FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Thousands of Organizations Remain at Risk From Critical Zero-Click IP Camera Bug

By Jai Vijayan, Contributing Writer, Dark Reading
The US Cybersecurity and Infrastructure Security Agency had wanted federal agencies to implement the fix for the RCE flaw in Hikvision cameras by Jan. 24, 2022.

  • August 25th 2022 at 13:00

CISA: Just-Disclosed Palo Alto Networks Firewall Bug Under Active Exploit

By Tara Seals, Managing Editor, News, Dark Reading
The bug tracked as CVE-2022-0028 allows attackers to hijack firewalls without authentication, in order to mount DDoS hits on their targets of choice.

  • August 24th 2022 at 19:59

Efficient 'MagicWeb' Malware Subverts AD FS Authentication, Microsoft Warns

By Dark Reading Staff, Dark Reading
The Russia-backed Nobelium APT has pioneered a post-exploitation tool allowing attackers to authenticate as any user.

  • August 24th 2022 at 19:29

Ransomware Gang Demands $10M in Attack on French Hospital

By Dark Reading Staff, Dark Reading
Center Hospitalier Sud Francilien (CHSF), a hospital outside of Paris, has redirected incoming patients to other medical facilities in the wake of a ransomware attack that began on Aug. 21.

  • August 24th 2022 at 18:01

VMware LPE Bug Allows Cyberattackers to Feast on Virtual Machine Data

By Tara Seals, Managing Editor, News, Dark Reading
An insider threat or remote attacker with initial access could exploit CVE-2022-31676 to steal sensitive data and scoop up user credentials for follow-on attacks.

  • August 24th 2022 at 17:33

New Zero-Trust Maturity Data: Charting Your Own Organization

Every organization is on a zero-trust journey. Learn about how critical identity is to your security evolution, and how your organization can move forward.
  • August 24th 2022 at 17:00

Unusual Microsoft 365 Phishing Campaign Spoofs eFax Via Compromised Dynamics Voice Account

By Elizabeth Montalbano, Contributor, Dark Reading
In a widespread campaign, threat actors use a compromised Dynamics 365 Customer Voice business account and a link posing as a survey to steal Microsoft 365 credentials.

  • August 24th 2022 at 15:30

Nearly 3 Years Later, SolarWinds CISO Shares 3 Lessons From the Infamous Attack

By Kolawole Samuel Adebayo, Contributing Writer
SolarWinds CISO Tim Brown explains how organizations can prepare for eventualities like the nation-state attack on his company’s software.

  • August 24th 2022 at 14:40

Acronis' Midyear Cyberthreats Report Finds Ransomware Is the No. 1 Threat to Organizations, Projects Damages to Exceed $30 Billion by 2023

Increasing complexity in IT continues to lead to breaches and compromises, highlighting the need for more holistic approaches to cyber protection.
  • August 24th 2022 at 14:38

Why Empathy Is the Key to Better Threat Modeling

By Altaz Valani, Director of Insights Research, Security Compass
Avoid the disconnect between seeing the value in threat modeling and actually doing it with coaching, collaboration, and integration. Key to making it "everybody's thing" is communication between security and development teams.

  • August 24th 2022 at 14:00

CyberRatings.org Announces New Web Browser Test Results for 2022

Three of the world's leading browsers were measured for phishing and malware protection, with time to block and protection over time as key metrics in test scores.
  • August 24th 2022 at 13:46

Report: Financial Institutions Are Overwhelmed When Facing Growing Firmware Security and Supply Chain Threats

New research report reveals financial organizations are failing to act despite majority experiencing a firmware-related breach.
  • August 24th 2022 at 13:10

DevSecOps Gains Traction β€” but Security Still Lags

By Robert Lemos, Contributing Writer, Dark Reading
Almost half of teams develop and deploy software using a DevSecOps approach, but security remains the top area of investment, a survey finds.

  • August 23rd 2022 at 21:08

Thoma Bravo Buying Spree Highlights Hot Investor Interest in IAM Market

By Jai Vijayan, Contributing Writer, Dark Reading
M&A activity in the identity and access management (IAM) space has continued at a steady clip so far this year.

  • August 23rd 2022 at 20:00

Mudge Blows Whistle on Alleged Twitter Security Nightmare

By Tara Seals, Managing Editor, News, Dark Reading
Lawmakers and cybersecurity insiders are reacting to a bombshell report from former Twitter security head Mudge Zatko, alleging reckless security lapses that could be exploited by foreign adversaries.

  • August 23rd 2022 at 17:44

Proofpoint Introduces a Smarter Way to Stay Compliant with New Intelligent Compliance Platform

Integrated solution offers enterprises modern regulatory compliance safeguards while simplifying corporate legal protection practices.
  • August 23rd 2022 at 17:04

One-Third of Popular PyPI Packages Mistakenly Flagged as Malicious

By Robert Lemos, Contributing Writer, Dark Reading
The scans used by the Python Package Index (PyPI) to find malware fail to catch 41% of bad packages, while creating plentiful false positives.

  • August 23rd 2022 at 16:15

Coalfire Federal Among First Authorized to Conduct CMMC Assessments

Company fortifies its ability to help organizations prepare and obtain CMMC certification.
  • August 23rd 2022 at 15:30

Apathy Is Your Company's Biggest Cybersecurity Vulnerability β€” Here's How to Combat It

By Kim Burton, Head of Trust and Compliance, Tessian
Make security training more engaging to build a strong cybersecurity culture. Here are four steps security and IT leaders can take to avoid the security disconnect.

  • August 23rd 2022 at 14:00

Meta Takes Offensive Posture With Privacy Red Team

By Jeffrey Schwartz, Contributing Writer, Dark Reading
Engineering manager Scott Tenaglia describes how Meta extended the security red team model to aggressively protect data privacy.

  • August 23rd 2022 at 13:25

Novant Health Notifies Patients of Potential Data Privacy Incident

Patients face possible disclosure of protected health information (PHI) to Meta, Facebook's parent company, resulting from an incorrect configuration of an online tracking tool.
  • August 23rd 2022 at 13:20

Charming Kitten APT Wields New Scraper to Steal Email Inboxes

By Elizabeth Montalbano, Contributor, Dark Reading
Google researchers say the nation-state hacking team is now employing a data-theft tool that targets Gmail, Yahoo, and Microsoft Outlook accounts using previously acquired credentials.

  • August 23rd 2022 at 11:57

Facing the New Security Challenges That Come With Cloud

By Joseph Carson, Chief Security Scientist, Advisory CISO, Delinea
Organizations relying on multicloud or hybrid-cloud environments without ο»Ώa true understanding of their security vulnerabilities do so at their peril.

  • August 24th 2022 at 17:00

Fake DDoS Protection Alerts Distribute Dangerous RAT

By Jai Vijayan, Contributing Writer, Dark Reading
Adversaries are injecting malicious JavaScript into numerous WordPress websites that triggers phony bot-related checks.

  • August 22nd 2022 at 22:07

Metasploit Creator Renames His Startup and IT Discovery Tool Rumble to 'runZero'

By Dark Reading Staff, Dark Reading
HD Moore's company has rebranded its IT, IoT, and OT asset discovery tool as the platform rapidly evolves.

  • August 22nd 2022 at 20:30

For Penetration Security Testing, Alternative Cloud Offers Something Others Don't

Alternative cloud providers offer streamlined capabilities for penetration testing, including more accessible tools, easy deployment, and affordable pricing.
  • August 22nd 2022 at 20:00

Sophos Identifies Potential Tag-Team Ransomware Activity

By Terry Sweeney, Contributing Editor
Company research indicates ransomware gangs may be working in concert to orchestrate multiple attacks, explains Sophos’ John Shier.

  • August 22nd 2022 at 19:31

InQuest: Adding File Detection and Response to the Security Arsenal

By Terry Sweeney, Contributing Editor
InQuest’s Pedram Amini takes a deep dive into file detection and response as a way to prevent file-borne attacks.

  • August 22nd 2022 at 18:31

Secureworks: How To Distinguish Hype From Reality With AI in SecOps

By Terry Sweeney, Contributing Editor
Secureworks’ Nash Borges describes how his team has applied AI and ML to threat detection.

  • August 22nd 2022 at 17:31

New 'BianLian' Ransomware Variant on the Rise

By Elizabeth Montalbano, Contributor, Dark Reading
Novel ransomware was created with the Go open source programming language, demonstrating how malware authors increasingly are opting to employ the flexible coding language.

  • August 22nd 2022 at 16:32

Tanium: Taking A Deeper Cut At Converged Endpoint Management

By Terry Sweeney, Contributing Editor
Tanium’s Chris Hallenbeck explains how converged endpoint management helps overcome obstacles to endpoint visibility.

  • August 22nd 2022 at 16:31

Pentera Helps Enterprises Reduce Their Security Exposure

By Terry Sweeney, Contributing Editor
Pentera’s Omer Zucker outlines exposure management’s biggest challenges in closing security gaps.

  • August 22nd 2022 at 15:31

Cisco: All Intelligence is Not Created Equal

By Terry Sweeney, Contributing Editor
Threat intel has changed over the years and that’s changed how customers use it, says Matt Olney, director of Talos threat intelligence and interdiction at Cisco.

  • August 22nd 2022 at 14:31

Identity Security Pain Points and What Can Be Done

By Clayton Donley, Vice President and General Manager, Identity Management Security Division, Broadcom
Replacing passwords is not as easy as people think, but there is hope.

  • August 22nd 2022 at 14:00

How Qualys Reduces Risk and Enables Tool Consolidation

By Terry Sweeney, Contributing Editor
Sumedh Thakar, CEO of Qualys, explains how moving to a cloud-based asset management platform can simplify their strategies and improve overall security.

  • August 22nd 2022 at 13:30

Expiring Root Certificates Threaten IoT in the Enterprise

By Julianne Pepitone, Contributing Writer
What happens when businesses' smart devices break? CSOs have things to fix beyond security holes.

  • August 22nd 2022 at 12:00

Mimecast: Mitigating Risk Across a Complex Threat Landscape

By Terry Sweeney, Contributing Editor
Garrett O’Hara of Mimecast discusses how companies can bolster security of their Microsoft 365 and Google Workspace environments, since cloud services often add complexity.

  • August 21st 2022 at 19:31

Banyan Recommends Phased Approach When Introducing Zero Trust

By Terry Sweeney, Contributing Editor
Banyan Security’s Jayanth Gummaraju makes the case for why zero trust is superior to VPN technology.

  • August 21st 2022 at 13:31

DeepSurface Adds Risk-Based Approach to Vulnerability Management

By Terry Sweeney, Contributing Editor
DeepSurface’s Tim Morgan explains how network complexity and cloud computing have contributed to the challenge, and how automation can help.

  • August 20th 2022 at 19:28

The HEAT Is On, Says Menlo Security

By Terry Sweeney, Contributing Editor
Neko Papez, senior manager, cybersecurity strategy for Menlo Security, helps customers understand if they’re vulnerable to highly evasive adaptive threats (HEAT).

  • August 20th 2022 at 13:31

PIXM: Stopping Targeted Phishing Attacks With 'Computer Vision'

By Terry Sweeney, Contributing Editor
Chris Cleveland, founder of PIXM, talks about phishers’ evasive maneuvers and how organizations can tap Computer Vision to keep email and its users safe.

  • August 20th 2022 at 01:06

Intel Adds New Circuit to Chips to Ward Off Motherboard Exploits

By Agam Shah, Contributing Writer
The countermeasure, which compares the time and voltage at which circuits are activated, is being implemented in 12th Gen Intel Core processors.

  • August 20th 2022 at 00:11

NIST Weighs in on AI Risk

By Edge Editors, Dark Reading
NIST is developing the AI Risk Management Framework and a companion playbook to help organizations navigate algorithmic bias and risk.

  • August 20th 2022 at 00:00

Patch Now: 2 Apple Zero-Days Exploited in Wild

By Jai Vijayan, Contributing Writer, Dark Reading
The fact that the flaws enable remote code execution, exist across all major Apple OS technologies, and are being actively exploited heightens the need for a quick response.

  • August 19th 2022 at 21:19

Cybersecurity Solutions Must Evolve, Says Netography CEO

By Terry Sweeney, Contributing Editor
Just as cyber criminals change tactics and strategy for more effectiveness, so must infosec pros and their organizations, according to Martin Roesch of Netography.

  • August 19th 2022 at 19:31

State-Sponsored APTs Dangle Job Opps to Lure In Spy Victims

By Jeffrey Schwartz, Contributing Writer, Dark Reading
APTs continue to exploit the dynamic job market and the persistent phenomenon of remote working, as explored by PwC at Black Hat USA.

  • August 19th 2022 at 19:03

BlackByte Ransomware Gang Returns With Twitter Presence, Tiered Pricing

By Nathan Eddy, Contributing Writer, Dark Reading
Version 2.0 of the ransomware group's operation borrows extortion tactics from the LockBit 3.0 group.

  • August 19th 2022 at 17:17

Cyber Resiliency Isn't Just About Technology, It's About People

By Heather Gantt-Evans, Chief Information Security Officer, SailPoint
To lessen burnout and prioritize staff resiliency, put people in a position to succeed with staffwide cybersecurity training to help ease the burden on IT and security personnel.

  • August 19th 2022 at 14:00

Easing the Cyber-Skills Crisis With Staff Augmentation

Filling cybersecurity roles can be costly, slow, and chancy. More firms are working with third-party service providers to quickly procure needed expertise.

  • August 18th 2022 at 21:28

China's APT41 Embraces Baffling Approach for Dropping Cobalt Strike Payload

By Jai Vijayan, Contributing Writer, Dark Reading
The state-sponsored threat actor has switched up its tactics, also adding an automated SQL-injection tool to its bag of tricks for initial access.

  • August 18th 2022 at 18:34

Mac Attack: North Korea's Lazarus APT Targets Apple's M1 Chip

By Jeffrey Schwartz, Contributing Writer, Dark Reading
Lazarus continues to expand an aggressive, ongoing spy campaign, using fake Coinbase job openings to lure in victims.

  • August 18th 2022 at 18:23

5 Russia-Linked Groups Target Ukraine in Cyberwar

By Robert Lemos, Contributing Writer, Dark Reading
Information on the attributed cyberattacks conducted since the beginning of the Russia-Ukraine war shows that a handful of groups conducted more than two dozen attacks.

  • August 18th 2022 at 17:17

Which Security Bugs Will Be Exploited? Researchers Create an ML Model to Find Out

By Robert Lemos, Contributing Writer, Dark Reading
How critical is that vulnerability? University researchers are improving predictions of which software flaws will end up with an exploit, a boon for prioritizing patches and estimating risk.

  • August 18th 2022 at 14:42

Summertime Blues: TA558 Ramps Up Attacks on Hospitality, Travel Sectors

By Nathan Eddy, Contributing Writer, Dark Reading
The cybercriminal crew has used 15 malware families to target travel and hospitality companies globally, constantly changing tactics over the course of its four-year history.

  • August 18th 2022 at 14:38

How to Upskill Tech Staff to Meet Cybersecurity Needs

By Aaron Rosenmund, Director of Security Research and Curriculum, Pluralsight
Cybersecurity is the largest current tech skills gap; closing it requires a concerted effort to upskill existing staff.

  • August 18th 2022 at 14:00

Google Cloud Adds Curated Detection to Chronicle

By Dark Reading Staff, Dark Reading
The curated detection feature for Chronicle SecOps Suite provides security teams with actionable insights on cloud threats and Windows-based attacks from Google Cloud Threat Intelligence Team.

  • August 18th 2022 at 01:00

Google Chrome Zero-Day Found Exploited in the Wild

By Dark Reading Staff, Dark Reading
The high-severity security vulnerability (CVE-2022-2856) is due to improper user-input validation.

  • August 17th 2022 at 18:49

'DarkTortilla' Malware Wraps in Sophistication for High-Volume RAT Infections

By Jai Vijayan, Contributing Writer, Dark Reading
The stealthy crypter, active since 2015, has been used to deliver a wide range of information stealers and RATs at a rapid, widespread clip.

  • August 17th 2022 at 18:39
❌