FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

FanDuel Sportsbook Bettors Exposed in Mailchimp Breach

By Dark Reading Staff, Dark Reading
Amid all the NFL playoff action, FanDuel has sent an email warning to gamblers that their data was exposed in its third-party breach, putting them at risk for phishing attacks.

  • January 23rd 2023 at 17:48

No One Wants to Be Governed, Everyone Wants to Be Helped

By Michael Bargury, CTO & Co-Founder, Zenity
Here's how a security team can present itself to citizen developers as a valuable resource rather than a bureaucratic roadblock.

  • January 23rd 2023 at 17:32

TSA No-Fly List Snafu Highlights Risk of Keeping Sensitive Data in Dev Environments

By Jai Vijayan, Contributing Writer, Dark Reading
A Swiss hacker poking around in an unprotected Jenkins development server belonging to CommuteAir accessed the names and birthdates of some 1.5 million people on a TSA no-fly list from 2019.

  • January 23rd 2023 at 17:05

Hunting Insider Threats on the Dark Web

By Jim Simpson, Director of Threat Intelligence, Searchlight Cyber
Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.

  • January 23rd 2023 at 15:00

Cybersecurity Worries Around Hybrid Working Drop, but Many IT Leaders Still Concerned Over Cyber-Skills Gap

S-RM reports show that cybersecurity concerns surrounding hybrid work prevail for 37% of organizations.
  • January 23rd 2023 at 14:50

T-Mobile Breached Again, This Time Exposing 37M Customers' Data

By Becky Bracken, Editor, Dark Reading
This time around, weak API security allowed a threat actor to access account information, the mobile phone giant reported.

  • January 20th 2023 at 21:37

Ransomware Profits Decline as Victims Dig In, Refuse to Pay

By Jai Vijayan, Contributing Writer, Dark Reading
Two new reports show ransomware revenues for threat actors dropped sharply in 2022 as more victims ignored ransom demands.

  • January 20th 2023 at 21:18

Compromised Zendesk Employee Credentials Lead to Breach

By Becky Bracken, Editor, Dark Reading
Zendesk has alerted customers to a successful SMS phishing campaign that has exposed "service data," but details remain scarce.

  • January 20th 2023 at 21:10

GPT Emerges as Key AI Tech for Security Vendors

By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
Orca Security is one of the companies integrating conversational AI technology into its products.

  • January 20th 2023 at 21:00

Critical Manufacturing Sector in the Bull's-eye

By Nathan Eddy, Contributing Writer, Dark Reading
Serious security flaws go unpatched, and ransomware attacks increase against manufacturers.

  • January 20th 2023 at 16:22

The Evolution of Account Takeover Attacks: Initial Access Brokers for IoT

By Daniel dos Santos, Head of Security Research, Forescout's Vedere Labs
Head off account takeover attacks by being proactive about IoT security. Start with designing and building better security protocols into IoT devices, always change weak default configurations, and regularly apply patches to ensure that IoT devices are secure.

  • January 20th 2023 at 15:00

PayPal Breach Exposed PII of Nearly 35K Accounts

By Becky Bracken, Editor, Dark Reading
The credential-stuffing attack, likely fueled by password reuse, yielded personal identifiable information that can be used to verify the authenticity of previously stolen data.

  • January 20th 2023 at 00:20

EmojiDeploy Attack Chain Targets Misconfigured Azure Service

By Robert Lemos, Contributing Writer, Dark Reading
Multiple misconfigurations in a service that underpins many Azure features could have allowed an attacker to remotely compromise a cloud user's system.

  • January 19th 2023 at 23:14

Massive Adware Campaign Shuttered

By Dark Reading Staff, Dark Reading
Mainly Apple iOS in-app ads were targeted, injecting malicious JavaScript code to rack up phony views.

  • January 19th 2023 at 22:00

Attackers Crafted Custom Malware for Fortinet Zero-Day

By Jai Vijayan, Contributing Writer, Dark Reading
The "BoldMove" backdoor demonstrates a high level of knowledge of FortiOS, according to Mandiant researchers, who said the attacker appears to be based out of China.

  • January 19th 2023 at 21:30

Shift Identity Left: Preventing Identity-Based Breaches

Traditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches.
  • January 19th 2023 at 18:35

Name That Toon: Poker Hand

By John Klossner, Cartoonist
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

  • January 19th 2023 at 18:00

The Media Industry Is the Most Vulnerable to Cyber Attacks, Report Shows

The report highlights concerning security stats following two years of extreme tech growth.
  • January 19th 2023 at 16:36

SynSaber Releases ICS Vulnerabilities & CVEs Report Covering Second Half of 2022

ICS/OT cybersecurity firm finds 35% of CVEs in second half of 2022 unpatchable.
  • January 19th 2023 at 15:37

SecurityGen Identifies the Cybersecurity Priorities for Mobile Operators in 2023

Open architecture, non-standalone roaming, nation-state attacks, ransomware, and the need for more industry collaboration are among the major 5G security challenges that operators must address in the year ahead.
  • January 19th 2023 at 15:30

KnowBe4 to Offer $10,000 Women in Cybersecurity Scholarship and (ISC) 2 Certification Education Package

KnowBe4 partners with the Center for Cyber Safety and Education to bolster women in cybersecurity for the fourth consecutive year.
  • January 19th 2023 at 15:15

International Council of E-Commerce Consultants Launches Cybersecurity Essentials Professional Certificate Program on edX

New program enables students and early career professionals to learn critical skills required in today's entry-level cybersecurity field, helping address urgent cyber workforce jobs gap.
  • January 19th 2023 at 15:06

Ethically Exploiting Vulnerabilities: A Play-by-Play

By Joseph Carson, Chief Security Scientist, Advisory CISO, Delinea
There's a fine line between a hacker and an attacker, but it pays to be proactive. Consider tests by ethical hackers, a red team, or pen testers, and then bolster your company's defenses against malicious attacks.

  • January 19th 2023 at 15:00

New Research From EMA Reveals How Organizations Are Struggling to Develop Secure Software Applications

Research shows that over 50% of organizations performing software development struggle with fully integrating security into their software development lifecycle.
  • January 19th 2023 at 14:44

New Survey Sheds Light on Why Enterprises Struggle to Thwart API Attacks

Corsha’s Annual State of API Secrets Management Report finds over 50% of respondents suffered a data breach due to compromised API secrets.
  • January 19th 2023 at 14:15

Cybercriminals Target Telecom Provider Networks

By Jai Vijayan, Contributing Writer, Dark Reading
The growing use of mobile devices for MFA and the proliferation of 5G and VoIP in general could result in more attacks in future, experts say.

  • January 19th 2023 at 14:00

As Social Engineering Tactics Change, So Must Your Security Training

By Ben Corll, CISO Americas, Zscaler
Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization.

  • January 19th 2023 at 08:00

Data Security in Multicloud: Limit Access, Increase Visibility

By Dark Reading Staff, Dark Reading
Ensuring that data can be easily discovered, classified, and secured is a crucial cornerstone of a data security strategy.

  • January 19th 2023 at 02:00

How Would the FTC Rule on Noncompetes Affect Data Security?

By Jadee Hanson, CISO and CIO, Code42
Without noncompetes, how do organizations make sure employees aren't taking intellectual property when they go work to work for a competitor?

  • January 18th 2023 at 23:37

Vulnerable Historian Servers Imperil OT Networks

By Robert Lemos, Contributing Writer, Dark Reading
These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks.

  • January 18th 2023 at 22:04

Sophos Cuts Jobs to Focus on Cybersecurity Services

By Dark Reading Staff, Dark Reading
Layoffs intended to cut costs, help company shift its focus on cybersecurity services, Sophos says.

  • January 18th 2023 at 19:24

ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn

By Dark Reading Staff, Dark Reading
The powerful AI bot can produce malware without malicious code, making it tough to mitigate.

  • January 18th 2023 at 19:21

DoControl Announces SaaS Security Platform Expansion With Shadow Apps Module Launch

New module introduces shadow SaaS application discovery, monitoring, and remediation to protect businesses from supply chain attacks.
  • January 18th 2023 at 18:13

KnowBe4 2022 Phishing Test Report Confirms Business-Related Emails Trend

KnowBe4 releases overall 2022 and Q4 2022 global phishing test reports and finds business-related emails continue to be utilized as a phishing strategy and reveal top holiday email phishing subjects.
  • January 18th 2023 at 18:10

ChatGPT Opens New Opportunities for Cybercriminals: 5 Ways for Organizations to Get Ready

By Paul Trulove, CEO, SecureAuth
From updating employee education and implementing stronger authentication protocols to monitoring corporate accounts and adopting a zero-trust model, companies can better prepare defenses against chatbot-augmented attacks.

  • January 18th 2023 at 18:00

ICS Confronted by Attackers Armed With New Motives, Tactics, and Malware

By Elizabeth Montalbano, Contributor, Dark Reading
Threat actors are diversifying across all aspects to attack critical infrastructure, muddying the threat landscape, and forcing industrial organizations to rethink their security.

  • January 18th 2023 at 17:10

Microsoft Addresses Zero-Days, but Exchange Server Exploit Chain Remains Unpatched

By Tara Seals, Managing Editor, News, Dark Reading
The computing giant didn't fix ProxyNotLogon in October's Patch Tuesday, but it disclosed a rare 10-out-of-10 bug and patched two other zero-days, including one being exploited.

  • October 11th 2022 at 20:32

AI and Residual Finger Heat Could Be a Password Cracker's Latest Tools

By Ericka Chickowski, Contributing Writer, Dark Reading
New research demonstrates the use of thermal camera images of keyboards and screens in concert with AI to correctly guess computer passwords faster and more accurately.

  • October 11th 2022 at 19:01

Critical Open Source vm2 Sandbox Escape Bug Affects Millions

By Elizabeth Montalbano, Contributor, Dark Reading
Attackers could exploit the "Sandbreak" security bug, which has earned a 10 out of 10 on the CVSS scale, to execute a sandbox escape, achieve RCE, and run shell commands on a hosting machine.

  • October 11th 2022 at 18:23

OT Cybersecurity Leader Paul Brager Passes Away

By Dark Reading Staff, Dark Reading
The IT security executive led ICS/OT, IT/OT integration, and other security programs, as well as diversity and inclusion efforts in the industry.

  • October 11th 2022 at 17:53

Intel Processor UEFI Source Code Leaked

By Dark Reading Staff, Dark Reading
Exposed code included private key for Intel Boot Guard, meaning it can no longer be trusted, according to a researcher.

  • October 11th 2022 at 17:49

It's Time to Make Security an Innovation Enabler

By Ulfar Erlingsson, Chief Architect, Lacework
How data-driven security can best safeguard your unique cloud operations.

  • October 11th 2022 at 17:00

Dependency Management Aims to Make Security Easier

By Robert Lemos, Contributing Writer, Dark Reading
Existing software security firms and new startups tackle the tasks of exposing dependencies and helping developers manage their use of open-source components.

  • October 11th 2022 at 15:17

DigiCert Root CA Approved for Matter Device Attestation by Connectivity Standards Alliance

DigiCert ready to help smart home device manufacturers achieve Matter compliance rapidly and at scale.
  • October 11th 2022 at 15:15

Stairwell Announces $45M Series B Funding Round

Investment led by Section 32 will be used to scale the product and team.
  • October 11th 2022 at 14:57

Outpost24 Announces Expansion of Penetration Testing Offerings to North America

Pen testing solutions to empower businesses to proactively address application security vulnerabilities amid surging threats.
  • October 11th 2022 at 14:13

High-Value Targets: String of Aussie Telco Breaches Continues

By Becky Bracken, Editor, Dark Reading
Australian IT services provider Dialog has announced a breach, making it the third telecom company in the area compromised in less than a month.

  • October 11th 2022 at 14:01

Proposed SEC Disclosure Rules Could Transform Cyber-Incident Response

By Jason Hicks, Field CISO, Coalfire
It's not too early for firms to start preparing for change.

  • October 11th 2022 at 14:00

5 Attack Elements Every Organizations Should Be Monitoring

By Microsoft Security, Microsoft
Security teams have to protect an increasingly complex enterprise environment. Here are five elements of attack surface management they should consider.

  • October 4th 2022 at 19:00

US Airports in Cyberattack Crosshairs for Pro-Russian Group Killnet

By Jai Vijayan, Contributing Writer, Dark Reading
Killnet calls on other groups to launch similar attacks against US civilian infrastructure, including marine terminals and logistics facilities, weather monitoring centers, and healthcare systems.

  • October 10th 2022 at 20:45
❌