FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Feds, npm Issue Supply Chain Security Guidance to Avert Another SolarWinds

By Dark Reading Staff, Dark Reading
The US government and the Open Source Security Foundation have released guidance to shore up software supply chain security, and now it's up to developers to act.

  • September 2nd 2022 at 19:02

Researchers Spot Snowballing BianLian Ransomware Gang Activity

By Nathan Eddy, Contributing Writer, Dark Reading
The operators of the emerging cross-platform ransomware BianLian increased their command and control infrastructure this month, indicating an acceleration in their operational pace.

  • September 2nd 2022 at 18:56

4 Scenarios for the Digital World of 2040

By Laurent CΓ©lΓ©rier, Executive VP of Technology & Marketing at Orange Cyberdefense
Our digital future depends on the choices we make today. We need to invest in cybersecurity technologies and skills so that humanity can control its future.

  • September 2nd 2022 at 17:44

Raspberry Robin Malware Connected to Russian Evil Corp Gang

By Robert Lemos, Contributing Writer, Dark Reading
Infections attributed to the USB-based worm have taken off, and now evidence links the malware to Dridex and the sanctioned Russian cybercriminal group Evil Corp.

  • September 2nd 2022 at 16:52

AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data

By Tara Seals, Managing Editor, News, Dark Reading
Thousands of corporate mobile apps developed by businesses for use by their customers contain hardcoded AWS tokens that can be easily extracted and used to access the full run of corporate data stored in cloud buckets.

  • September 2nd 2022 at 15:16

The Makings of a Successful Threat-Hunting Program

By Joseph Davidson, Senior Manager, Threat Hunting, Adobe
Threat hunters can help build defenses as they work with offensive security teams to identify potential threats and build stronger threat barriers.

  • September 2nd 2022 at 14:00

Ragnar Locker Brags About TAP Air Portugal Breach

By Dark Reading Staff, Dark Reading
TAP assures its customers that it stopped data theft in a recent cyberattack, but the Ragnar Locker ransomware group says it made off with user info.

  • September 2nd 2022 at 13:25

Ghost Data Increases Enterprise Business Risk

By Edge Editors, Dark Reading
IT has to get its hands around cloud data sprawl. Another area of focus should be on ghost data, as it expands the organization's cloud attack surface.

  • September 2nd 2022 at 00:00

Neopets Hackers Had Network Access for 18 Months

By Dark Reading Staff, Dark Reading
Neopets has confirmed that its IT systems were compromised from January 2021 through July 2022, exposing 69 million user accounts and source code.

  • September 1st 2022 at 20:36

Threat Actor Phishing PyPI Users Identified

By Jai Vijayan, Contributing Writer, Dark Reading
"JuiceLedger" has escalated a campaign to distribute its information stealer by now going after developers who published code on the widely used Python code repository.

  • September 1st 2022 at 20:35

Skyrocketing IoT Bug Disclosures Put Pressure on Security Teams

By Robert Lemos, Contributing Writer, Dark Reading
The expanding Internet of Things ecosystem is seeing a startling rate of vulnerability disclosures, leaving companies with a greater need for visibility into and patching of IoT devices.

  • September 1st 2022 at 19:49

New Guidelines Spell Out How to Test IoT Security Products

By Nathan Eddy, Contributing Writer, Dark Reading
The proposed AMTSO guidelines offer a roadmap for comprehensive testing of IoT security products.

  • September 1st 2022 at 19:49

Code-Injection Bugs Bite Google, Apache Open Source GitHub Projects

By Ericka Chickowski, Contributing Writer, Dark Reading
The insecurities exist in CI/CD pipelines and can be used by attackers to subvert modern development and roll out malicious code at deployment.

  • September 1st 2022 at 16:52

Apple Quietly Releases Another Patch for Zero-Day RCE Bug

By Elizabeth Montalbano, Contributor, Dark Reading
Apple continues a staged update process to address a WebKit vulnerability that allows attackers to craft malicious Web content to load malware on affected devices.

  • September 1st 2022 at 14:45

(ISC)Β² Launches 'Certified in Cybersecurity' Entry-Level Certification to Address Global Workforce Gap

After a rigorous pilot program, the association's newest certification is officially operational. More than 1,500 pilot participants who passed the exam are on the path to full certification.
  • September 1st 2022 at 14:18

Real-World Cloud Attacks: The True Tasks of Cloud Ransomware Mitigation

By Ofer Maor, CTO and Co-Founder, Mitiga
Cloud breaches are inevitable β€” and so is cloud ransomware. (Second of two parts.)

  • September 1st 2022 at 14:00

Closing the Security Gap Opened by the Rise of No-Code Tools

By Kolawole Samuel Adebayo, Contributing Writer
No-code startups such as Mine PrivacyOps say they offer best of both worlds β€” quick development and compliance with privacy laws.

  • August 31st 2022 at 23:20

Google Fixes 24 Vulnerabilities With New Chrome Update

By Jai Vijayan, Contributing Writer, Dark Reading
But one issue that lets websites overwrite content on a user's system clipboard appears unfixed in the new Version 105 of Chrome.

  • August 31st 2022 at 20:10

Crypto-Crooks Spread Trojanized Google Translate App in Watering-Hole Attack

By Tara Seals, Managing Editor, News, Dark Reading
The ongoing campaign is spreading worldwide, using the lure of a fully functional Google Translate application for desktops that has helped the threat stay undetected for months.

  • August 31st 2022 at 20:09

James Webb Telescope Images Loaded With Malware Are Evading EDR

By Dark Reading Staff, Dark Reading
New Golang cyberattacks use deep space images and a new obfuscator to target systems β€” undetected.

  • August 31st 2022 at 18:00

The Pros and Cons of Managed Firewalls

Managed firewalls are increasingly popular. This post examines the strengths and weaknesses of managed firewalls to help your team decide on the right approach.
  • August 31st 2022 at 18:00

OpenText Goes All-in on Cybersecurity Size and Scale With Micro Focus Purchase

By Curtis Franklin, Senior Analyst, Omdia
OpenText makes a $6 billion bet that bigger is better in security and that cybersecurity platform plays are the future.

  • August 31st 2022 at 17:00

(ISC)Β² Opens Global Enrollment for '1 Million Certified in Cybersecurity' Initiative

(ISC)Β² pledges to expand and diversify the cybersecurity workforce by providing free "(ISC)Β² Certified in Cybersecurity" education and exams to 1 million people worldwide.
  • August 31st 2022 at 16:41

TikTok for Android Bug Allows Single-Click Account Hijack

By Elizabeth Montalbano, Contributor, Dark Reading
A security vulnerability (CVE-2022-28799) in one of TikTok for Android's deeplinks could affect billions of users, Microsoft warns.

  • August 31st 2022 at 16:00

The Inevitability of Cloud Breaches: Tales of Real-World Cloud Attacks

By Ofer Maor, CTO and Co-Founder, Mitiga
While cloud breaches are going to happen, that doesn't mean we can't do anything about them. By better understanding cloud attacks, organizations can better prepare for them. (First of two parts.)

  • August 31st 2022 at 14:00

SecureAuth Announces General Availability of Arculix, Its Next-Gen Passwordless, Continuous-Authentication Platform

Next-gen platform delivers adaptive and robust, continuous authentication with identity orchestration and a frictionless user experience.
  • August 31st 2022 at 13:29

New ODGen Tool Unearths 180 Zero-Days in Node.js Libraries

By Jai Vijayan, Contributing Writer, Dark Reading
New graph-based tool offers a better alternative to current approaches for finding vulnerabilities in JavaScript code, they note.

  • August 30th 2022 at 22:21

Don't Let 'Perfect' Be the Enemy of a Good AppSec Program

By Tanya Janca, Founder and CEO, We Hack Purple; Director of Developer Relations and Community, Bright Security
These five suggestions provide a great place to start building a scalable and affordable program for creating secure apps.

  • August 30th 2022 at 20:51

Malicious Chrome Extensions Plague 1.4M Users

By Dark Reading Staff, Dark Reading
Analysts find five cookie-stuffing extensions, including one that's Netflix-themed, that track victim browsing and insert rogue IDs into e-commerce sites to rack up fake affiliate payments.

  • August 30th 2022 at 20:00

Chinese Hackers Target Energy Sector in Australia, South China Sea

By Nathan Eddy, Contributing Writer, Dark Reading
The phishing campaign deploying a ScanBox reconnaissance framework has targeted the Australian government and companies maintaining wind turbines in the South China Sea.

  • August 30th 2022 at 17:34

Security Culture: An OT Survival Story

By Edward Liebig, Global Director of Cyber-Ecosystem, Hexagon
The relationship between information technology and operational technology will need top-down support if a holistic security culture is to truly thrive.

  • August 30th 2022 at 17:00

Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware

Nearly half of respondents say their company relies on outdated backup and recovery infrastructure β€” in some cases dating back to the 1990s, before today's sophisticated cyberattacks.
  • August 30th 2022 at 15:04

Phishing Campaign Targets PyPI Users to Distribute Malicious Code

By Elizabeth Montalbano, Contributor, Dark Reading
The first-of-its-kind campaign threatens to remove code packages if developers don’t submit their code to a "validation" process.

  • August 30th 2022 at 14:16

Building a Strong SOC Starts With People

By Neil Weitzel, SOC Manager, ThreatX
A people-first approach reduces fatigue and burnout, and it empowers employees to seek out development opportunities, which helps retention.

  • August 30th 2022 at 14:00

Google Expands Bug Bounties to Its Open Source Projects

By Robert Lemos, Contributing Writer, Dark Reading
The search engine giant's Vulnerability Rewards Program now covers any Google open source software projects β€” with a focus on critical software such as Go and Angular.

  • August 30th 2022 at 13:33

Cerberus Sentinel Announces Acquisition of CUATROi

US cybersecurity services firm expands services in Latin America.
  • August 30th 2022 at 13:17

A Peek Into CISA's Post-Quantum Cryptography Roadmap

By Edge Editors, Dark Reading
To help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.

  • August 30th 2022 at 00:26

Receipt for €8M iOS Zero-Day Sale Pops Up on Dark Web

By Dark Reading Staff, Dark Reading
Documents appear to show that Israeli spyware company Intellexa sold a full suite of services around a zero-day affecting both Android and iOS ecosystems.

  • August 29th 2022 at 19:00

3 Ways No-Code Developers Can Shoot Themselves in the Foot

By Michael Bargury, CTO & Co-Founder, Zenity
Low/no-code tools allow citizen developers to design creative solutions to address immediate problems, but without sufficient training and oversight, the technology can make it easy to make security mistakes.

  • August 29th 2022 at 16:55

Cyber-Insurance Firms Limit Payouts, Risk Obsolescence

By Robert Lemos, Contributing Writer, Dark Reading
Businesses need to re-evaluate their cyber-insurance policies as firms like Lloyd's of London continue to add restrictions, including excluding losses related to state-backed cyberattackers.

  • August 29th 2022 at 14:34

NATO Investigates Dark Web Leak of Data Stolen From Missile Vendor

By Elizabeth Montalbano, Contributor, Dark Reading
Documents allegedly belonging to an EU defense dealer include those relating to weapons used by Ukraine in its fight against Russia.

  • August 29th 2022 at 14:21

The 3 Questions CISOs Must Ask to Protect Their Sensitive Data

By Asaf Kochan, Co-Founder and President, Sentra, and Former Commander of Unit 8200
CISOs must adopt a new mindset to take on the moving targets in modern cybersecurity.

  • August 29th 2022 at 14:00

Cyber Insurers Clamp Down on Clients' Self-Attestation of Security Controls

By Stephen Lawton, Contributing Writer
After one company suffered a breach that could have been headed off by the MFA it claimed to have, insurers are looking to confirm claimed cybersecurity measures.

  • September 21st 2022 at 16:18

LastPass Suffers Data Breach, Source Code Stolen

By Tara Seals, Managing Editor, News, Dark Reading
Researchers warned that cyberattackers will be probing the code for weaknesses to exploit later.

  • August 26th 2022 at 17:37

'Sliver' Emerges as Cobalt Strike Alternative for Malicious C2

By Jai Vijayan, Contributing Writer, Dark Reading
Microsoft and others say they have observed nation-state actors, ransomware purveyors, and assorted cybercriminals pivoting to an open source attack-emulation tool in recent campaigns.

  • August 26th 2022 at 15:45

'No-Party' Data Architectures Promise More Control, Better Security

By Robert Lemos, Contributing Writer, Dark Reading
Consumers gain control of their data while companies build better relationships with their customers β€” but third-party ad-tech firms will likely continue to stand in the way.

  • August 26th 2022 at 14:05

How DevSecOps Empowers Citizen Developers

By Daniel Riedel, Senior Vice President, Strategic Services, Copado
DevSecOps can help overcome inheritance mentality, especially in low- and no-code environments.

  • August 26th 2022 at 14:00

Endpoint Protection / Antivirus Products Tested for Malware Protection

Six out of the eight products achieved an "A" rating or higher for blocking malware attacks. Reports are provided to the community for free.
  • August 26th 2022 at 13:18

Capital One Joins Open Source Security Foundation

OpenSSF welcomes Capital One as a premier member affirming its commitment to strengthening the open source software supply chain.
  • August 26th 2022 at 13:02

Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply Chain Attack

By Tara Seals, Managing Editor, News, Dark Reading
The "0ktapus" cyberattackers set up a well-planned spear-phishing effort that affected at least 130 orgs beyond Twilio and Cloudflare, including Digital Ocean, DoorDash and Mailchimp.

  • August 25th 2022 at 18:55

ReasonLabs Launches Free Online Security Tool to Power Secure Web Experience for Millions of Global Users

Online Security autonomously blocks malicious URLs, extensions, ad trackers, and pop-ups 24/7, protecting consumers from complex and rapidly evolving cyber threats online.
  • August 25th 2022 at 16:09

More Bang for the Buck: Cross-Platform Ransomware Is the Next Problem

By Robert Lemos, Contributing Writer, Dark Reading
As cryptocurrency valuations make strikes less lucrative, ransomware gangs like the new RedAlert and Monster groups are modifying their tools to attack across platforms.

  • August 25th 2022 at 15:13

Wyden Renews Call to Encrypt Twitter DMs, Secure Americans' Data From Unfriendly Foreign Governments

Following whistleblower complaint, Oregon senator renews commitment to passing bipartisan legislation to address the national security risks.
  • August 25th 2022 at 15:00

Senior-Level Women Leaders in Cybersecurity Form New Nonprofit

By Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
The Forte Group, which gained momentum as an informal organization during the pandemic, will offer career development and advocacy for women execs in cybersecurity as well as newcomers.

  • August 25th 2022 at 15:00

Cyberstarts Closes $60M in Seed Fund III

Venture firm hires former Splunk CEO to spearhead new GTM advisory board and help portfolio companies scale up.
  • August 25th 2022 at 14:39

The (Nation) State of Cyber: 64% of Businesses Suspect They've Been Targeted or Impacted by Nation-State Attacks

According to new Venafi research, two-thirds of organizations have changed cyber strategy in response to war in Ukraine.
  • August 25th 2022 at 14:19

What You Need to Know About the Psychology Behind Cyber Resilience

By Bec McKeown, Director of Human Science, Immersive Labs
Understanding how and why people respond to cyber threats is key to building cyber-workforce resilience.

  • August 25th 2022 at 14:00

Penetration Testing Market Worth $2.7B By 2027: MarketsandMarkets(TM) Report

Increase driven by increasingly sophisticated cyberattacks as well as increase in mobile-based business-critical applications, according to report.
  • August 25th 2022 at 13:56

Optiv's Annual $40K Scholarship for Black, African-American-Identifying STEM Students Now Open for Applicants

Optiv's Black Employee Network offers the scholarship, paid out over 4 years, for students seeking a career in the cybersecurity/information security industry.
  • August 25th 2022 at 13:03

New Exterro FTK Update Accelerates Mobile Digital Forensics

By Dark Reading Staff, Dark Reading
The FTK 7.6 portfolio promises better integration with other security and network resources, as well as unified analysis of mobile and computer evidence.

  • August 25th 2022 at 13:00
❌