FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

How Cybercriminals Are Operationalizing Money Laundering and What to Do About It

By Derek Manky, Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs
It's time to share threat intelligence and prioritize digital literacy and cyber hygiene to stem the rising money laundering tide.

  • February 6th 2023 at 15:00

Name That Edge Toon: For the Birds

By John Klossner, Cartoonist
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

  • February 6th 2023 at 15:00

Predictions For Securing Today's Hybrid Workforce

By Kanishka Pandit, Senior Product Marketing Manager, Zscaler
Since requirements differ for users who work both from home and in the office, policies β€” and underlying technology β€” must adapt.

  • January 31st 2023 at 08:00

Unleash the Full Potential of Zero-Trust Security

By Emily Laufer, Senior Manager of Product Marketing, ThreatLabz, Zscaler
The demand is unmistakeable and the business case is readily justified β€” it's time to implement zero trust.

  • January 31st 2023 at 08:00

What CISOs Can Do About Brand Impersonation Scam Sites

By Ericka Chickowski, Contributing Writer, Dark Reading
Apply these nine tips to proactively fight fraudulent websites that use your brand to rip people off.

  • February 3rd 2023 at 22:04

Iran-Backed Actor Behind 'Holy Souls' Cyberattack on Charlie Hebdo, Microsoft Says

By Jai Vijayan, Contributing Writer, Dark Reading
The January attack was in retaliation for the satirical French magazine's decision to launch a cartoon contest to lampoon Iran's Supreme Leader.

  • February 3rd 2023 at 21:41

Scores of Redis Servers Infested by Sophisticated Custom-Built Malware

By Jai Vijayan, Contributing Writer, Dark Reading
At least 1,200 Redis servers worldwide have been infected with "HeadCrab" cryptominers since 2021.

  • February 3rd 2023 at 16:00

How the Cloud Is Shifting CISO Priorities

By Shai Morag, CEO, Ermetic
The greatly expanding attack surface created by the cloud needs to be protected.

  • February 3rd 2023 at 15:00

MITRE Releases Tool to Design Cyber-Resilient Systems

By Dark Reading Staff, Dark Reading
Engineers can use the Cyber Resiliency Engineering Framework Navigator to visuzalize their cyber-resiliency capabilities.

  • February 3rd 2023 at 03:00

Korelock Launches IOT Smart Lock Technology Company

Denver-based business secures Series A Funding through partnerships with Iron Gate Capital and Kozo Keikaku Engineering.
  • February 2nd 2023 at 21:05

Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally

By Robert Lemos, Contributing Writer, Dark Reading
The Russia-linked LockBit ransomware group claims to be behind the attack that fouled automated transactions for dozens of clients of financial technology firm ION Group.

  • February 2nd 2023 at 20:53

6 Examples of the Evolution of a Scam Site

By Ericka Chickowski, Contributing Writer, Dark Reading
Examining some key examples of recently found fraud sites that target the lucrative retail shoe industry helps us understand how brand impersonation sites evolve.

  • February 2nd 2023 at 19:01

Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale Cyberattacks

By Nate Nelson, Contributing Writer, Dark Reading
The group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low risk, high reward, quick, easy, and low effort.

  • February 2nd 2023 at 18:23

Patch Critical Bug Now: QNAP NAS Devices Ripe for the Slaughter

By Dark Reading Staff, Dark Reading
QNAP NAS devices are vulnerable to CVE-2022-27596, which allows unauthenticated, remote SQL code injection.

  • February 2nd 2023 at 16:08

Managing the Governance Model for Software Development in a No-Code Ecosystem

By Katherine Kostereva, CEO, Creatio
Forward-leading business and technology leaders are seeing the value of the "do-It-yourself" approach.

  • February 2nd 2023 at 15:00

AppSec Playbook 2023: Study of 829M Attacks on 1,400 Websites

The total number of 61,000 open vulnerabilities, including 1,700 critical ones that have been open for 180+ days, exposes businesses to potential attacks.

  • February 2nd 2023 at 15:00

Cybersecurity Leaders Launch First Attack Matrix for Software Supply Chain Security

Current and former cybersecurity leaders from Microsoft, Google, GitLab, Check Point, OWASP, Fortinet and others have already joined the open framework initiative, which is being led by OX Security.
  • February 2nd 2023 at 14:50

Discrepancies Discovered in Vulnerability Severity Ratings

By Jai Vijayan, Contributing Writer, Dark Reading
Differences in how the National Vulnerability Database (NVD) and vendors score bugs can make patch prioritization harder, study says.

  • February 2nd 2023 at 11:01

Lazarus Group Rises Again, to Gather Intelligence on Energy, Healthcare Firms

By Ericka Chickowski, Contributing Writer, Dark Reading
An OpSec slip from the North Korean threat group helps researchers attribute what was first suspected as a ransomware attack to nation-state espionage.

  • February 2nd 2023 at 09:00

Why CISOs Should Care About Brand Impersonation Scam Sites

By Ericka Chickowski, Contributing Writer, Dark Reading
Enterprises often don't know whose responsibility it is to monitor for spoofed brand sites and scams that steal customers' trust, money, and personally identifiable information.

  • February 1st 2023 at 23:36

Nearly All Firms Have Ties With Breached Third Parties

By Robert Lemos, Contributing Writer, Dark Reading
The average organization does business with 11 third parties, and 98% of organizations do business with a third party who has suffered a breach, an analysis finds.

  • February 1st 2023 at 22:12

CISA to Open Supply Chain Risk Management Office

By Dark Reading Staff, Dark Reading
A new supply chain risk management office aims to help public and private sectors implement recent CISA policies and guidance.

  • February 1st 2023 at 21:31

Greater Incident Complexity, Shift in How Threat Actors Use Stolen Data, Will Drive the Cyber Threat Landscape in 2023, Says Beazley Report

Noting 13% year-over-year growth in fraudulent instruction as a cause of loss, report predicts organizations must get smarter about educating employees to spot fraudulent tactics.
  • February 1st 2023 at 20:58

Radiant Logic Signs Definitive Agreement to Acquire Brainwave GRC

Move will strengthen position as a leader in the identity governance and analytics market.
  • February 1st 2023 at 20:32

Inside Killnet: Pro-Russia Hacktivist Group's Support and Influence Grows

By Jai Vijayan, Contributing Writer, Dark Reading
Killnet is building its profile, inspiring jewelry sales and rap anthems. But the impact of its DDoS attacks, like the ones that targeted 14 major US hospitals this week, remain largely questionable.

  • February 1st 2023 at 20:20

Beating the Odds: 3 Challenges Women Face in the Cybersecurity Industry

By Shikha Kothari, Senior Security Adviser, Eden Data
Companies need to be aware of the work culture they foster. Diversity and inclusion aren't just buzzwords. Increasing female visibility and improving female mentoring to help women enter and advance within the cybersecurity industry are key steps forward.

  • February 1st 2023 at 18:00

Gem Security Emerges From Stealth With $11M, Unveils Cloud TDIR Platform for Faster Response to Cloud Threats

Gem Security provides the world's first holistic approach for Cloud TDIR, bridging the gap between cloud complexity and security operations.
  • February 1st 2023 at 16:05

Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover

By Nate Nelson, Contributing Writer, Dark Reading
Two security holes β€” one particularly gnarly β€” could allow hackers the freedom to do as they wish with the popular edge equipment.

  • February 1st 2023 at 16:00

Contrast Security Launches Alliance Program to Change the Way Customers Scale Their Security Solutions

The Security Innovation Alliance (SIA) empowers customers to create holistic security programs by leveraging robust end-to-end integration partnerships.
  • February 1st 2023 at 15:45

Fortra's Terranova Security 2022 Gone Phishing Tournament Results Reveal Large Organizations at Highest Risk of Compromising Data

Findings underscore security awareness training that leverages practical, hands-on exercises is essential to creating a security-aware culture.
  • February 1st 2023 at 15:08

Application Security Must Be Nonnegotiable

By Shiva Nathan, Founder and CEO, Onymos
Companies need to keep security priorities top of mind during economic downturns so all-important revenue generation doesn't come with a heaping side order of security problems.

  • February 1st 2023 at 15:00

KnowBe4 to Offer $10,000 to Black Americans in Cybersecurity Scholarship

KnowBe4 partners with the Center for Cyber Safety and Education to support Black Americans in recognition of Black History Month to help further education.
  • February 1st 2023 at 15:00

Google Fi Users Caught Up in T-Mobile Breach

By Dark Reading Staff, Dark Reading
Google Fi mobile customers have been alerted that their SIM card serial numbers, phone numbers, and other data were exposed in T-Mobile hack.

  • February 1st 2023 at 14:18

Checkmarx Launches Threat Intelligence for Open Source Packages

By Dark Reading Staff, Dark Reading
The new API incorporates threat intelligence research and employs machine learning to identify threats in the supply chain.

  • January 31st 2023 at 05:00

How Can Disrupting DNS Communications Thwart a Malware Attack?

By Dave Mitchell, CTO, HYAS
Malware eventually has to exfiltrate the data it accessed. By watching DNS traffic for suspicious activity, organizations can halt the damage.

  • February 1st 2023 at 02:05

Firmware Flaws Could Spell 'Lights Out' for Servers

By Robert Lemos, Contributing Writer, Dark Reading
Five vulnerabilities in the baseboard management controller (BMC) software used by 15 major vendors could allow remote code execution if attackers gain network access.

  • January 31st 2023 at 22:35

Critical VMware RCE Vulnerabilities Targeted by Public Exploit Code

By Tara Seals, Managing Editor, News, Dark Reading
Security vulnerabilities in VMware's vRealize Log Insight platform can be chained together to offer a cybercriminals a gaping hole to access corporate crown jewels.

  • January 31st 2023 at 21:30

Phishers Trick Microsoft Into Granting Them 'Verified' Cloud Partner Status

By Nate Nelson, Contributing Writer, Dark Reading
Everyone on Twitter wants a blue check mark. But Microsoft Azure's blue badges are even more valuable to a threat actor stealing your data via malicious OAuth apps.

  • January 31st 2023 at 20:00

Poser Hackers Impersonate LockBit in SMB Cyberattacks

By Dark Reading Staff, Dark Reading
Recent cyberattacks against SMBs across Europe have been traced back to copycat groups using leaked LockBit locker malware.

  • January 31st 2023 at 19:44

Will Cybersecurity Remain Recession-Proof in 2023?

By Jamal Elmellas , Chief Operating Officer, Focus on Security
Demand for skilled professionals will remain high, but cyber budgets will be eaten away.

  • January 31st 2023 at 18:00

NanoLock Addresses Global Industrial & OT Cyber Demand with Expansions into Europe and North America

To meet a pressing demand for industrial and OT security, zero-trust, device-level cybersecurity provider expands with strategic hires in new and established markets.
  • January 31st 2023 at 16:15

New Survey Reveals 40% of Companies Experienced a Data Leak in the Past Year

SysKit report highlighting effects of digital transformation on IT admins and governance landscape released.
  • January 31st 2023 at 16:09

Aura and Nonprofit Cyversity Partner to Support a More Inclusive Cyber Workforce

Mentoring, scholarships, and professional development opportunities will be offered to those underrepresented in the industry through the collaboration.
  • January 31st 2023 at 15:58

Sentra Raises $30 Million Series A Financing to Meet Growing Demand for Data Security in the Cloud

Standard Investments leads round with participation from Munich Re Ventures, Moore Strategic Ventures, Bessemer Venture Partners, and Zeev Ventures.
  • January 31st 2023 at 15:45

Are Your Employees Thinking Critically About Their Online Behaviors?

By Jonathan Watson, Chief Technology Officer, Clio
Three mindset shifts will help employees build a habit of vigilance and make better security decisions. Move past security theater to reframe thinking so employees understand data's value, act with intention, and follow data best practices.

  • January 31st 2023 at 15:00

Russia's Sandworm APT Launches Swarm of Wiper Attacks in Ukraine

By Jai Vijayan, Contributing Writer, Dark Reading
The incidents are the latest indication of the growing popularity of dangerous disk wipers, created to disrupt and degrade critical infrastructure and other organizations.

  • January 30th 2023 at 22:32

Cybercrime Ecosystem Spawns Lucrative Underground Gig Economy

By Robert Lemos, Contributing Writer, Dark Reading
The complex nature of cyberattacks has increased demand for software developers, reverse engineers, and offensive specialists β€” attracting workers facing financial insecurity.

  • January 30th 2023 at 21:52

10M JD Sports Customers' Info Exposed in Data Breach

By Becky Bracken, Editor, Dark Reading
UK sportswear retailer asks exposed customers to stay "vigilant" against phishing attempts following cyberattack.

  • January 30th 2023 at 21:17

IT and Security Professionals Spend an Average of 4,300 Hours Annually Achieving or Maintaining Compliance

New research from Drata shows compliance remains a business challenge for many organizations.
  • January 30th 2023 at 20:33

Make Developers the Driver of Software Security Excellence

By Matias Madou, Co-Founder and CTO, Secure Code Warrior
Those who are wrangling code every day could fuel a genuinely transformational approach to security β€” if they are adequately upskilled.

  • January 30th 2023 at 20:17

Facebook Bug Allows 2FA Bypass Via Instagram

By Dark Reading Staff, Dark Reading
The Instagram rate-limiting bug, found by a rookie hunter, could be exploited to bypass Facebook 2FA in vulnerable apps, researcher reports.

  • January 30th 2023 at 19:00

Fake Texts From the Boss, Bogus Job Postings and Frankenstein Shoppers β€” Oh My!

Experian’s annual Future of Fraud Forecast highlights five fraud threats facing businesses and consumers in 2023.
  • January 30th 2023 at 17:40

Convincing, Malicious Google Ads Look to Lift Password Manager Logins

By Jai Vijayan, Contributing Writer, Dark Reading
Users searching for Bitwarden and 1Password's Web vaults on Google have recently reported seeing paid ads with links to cleverly spoofed sites for stealing credentials to their password vaults.

  • January 30th 2023 at 17:15
❌