FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Ransomware: The Latest Chapter

By Daniel Clayton, Vice President, Global Security Services and Support, Bitdefender
As ransomware attacks continue to evolve, beyond using security best practices organizations can build resiliency with extended detection and response solutions and fast response times to shut down attacks.

  • September 21st 2022 at 14:00

Microsoft Brings Zero Trust to Hardware in Windows 11

By Karen Spiegelman, Features Editor
A stacked combination of hardware and software protects the next version of Windows against the latest generation of firmware threats.

  • September 21st 2022 at 03:33

ChromeLoader Malware Evolves into Prevalent, More Dangerous Cyber Threat

By Jai Vijayan, Contributing Writer, Dark Reading
Microsoft and VMware are warning that the malware, which first surfaced as a browser-hijacking credential stealer, is now being used to drop ransomware, steal data, and crash systems at enterprises.

  • September 20th 2022 at 20:33

2-Step Email Attack Uses Powtoon Video to Execute Payload

By Dark Reading Staff, Dark Reading
The attack uses hijacked Egress branding and the legit Powtoon video platform to steal user credentials.

  • September 20th 2022 at 19:14

Beware of Phish: American Airlines, Revolut Data Breaches Expose Customer Info

By Tara Seals, Managing Editor, News, Dark Reading
The airline and the fintech giant both fell to successful phishing attacks against employees.

  • September 20th 2022 at 19:00

Cast AI Introduces Cloud Security Insights for Kubernetes

By Nathan Eddy, Contributing Writer, Dark Reading
The release augments the company's Kubernetes management platform with free, user-friendly insight on security postures, along with cost monitoring and observability.

  • September 20th 2022 at 18:20

Spell-Checking in Google Chrome, Microsoft Edge Browsers Leaks Passwords

By Elizabeth Montalbano, Contributor, Dark Reading
It's called "spell-jacking": Both browsers have spell-check features that send data to Microsoft and Google when users fill out forms for websites or Web services.

  • September 20th 2022 at 17:37

Survey Shows CISOs Losing Confidence in Ability to Stop Ransomware Attacks

By Dark Reading Staff, Dark Reading
Despite an 86% surge in budget resources to defend against ransomware, 90% of orgs were impacted by attacks last year, a survey reveals.

  • September 20th 2022 at 17:16

How to Dodge New Ransomware Tactics

By Oliver Rochford, Director of Applied Research, Securonix
The evolving tactics increase the threat of ransomware operators, but there are steps organizations can take to protect themselves.

  • September 20th 2022 at 17:00

No Motivation for Quantum Without Regulatory Push

By Edge Editors, Dark Reading
What's it going to take to prod organizations to implement a post-quantum security plan? Legislative pressure.

  • September 20th 2022 at 16:44

ThreatQuotient Enhances Data-Driven Automation Capabilities With New ThreatQ TDR Orchestrator Features

Focused on bringing ease of use to IT security automation, ThreatQ TDR Orchestrator addresses industry needs for simpler implementation and more efficient operations.
  • September 20th 2022 at 14:52

Invicti Security and ESG Report on How Companies are Shifting for Higher Quality, Secure Application Code

The balance of deploying secure applications vs. time to market continues to be the biggest risk to organizations.
  • September 20th 2022 at 14:34

Byos Releases Free Assessment Tool to Provide Companies With Tailored Network Security Recommendations

Assessment tool instantly generates a detailed report breaking down a company’s current network security maturity and recommended next steps.
  • September 20th 2022 at 14:24

Water Sector Will Benefit From Call for Cyber Hardening of Critical Infrastructure

By Duncan Greatwood, CEO, Xage
A call for federal agency "review and assessment" of cyber-safety plans at water treatment plants should better protect customers and move the industry forward.

  • September 20th 2022 at 14:00

CrowdStrike Investment Spotlights API Security

By Dark Reading Staff, Dark Reading
The investment in Salt Security underscores the fact that attacks targeting APIs are increasing.

  • September 20th 2022 at 00:00

Uber: Lapsus$ Targeted External Contractor With MFA Bombing Attack

By Jai Vijayan, Contributing Writer, Dark Reading
The ride-sharing giant says a member of the notorious Lapsus$ hacking group started the attack by compromising an external contractor's credentials, as researchers parse the incident for takeaways.

  • September 19th 2022 at 21:24

Rockstar Games Confirms 'Grand Theft Auto 6' Breach

By Robert Lemos, Contributing Writer, Dark Reading
The Take-Two Interactive subsidiary acknowledges an attack on its systems, where an attacker downloaded "early development footage for the next Grand Theft Auto" and other assets.

  • September 19th 2022 at 21:01

Cyberattackers Make Waves in Hotel Swimming Pool Controls

By Dark Reading Staff, Dark Reading
Pool controllers exposed to the Internet with default passwords let threat actors tweak pool pH levels, and potentially more.

  • September 19th 2022 at 18:12

5 Ways to Improve Fraud Detection and User Experience

By Joshua Goldfarb, Fraud Solutions Architect - EMEA and APCJ, F5
If we know a user is legitimate, then why would we want to make their user experience more challenging?

  • September 19th 2022 at 16:59

TPx Introduces Penetration Scanning, Expands Security Advisory Services

TPx, a leading nationwide managed services provider (MSP) delivering cybersecurity, managed networks, and cloud communications, today announced the addition of penetration scanning to its Security Advisory Services portfolio.
  • September 19th 2022 at 16:58

Cyberattack Costs for US Businesses up by 80%

By Marc Wilczek, Digital Strategist & COO, Link11
Cyberattacks keep inflicting more expensive damage, but firms are responding decisively to the challenge.

  • September 19th 2022 at 14:00

Attacker Apparently Didn't Have to Breach a Single System to Pwn Uber

By Jai Vijayan, Contributing Writer, Dark Reading
Alleged teen hacker claims he found an admin password in a network share inside Uber that allowed complete access to ride-sharing giant's AWS, Windows, Google Cloud, VMware, and other environments.

  • September 16th 2022 at 20:37

Tackling Financial Fraud With Machine Learning

By Tatiana Walk-Morris, Contributing Writer
Financial services firms need to learn how β€” and when β€” to put machine learning to use.

  • September 16th 2022 at 20:00

Real Estate Phish Swallows 1,000s of Microsoft 365 Credentials

By Tara Seals, Managing Editor, News, Dark Reading
The attacks showcase broader security concerns as phishing grows in volume and sophistication, especially given that Windows Defender's Safe Links feature for identifying malicious links in emails completely failed in the campaign.

  • September 16th 2022 at 18:30

Keep Today's Encrypted Data From Becoming Tomorrow's Treasure

By Vikram Sharma, CEO & Founder, QuintessenceLabs
Building quantum resilience requires C-suite commitment, but it doesn't have to mean tearing out existing infrastructure.

  • September 16th 2022 at 18:00

DDoS Attack Against Eastern Europe Target Sets New Record

By Dark Reading Staff, Dark Reading
The target has been under relentless DDoS attack, which ultimately set a new packets-per-second record for Europe.

  • September 16th 2022 at 17:24

Hacker Pwns Uber Via Compromised VPN Account

By Tara Seals, Managing Editor, News, Dark Reading
A teen hacker reportedly social-engineered an Uber employee to hand over an MFA code to unlock the corporate VPN, before burrowing deep into Uber's cloud and code repositories.

  • September 16th 2022 at 14:21

Highlights of the 2022 Pwnie Awards

By Karen Spiegelman, Features Editor
Since 2007, the Pwnies have celebrated the good, the bad, and the wacky in cybersecurity. Enjoy some of the best moments of this year's ceremony.

  • September 16th 2022 at 14:08

Business Application Compromise & the Evolving Art of Social Engineering

By Jonathan Hencinski, Vice President of Security Operations, Expel
Be wary of being pestered into making a bad decision. As digital applications proliferate, educating users against social engineering attempts is a key part of a strong defense.

  • September 16th 2022 at 14:00

Note to Security Vendors: Companies Are Picking Favorites

By Robert Lemos, Contributing Writer, Dark Reading
A stunning three-quarters of companies are looking to consolidate their security products this year, up from 29% in 2020, suggesting fiercer competition among cybersecurity vendors.

  • September 15th 2022 at 20:31

Malware on Pirated Content Sites a Major WFH Risk for Enterprises

By Jai Vijayan, Contributing Writer, Dark Reading
Malware-laced ads are hauling in tens of millions of dollars in revenue for operators of pirated-content sites β€” posing a real risk to enterprises from remote employees.

  • September 15th 2022 at 19:37

Will the Cloud End the Endpoint?

When an organization fully embraces the cloud, traditional endpoints become disposable. Organizations must adapt their security strategy for this reality.
  • September 15th 2022 at 19:00

Popular IoT Cameras Need Patching to Fend Off Catastrophic Attacks

By Dark Reading Staff, Dark Reading
Several models of EZVIZ cameras are open to total remote control by cyberattackers, and image exfiltration and decryption.

  • September 15th 2022 at 19:00

5 Steps to Strengthening Cyber Resilience

By Microsoft Security, Microsoft
Organizations are thinking about their cyber resilience. Here are five steps security teams should take.

  • September 15th 2022 at 16:00

Unflagging Iranian Threat Activity Spurs Warnings, Indictments From US Government

By Elizabeth Montalbano, Contributor, Dark Reading
Authorities are cracking down on persistent cybercriminal attacks from APTs associated with Iran's Islamic Revolutionary Guard Corps.

  • September 15th 2022 at 14:40

5 Best Practices for Building Your Data Loss Prevention Strategy

By Richard Kanadjian, Encrypted USB Business Manager, Kingston Technology
The entire security team should share in the responsibility to secure sensitive data.

  • September 15th 2022 at 14:00

Fortanix Raises $90M in Series C Funding Led by Goldman Sachs Asset Management

Oversubscribed round validates company's data-first approach to solving cloudβ€―security and privacy issues for global businesses thwarting data breaches and ransomwar
  • September 15th 2022 at 13:21

Token-Mining Weakness in Microsoft Teams Makes for Perfect Phish

By Robert Lemos, Contributing Writer, Dark Reading
Access tokens for other Teams users can be recovered, allowing attackers to move from a single compromise to the ability to impersonate critical employees, but Microsoft isn't planning to patch.

  • September 15th 2022 at 13:00

White House Guidance Recommends SBOMs for Federal Agencies

By Dark Reading Staff, Dark Reading
New executive order stops short of mandating NIST's guidelines, but recommends SBOMs for federal agencies across government.

  • September 14th 2022 at 20:00

How to Use SSH Keys and 1Password to Sign Git Commits

By Nathan Eddy, Contributing Writer, Dark Reading
This Tech Tip walks through the steps to set up signed commits with SSH keys stored in 1Password.

  • September 14th 2022 at 18:39

SparklingGoblin Updates Linux Version of SideWalk Backdoor in Ongoing Cyber Campaign

By Elizabeth Montalbano, Contributor, Dark Reading
Researchers link the APT to an attack on a Hong Kong university, which compromised multiple key servers using advanced Linux malware.

  • September 14th 2022 at 16:15

To Ease the Cybersecurity Worker Shortage, Broaden the Candidate Pipeline

By Joshua Scott, Head of Information Security and IT, Postman
With enough passion, intelligence, and effort, anyone can be a successful cybersecurity professional, regardless of education or background.

  • September 14th 2022 at 14:00

Cyberattacks Are Now Increasingly Hands-On, Break Out More Quickly

By Robert Lemos, Contributing Writer, Dark Reading
Interactive intrusion campaigns jumped nearly 50%, while the breakout time between initial access and lateral movement shrank to less than 90 minutes, putting pressure on defenders to react quickly.

  • September 14th 2022 at 14:00

TeamTNT Hits Docker Containers via 150K Malicious Cloud Image Pulls

By Jai Vijayan, Contributing Writer, Dark Reading
Honeypot activity exposed two credentials that the threat actor is using to host and distribute malicious container images, security vendor says.

  • September 14th 2022 at 13:00

Key Takeaways From the Twitter Whistleblower's Testimony

By Edge Editors, Dark Reading
Twitter did not know what data it had or who had access to it, Peiter "Mudge" Zatko told Congressional lawmakers during a Senate panel hearing.

  • September 14th 2022 at 00:59

Bishop Fox Releases Cloud Enumeration Tool CloudFox

By Dark Reading Staff, Dark Reading
CloudFox is a command-line tool that helps penetration testers understand unknown cloud environments.

  • September 13th 2022 at 22:34

Microsoft Quashes Actively Exploited Zero-Day, Wormable Critical Bugs

By Tara Seals, Managing Editor, News, Dark Reading
In Microsoft's lightest Patch Tuesday update of the year so far, several security vulnerabilities stand out as must-patch, researchers warn.

  • September 13th 2022 at 21:17

U-Haul Customer Contract Search Tool Compromised

By Becky Bracken, Editor, Dark Reading
Password compromise led to unauthorized access to a customer contract search tool over a five-month window, according to the company.

  • September 13th 2022 at 19:50

ShadowPad Threat Actors Return With Fresh Government Strikes, Updated Tools

By Jai Vijayan, Contributing Writer, Dark Reading
Cyber spies are using legitimate apps for DLL sideloading, deploying an updated range of malware, including the new "Logdatter" info-stealer.

  • September 13th 2022 at 19:43

Cyberattackers Abuse Facebook Ad Manager in Savvy Credential-Harvesting Campaign

By Ericka Chickowski, Contributing Writer, Dark Reading
Facebook lead-generation forms are being repurposed to collect passwords and credit card information from unsuspecting Facebook advertisers.

  • September 13th 2022 at 19:26

Name That Toon: Shiver Me Timbers!

By John Klossner, Cartoonist
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

  • September 13th 2022 at 17:15

Opus Security Emerges from Stealth with $10M in Funding for Cloud SecOps and Remediation Processes

Siemplify veterans introduce Cloud Security Orchestration and Remediation platform, backed by high-profile investors including YL Ventures, Tiger Global, and CEOs of CrowdStrike and CyberArk
  • September 13th 2022 at 17:02

Lorenz Ransomware Goes After SMBs via Mitel VoIP Phone Systems

By Elizabeth Montalbano, Contributor, Dark Reading
The ransomware gang has been seen exploiting a Mitel RCE flaw discovered in VoIP devices in April (and patched in July) to perform double-extortion attacks.

  • September 13th 2022 at 14:13

Business Security Starts With Identity

By Josephina Fernandez, Senior Director of Enterprise Security, Cisco
How identity-centric security can support business objectives.

  • September 13th 2022 at 14:00

Attackers Can Compromise Most Cloud Data in Just 3 Steps

By Robert Lemos, Contributing Writer, Dark Reading
An analysis of cloud services finds that known vulnerabilities typically open the door for attackers, while insecure cloud architectures allow them to gain access to the crown jewels.

  • September 13th 2022 at 13:00
❌