Confluence content.

  • July 22nd 2022 at 19:42

Google Chrome Zero-Day Weaponized to Spy on Journalists

By Becky Bracken, Editor, Dark Reading
Candiru attackers breached a news agency employee website to target journalists with DevilsTongue spyware, researchers say.

  • July 22nd 2022 at 18:02

Snowballing Ransomware Variants Highlight Growing Threat to VMware ESXi Environments

By Jai Vijayan, Contributing Writer, Dark Reading
Luna, Black Basta add to rapidly growing list of malware tools targeted at virtual machines deployed on VMware's bare-metal hypervisor technology.

  • July 22nd 2022 at 16:43

Phishing Bonanza: Social-Engineering Savvy Skyrockets as Malicious Actors Cash In

By Nathan Eddy, Contributing Writer, Dark Reading
The ever-evolving threat from phishing is growing more sophisticated as attackers design high-pressure situations and leverage ever-more-convincing social engineering tactics to increase their success rates.

  • July 22nd 2022 at 15:46

Thales Expands Cybersecurity Portfolio With OneWelcome Acquisition

By Don Tait, Senior Analyst, Omdia
With more staff working remotely, identity, authentication, and access have never been more important.

  • July 22nd 2022 at 15:28
❌