FreshRSS

๐Ÿ”’
โŒ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

What the Sci-Fi Hit Altered Carbon Teaches Us About Virtualization Security

By Corey Nachreiner Chief Technology Officer, WatchGuard Technologies
The Netflix show may be fantastical, but it has real-world lessons about virtualization.

  • October 7th 2020 at 14:00

The New War Room: Cybersecurity in the Modern Era

By Satya Gupta Executive Co-Founder & CTO, Virsec
The introduction of the virtual war room is a new but necessary shift. To ensure its success, security teams must implement new systems and a new approach to cybersecurity.

  • October 7th 2020 at 18:00

CISA Warns of Renewed Emotet Activity

By Dark Reading Staff
The Emotet malware dropper is seeing an upsurge in new activity in the second half of 2020.

  • October 7th 2020 at 18:30

Cyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare Threats

By Robert Lemos Contributing Writer
Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.

  • October 7th 2020 at 20:05

3 Ways Companies are Working on Security by Design

By Ericka Chickowski Contributing Writer
Execs from top financial organizations and other companies share insights on building a security culture.

  • October 7th 2020 at 20:30

Rare Firmware Rootkit Discovered Targeting Diplomats, NGOs

By Kelly Jackson Higgins Executive Editor at Dark Reading
Second-ever sighting of a firmware exploit in the wild is a grim reminder of the dangers of these mostly invisible attacks.

  • October 7th 2020 at 20:45

Open Source Threat Intelligence Searches for Sustainable Communities

By Robert Lemos Contributing Writer
As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...

  • October 7th 2020 at 21:00

New 'HEH' Botnet Targets Exposed Telnet Services

By Jai Vijayan Contributing Writer
Latest threat is one in a growing list of malware developed in the Go programming language.

  • October 7th 2020 at 21:30

'Bahamut' Threat Group Targets Government & Industry in Middle East

By Kelly Sheridan Staff Editor, Dark Reading
Researchers say the cyber espionage group was involved in several attacks against government officials and businesses in the Middle East and South Asia.

  • October 7th 2020 at 22:00

Key Considerations & Best Practices for Establishing a Secure Remote Workforce

By Kurt John Chief Cybersecurity Officer, Siemens USA
Cybersecurity is challenging but not paralyzing, and now is the moment to educate our employees to overcome these challenges.

  • October 8th 2020 at 14:00

Kaspersky Researchers Spot Russia-on-Russia Cyber-Espionage Campaign

By Kelly Jackson Higgins Executive Editor at Dark Reading
Steganography-borne malware used to spy on industrial targets in Russia.

  • October 8th 2020 at 15:55

US Election-Related Websites Vulnerable to Fraud, Abuse

By Steve Zurier Contributing Writer
New research finds the vast majority of reputable news, political, and donor-oriented sites don't use registry locks.

  • October 8th 2020 at 16:00

US Seizes Domain Names Used in Iranian Disinformation Campaign

By Dark Reading Staff
The US has seized 92 domain names used by Iran's Islamic Revolutionary Guard Corps to spread a worldwide disinformation campaign.

  • October 8th 2020 at 17:55

Scale Up Threat Hunting to Skill Up Analysts

By Chris Hoff Product Marketing Manager, ReversingLabs
Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why.

  • October 8th 2020 at 18:00

Cyberattacks Up, But Companies (Mostly) Succeed in Securing Remote Workforce

By Robert Lemos Contributing Writer
Despite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.

  • October 8th 2020 at 21:50

Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

By Samuel Greengard Freelance Writer
In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.

  • October 9th 2020 at 11:30

Why MSPs Are Hacker Targets, and What To Do About It

By John Hammond Senior Security Researcher at Huntress
Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.

  • October 9th 2020 at 14:00

CISOs Planning on Bigger Budgets: Report

By Dark Reading Staff
Budgets are on the rise, even in a time of revenue worries across the industry.

  • October 9th 2020 at 17:20

Critical Zerologon Flaw Exploited in TA505 Attacks

By Dark Reading Staff
Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.

  • October 9th 2020 at 18:15

Apple Pays Bug Bounty to Enterprise Network Researchers

By Dark Reading Staff
So far, the company has doled out $288,000 to five researchers who, in three months, found 55 vulnerabilities in its corporate infrastructure.

  • October 9th 2020 at 20:10

Latest Version of MalLocker Android Ransomware Packs New Tricks

By Jai Vijayan Contributing Writer
Like most such mobile malware, the new one doesn't encrypt data but attempts to make an infected system impossible to use, Microsoft says.

  • October 9th 2020 at 20:20
  • October 12th 2020 at 10:00

How to Pinpoint Rogue IoT Devices on Your Network

By Kelly Sheridan Staff Editor, Dark Reading
Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.

  • October 12th 2020 at 13:10

A 7-Step Cybersecurity Plan for Healthcare Organizations

By Steve Zurier Contributing Writer
With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations.

  • October 12th 2020 at 14:00

Security Officers, Are Your Employers Practicing Good Habits from Home?

By Chip Witt Vice President of Product Management at SpyCloud
Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.

  • October 12th 2020 at 14:00

What Is End-to-End Encryption?

By Hudson Bloom, Senior Consultant, Application Security, Optiv: End-to-end encryption is a style of encrypted connection in which...
Many services advertise E2EE, but not all of them actually offer it.

  • October 12th 2020 at 18:30

Security Firms & Financial Group Team Up to Take Down Trickbot

By Robert Lemos Contributing Writer
Microsoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation's C2 infrastructure.

  • October 12th 2020 at 19:20

Software AG Continues Efforts Against $20M Ransomware Attack

By Dark Reading Staff
The attack, which now includes extortion components, has moved into its second week.

  • October 12th 2020 at 21:10

Online Voting Is Coming, but How Secure Will It Be?

By Brad Brooks CEO of OneLogin
It's time for state governments to act as leaders, adopt digital ID standards, enable new online voting systems, and provide broad-based access to all communities for the benefit of all.

  • October 13th 2020 at 14:00

Security Officers, Are Your Employees Practicing Good Habits from Home?

By Chip Witt Vice President of Product Management at SpyCloud
Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.

  • October 12th 2020 at 14:00

Trickbot Botnet Response Highlights Partnerships Preventing US Election Interference

By Tanner Johnson Senior Analyst, Connectivity & IoT, OMDIA
Recent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption.

  • October 13th 2020 at 16:00

Where are the 'Great Exits' in the Data Security Market?

By Dave Cole Cofounder and CEO, Open Raven
If data security were a student, its report card would read "Not performing to potential." Here's why.

  • October 13th 2020 at 18:00

25% of BEC Cybercriminals Based in the US

By Kelly Sheridan Staff Editor, Dark Reading
While the US is known to be a prime target for BEC attacks, just how many perpetrators are based there came as a surprise to researchers.

  • October 13th 2020 at 18:10

Treasury Dept. Advisory Shines Spotlight on Ransomware Negotiators

By Jai Vijayan Contributing Writer
With attacks showing no signs of abating, some companies have begun offering services to help reduce ransom demands, buy more time, and arrange payments.

  • October 13th 2020 at 18:45

Phishing in Troubled Waters: 3 Ways Email Attacks May Impact Elections

By Darktrace Experts Staff
The state of email defenses has a role to play in the US presidential election.

  • October 13th 2020 at 19:30

Coalition Pokes Five Eyes on Call for Backdoors

By Dark Reading Staff
The Five Eyes international law enforcement group had called for implementing backdoors for law enforcement in all encryption implementations.

  • October 13th 2020 at 21:15

Microsoft Fixes Critical Windows TCP/IP Flaw in Patch Rollout

By Kelly Sheridan Staff Editor, Dark Reading
The October 2020 Patch Tuesday fixed 87 vulnerabilities, including 21 remote code execution flaws, in Microsoft products and services.

  • October 13th 2020 at 21:40

NIST Quantum Cryptography Program Nears Completion

By Bernie Brode Nano Product Researcher
The National Institute of Standards and Technology's first post-quantum cryptography standard will address key issues, approaches, an arms race, and the technology's uncertain future.

  • October 14th 2020 at 14:00

Intel's Ice Lake Beefs Up CPU Security for Cloud Workloads

By Robert Lemos Contributing Writer
The third-generation Xeon processors build in hardware security features to provide extra protection to data in transit, at rest, and in use.

  • October 14th 2020 at 16:45

Assuring Business Continuity by Reducing Malware Dwell Time

By Brendan O'Flaherty Chief Executive Officer at cPacket Networks
Here's how CISOs and IT security operations teams can best address key challenges to network monitoring that could increase malware dwell time.

  • October 14th 2020 at 18:00

What's Really Happening in Infosec Hiring Now?

By Joan Goodchild Contributing Writer
As the pandemic continues, security teams still need help they can't get. But the "skills shortage" is only part of the story.

  • October 14th 2020 at 19:30

London Borough of Hackney Investigates 'Serious' Cyberattack

By Dark Reading Staff
London's Hackney Council says some services may be slow or unavailable as it looks into a cyberattack affecting services and IT systems.

  • October 14th 2020 at 19:50

Zoom Announces Rollout of End-to-End Encryption

By Dark Reading Staff
Phase 1 removes Zoom servers from the key generation and distribution processes.

  • October 14th 2020 at 20:35

Microsoft Office 365 Accounts a Big Target for Attackers

By Jai Vijayan Contributing Writer
Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.

  • October 15th 2020 at 10:50

The Ruthless Cyber Chaos of Business Recovery

By Emil Sayegh CEO and President, Ntirety
Critical technology initiatives leveraging the best of technology solutions are the only way through the cyber chaos of 2020.

  • October 15th 2020 at 14:00

Overcoming the Challenge of Shorter Certificate Lifespans

By Mike Cooper Founder & CEO of Revocent
We could be in the middle of a major transition to shorter and shorter certificate life spans, which has significant implications for how IT organizations manage certificates across the enterprise.

  • October 15th 2020 at 18:00

Barnes & Noble Warns Customers About Data Breach

By Dark Reading Staff
Famed bookseller says non-financial data was exposed in a new attack.

  • October 15th 2020 at 19:00

Twitter Hack Analysis Drives Calls for Greater Security Regulation

By Dark Reading Staff
New York's Department of Financial Services calls for more cybersecurity regulation at social media firms following the "jarringly easy" Twitter breach.

  • October 15th 2020 at 19:45

US Indicts Members of Transnational Money-Laundering Organization

By Jai Vijayan Contributing Writer
Members of the QQAAZZ group helped cybercriminals conceal origins of stolen funds, DoJ alleges.

  • October 15th 2020 at 22:20

Prolific Cybercrime Group Now Focused on Ransomware

By Robert Lemos Contributing Writer
Cybercriminal team previously associated with point-of-sale malware and data theft has now moved almost completely into the more lucrative crimes of ransomware and extortion.

  • October 15th 2020 at 22:30

Cybercrime Losses Up 50%, Exceeding $1.8B

By Marc Wilczek Digital Strategist & COO of Link11
Fewer companies are being hit by cyber incidents, but those that do get hit are hit harder and more often.

  • October 16th 2020 at 14:00

Academia Adopts Mitre ATT&CK Framework

By Robert Lemos Contributing Writer
Security pros and academic researchers discuss the best ways to use MITRE's framework to inform cybersecurity efforts, analyze threats, and teach future workers.

  • October 16th 2020 at 16:05

An Uncommon 20 Years of Commonly Enumerating Vulns

By Curtis Franklin Jr. Senior Editor at Dark Reading
Larry Cashdollar, a researcher with more than 300 CVEs to his credit, looks back at his favorite vulnerabilities (and being the only individual CNA on Mitre's list).

  • October 16th 2020 at 19:15

US Counterintelligence Director & Fmr. Europol Leader Talk Election Security

By Kelly Sheridan Staff Editor, Dark Reading
The US counterintelligence lead joins a former Europol cyber chief to discuss modern election threats and the benefits of public-private collaboration.

  • October 16th 2020 at 19:35

Massive New Phishing Campaigns Target Microsoft, Google Cloud Users

By Dark Reading Staff
At least three campaigns are now underway.

  • October 16th 2020 at 21:45

A New Risk Vector: The Enterprise of Things

By Greg Clark CEO, Forescout Technologies Inc.
Billions of devices -- including security cameras, smart TVs, and manufacturing equipment -- are largely unmanaged and increase an organization's risk.

  • October 19th 2020 at 14:00

Expert Tips to Keep WordPress Safe

By Curtis Franklin Jr. Senior Editor at Dark Reading
The most widely used content management system on the Web relies heavily on plug-ins and add-on software -- and that requires rigorous security measures at every level.

  • October 19th 2020 at 14:55

A Swift Reminder About Cybersecurity

By Edge Editors Dark Reading
The hackers gonna crack, crack, crack, crack, crack ...

  • October 19th 2020 at 15:15

Chart: The Pandemic Reprioritizes Security Projects

By Edge Editors Dark Reading
Responses among IT and security pros reflect concern over vulnerabilities incurred by workers accessing the enterprise network from poorly protected home networks.

  • October 19th 2020 at 16:20

7 Tips for Choosing Security Metrics That Matter

By Ericka Chickowski Contributing Writer
Experts weigh in on picking metrics that demonstrate how the security team is handling operational efficiency and reducing risk.

  • October 19th 2020 at 16:45
โŒ