FreshRSS

🔒
☐ ☆ ✇ Dark Reading:

Exposed Kubernetes Clusters, Kubelet Ports Can Be Abused in Cyberattacks

By Nathan Eddy, Contributing Writer, Dark Reading — May 27th 2022 at 20:54
Organizations must ensure their kubelets and related APIs aren’t inadvertently exposed or lack proper access control, offering an easy access point for malicious actors.

☐ ☆ ✇ Dark Reading:

Space Force Expands Cyber Defense Operations

By Dark Reading Staff, Dark Reading — May 27th 2022 at 20:25
Space Force's Delta 6 cyber-defense group adds squadrons, updates legacy Satellite Control Network.

☐ ☆ ✇ Dark Reading:

Scammer Behind $568M International Cybercrime Syndicate Gets 4 Years

By Dark Reading Staff, Dark Reading — May 27th 2022 at 17:02
The 14th defendant behind The Infraud Organization contraband marketplace has been sentenced, this time for one count of racketeering.

☐ ☆ ✇ Dark Reading:

New Chaos Malware Variant Ditches Wiper for Encryption

By Tara Seals, Managing Editor, News, Dark Reading — May 27th 2022 at 16:07
The Chaos ransomware-builder was known for creating destructor malware that overwrote files and made them unrecoverable -- but the new Yashma version finally generates binaries that can encrypt files of all sizes.

☐ ☆ ✇ Dark Reading:

ChromeLoader Malware Hijacks Browsers With ISO Files

By Nathan Eddy, Contributing Writer, Dark Reading — May 27th 2022 at 15:49
The malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.

☐ ☆ ✇ McAfee Blogs

How Secure Is Video Conferencing?

By McAfee — May 27th 2022 at 14:20

As millions of people around the world practice social distancing and work their office jobs from home, video conferencing has quickly become the new norm. Whether you’re attending regular work meetings, partaking in a virtual happy hour with friends, or catching up with extended family across the globe, video conferencing is a convenient alternative to many of the activities we can no longer do in real life. But as the rapid adoption of video conferencing tools and apps occurs, is security falling by the wayside?

Avoid Virtual Party Crashers

One security vulnerability that has recently made headlines is the ability for uninvited attendees to bombard users’ virtual meetings. How? According to Forbes, many users have posted their meeting invite links on social media sites like Twitter. An attacker can simply click on one of these links and interrupt an important conference call or meeting with inappropriate content.  

Ensure Data is in the Right Hands

Online conferencing tools allow users to hold virtual meetings and share files via chat. But according to Security Boulevard, communicating confidential business information quickly and privately can be challenging with these tools. For example, users are not always immediately available, even when working from home. In fact, many parents are simultaneously doubling as working parents and teachers with the recent closure of schools and childcare providers. If a user needs to share private information with a coworker but they are unable to connect by video or phone, they might revert to using a messaging platform that lacks end-to-end encryptiona feature that prevents third-party recipients from seeing private messages. This could lead to leaks or unintended sharing of confidential data, whether personal or corporate. What’s more, the lack of using a secure messaging platform could present a hacker with an opportunity to breach a victim’s data or deviceDepending on the severity of this type of breach, a victim could be at risk of identity theft 

Pay Attention to Privacy Policies

With the recent surge of new video conferencing users, privacy policies have been placed under a microscope. According to WIRED, some online conferencing tools have had to update their policies to reflect the collection of user information and meeting content used for advertising or other marketing efforts. Another privacy concern was brought to light by a video conferencing tool’s attention-tracking feature. This alerts the virtual meeting host when an attendee hasn’t had the meeting window in their device foreground for 30 seconds, resulting in users feeling that their privacy has been compromised.  

How to Secure Video Conferences

As users become accustomed to working from home, video conferencing tools will continue to become a necessary avenue for virtual communication. But how can users do so while putting their online security first? Follow these tips to help ensure that your virtual meetings are safeguarded:  

Do your research

There are plenty of video conferencing tools available online. Before downloading the first one you see, do your research and check for possible security vulnerabilities around the tools. Does the video conferencing tool you’re considering use end-to-end encryption? This ensures that only meeting participants have the ability to decrypt secure meeting content. Additionally, be sure to read the privacy policies listed by the video conferencing programs to find the one that is the most secure and fits your needs.  

Make your meetings password protected

To ensure that only invited attendees can access your meeting, make sure they are password protected. For maximum safety, activate passwords for new meetings, instant meetings, personal meetings, and people joining by phone. 

Block users from taking control of the screen

To keep users (either welcome or unwelcome) from taking control of your screen while you’re video conferencing, select the option to block everyone except the host (you) from screen sharing.  

Turn on automatic updates

By turning on automatic updates, you are guaranteed to have all the latest security patches and enhancements for your video conferencing tool as soon as they become available.  

The post How Secure Is Video Conferencing? appeared first on McAfee Blog.

☐ ☆ ✇ Dark Reading:

Physical Security Teams' Impact Is Far-Reaching

By Tom Kopecky, Chief Strategy Officer and Co-Founder, Ontic — May 27th 2022 at 14:00
Here's how physical security teams can integrate with the business to identify better solutions to security problems.

☐ ☆ ✇ Dark Reading:

Taking the Danger Out of IT/OT Convergence

By Dave Masson, Director of Enterprise Security, Darktrace — May 27th 2022 at 11:23
The Colonial Pipeline attack highlighted the risks of convergence. Unified security provides a safer way to proceed.

☐ ☆ ✇ Naked Security

S3 Ep84: Government demand, Mozilla velocity, and Clearview fine [Podcast]

By Paul Ducklin — May 27th 2022 at 11:17
Latest episode - listen now!

☐ ☆ ✇ Dark Reading:

Microsoft Unveils Dev Box, a Workstation-as-a-Service

By Dark Reading Staff, Dark Reading — May 26th 2022 at 22:54
Microsoft Dev Box will make it easier for developers and hybrid teams to get up and running with workstations already preconfigured with required applications and tools.

☐ ☆ ✇ Dark Reading:

Broadcom Snaps Up VMware in $61B Deal

By Dark Reading Staff, Dark Reading — May 26th 2022 at 22:27
Massive merger will put Broadcom's Symantec and VMware's Carbon Black under one roof.

☐ ☆ ✇ Dark Reading:

Lacework Announces Layoffs, Restructuring

By Dark Reading Staff, Dark Reading — May 26th 2022 at 20:46
The cloud-security company blames "seismic" market shifts for shakeup.

☐ ☆ ✇ Dark Reading:

Third-Party Scripts on Websites Present a 'Broad & Open' Attack Vector

By Jai Vijayan, Contributing Writer, Dark Reading — May 26th 2022 at 20:20
Nearly half of the world's largest websites use externally generated JavaScript that makes them ripe targets for cyberattackers interested in stealing data, skimming credit cards, and executing other malicious actions.

☐ ☆ ✇ Dark Reading:

Twitter Fined $150M for Security Data Misuse

By Dark Reading Staff, Dark Reading — May 26th 2022 at 18:00
Twitter is charged with using emails and phone numbers ostensibly collected for account security to sell targeted ads.

☐ ☆ ✇ Dark Reading:

The FDA's New Cybersecurity Guidance for Medical Devices Reminds Us That Safety & Security Go Hand in Hand

By Roman Kesler, VP of Research, Cybellum — May 26th 2022 at 17:00
The new draft guidance on premarket submissions incorporates quality system regulations and doubles down on a life-cycle approach to product security.

☐ ☆ ✇ Dark Reading:

VMware, Airline Targeted as Ransomware Chaos Reigns

By Nathan Eddy, Contributing Writer, Dark Reading — May 26th 2022 at 16:58
Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the "GoodWill" strain.

☐ ☆ ✇ Dark Reading:

Big Cyber Hits on GM, Chicago Public Schools, & Zola Showcase the Password Problem

By Tara Seals, Managing Editor, News, Dark Reading — May 26th 2022 at 14:20
Credential-stuffing attacks against online accounts are still popular, and they work thanks to continuing password reuse.

☐ ☆ ✇ Dark Reading:

Act Now: Leveraging PCI Compliance to Improve Security

By Tim Erlin, VP of Strategy, Tripwire — May 26th 2022 at 14:00
Let the threat landscape guide your company's timeline for complying with new data security standards for credit cards. Use the phase-in time to improve security overall — security as a process — not just comply with new standards.

☐ ☆ ✇ Dark Reading:

Quanta Servers Caught With 'Pantsdown' BMC Vulnerability

By Ericka Chickowski, Contributing Writer, Dark Reading — May 26th 2022 at 13:00
Researchers discover 3-year-old critical firmware vulnerability, running in popular cloud servers used to power hyperscalers and cloud providers alike.

☐ ☆ ✇ Naked Security

Who’s watching your webcam? The Screencastify Chrome extension story…

By Paul Ducklin — May 26th 2022 at 12:41
When you really need to make exceptions in cybersecurity, specify them as explicitly as you can.

☐ ☆ ✇ Dark Reading:

Most Common Threats in DBIR

By Edge Editors, Dark Reading — May 25th 2022 at 22:11
Supply chain and ransomware attacks increased dramatically in 2021, which explains why so many data breaches in Verizon's "2022 Data Breach Investigations Report" were grouped as system intrusion.

☐ ☆ ✇ McAfee Blogs

Crypto Scammers Exploit: Elon Musk Speaks on Cryptocurrency

By McAfee — May 26th 2022 at 06:08

By Oliver Devane 

Update: In the past 24 hours (from time of publication)  McAfee has identified 15 more scam sites bringing the total to 26. The combined value of the wallets shared on these sites is over $1,300,000 which is an increase of roughly $1,000,000 since this blog was last published. This highlights the scale of this current scam campaign. The table within this blog has been updated to include the new sites and crypto-wallets.

McAfee has identified several Youtube channels which were live-streaming a modified version of a live stream called ‘The B Word’ where Elon Musk, Cathie Wood, and Jack Dorsey discuss various aspects of cryptocurrency.  

The modified live streams make the original video smaller and put a frame around it advertising malicious sites that it claims will double the amount of cryptocurrency you send them. As the topic of the video is on cryptocurrency it adds some legitimacy to the websites being advertised.  

The original video is shown below on the left and a modified one which includes a reference to a scam site is shown on the right.  

We identified several different streams occurring at a similar same time. The images of some are shown below: 

The YouTube streams advertised several sites which shared a similar theme. They claim to send cryptocurrency worth double the value which they’ve received. For example, if you send 1BTC you will receive 2BTC in return. One of the sites frequently asked questions (FAQ) is shown below: 

Here are some more examples of the scam sites we discovered: 

The sites attempt to trick the visitors into thinking that others are sending cryptocurrency to it by showing a table with recent transactions. This is fake and is generated by JavaScript which creates random crypto wallets and amounts and then adds these to the table. 

The wallets associated with the malicious sites have received a large number of transactions with a combined value of $280,000 as of 5 PM UTC on the 5th of May 2022 

Scam Site  Crypto Type  Wallet  Value as on 5PM UTC 5th May 2022 
22ark-invest[.]org  ETH  0x820a78D8e0518fcE090A9D16297924dB7941FD4f  $25,726.46 
22ark-invest[.]org  BTC  1Q3r1TzwCwQbd1dZzVM9mdFKPALFNmt2WE  $29,863.78 
2xEther[.]com  ETH  0x5081d1eC9a1624711061C75dB9438f207823E694  $2,748.50 
2x-musk[.]net  ETH  0x18E860308309f2Ab23b5ab861087cBd0b65d250A  $10,409.13 
2x-musk[.]net  BTC  17XfgcHCfpyYMFdtAWYX2QcksA77GnbHN9  $4,779.47 
arkinvest22[.]net  ETH  0x2605dF183743587594A3DBC5D99F12BB4F19ac74  $11,810.57 
arkinvest22[.]net  BTC  1GLRZZHK2fRrywVUEF83UkqafNV3GnBLha  $5,976.80 
doublecrypto22[.]com  ETH  0x12357A8e2e6B36dd6D98A2aed874D39c960eC174  $0.00 
doublecrypto22[.]com  BTC  1NKajgogVrRYQjJEQY2BcvZmGn4bXyEqdY  $0.00 
elonnew[.]com  ETH  0xAC9275b867DAb0650432429c73509A9d156922Dd  $0.00 
elonnew[.]com  BTC  1DU2H3dWXbUA9mKWuZjbqqHuGfed7JyqXu  $0.00 
elontoday[.]org  ETH  0xBD73d147970BcbccdDe3Dd9340827b679e70d9d4  $18,442.96 
elontoday[.]org  BTC  bc1qas66cgckep3lrkdrav7gy8xvn7cg4fh4d7gmw5  $0.00 
Teslabtc22[.]com  ETH  0x9B857C44C500eAf7fAfE9ed1af31523d84CB5bB0  $27,386.69 
Teslabtc22[.]com  BTC  18wJeJiu4MxDT2Ts8XJS665vsstiSv6CNK  $17,609.62 
tesla-eth[.]org  ETH  0x436F1f89c00f546bFEf42F8C8d964f1206140c64  $5,841.84 
tesla-eth[.]org  BTC  1CHRtrHVB74y8Za39X16qxPGZQ12JHG6TW  $132.22 
teslaswell[.]com  ETH  0x7007Fa3e7dB99686D337C87982a07Baf165a3C1D  $9.43 
teslaswell[.]com  BTC  bc1qdjma5kjqlf7l6fcug097s9mgukelmtdf6nm20v  $0.00 
twittergive[.]net  ETH  0xB8e257C18BbEC93A596438171e7E1E77d18671E5  $25,918.90 
twittergive[.]net  BTC  1EX3dG9GUNVxoz6yiPqqoYMQw6SwQUpa4T  $99,123.42 

Scammers have been using social media sites such as Twitter and Youtube to attempt to trick users into parting ways with their cryptocurrency for the past few years. McAfee urges its customers to be vigilant and if something sounds too good to be true then it is most likely not legitimate.  

Our customers are protected against the malicious sites detailed in this blog as they are blocked with McAfee Web Advisor  

Type  Value  Product  Blocked 
URL – Crypto Scam  twittergive[.]net  McAfee WebAdvisor  YES 
URL – Crypto Scam  tesla-eth[.]org  McAfee WebAdvisor  YES 
URL – Crypto Scam  22ark-invest[.]org  McAfee WebAdvisor  YES 
URL – Crypto Scam  2xEther[.]com  McAfee WebAdvisor  YES 
URL – Crypto Scam  Teslabtc22[.]com  McAfee WebAdvisor  YES 
URL – Crypto Scam  elontoday[.]org  McAfee WebAdvisor  YES 
URL – Crypto Scam  elonnew[.]com  McAfee WebAdvisor  YES 
URL – Crypto Scam  teslaswell[.]com  McAfee WebAdvisor  YES 
URL – Crypto Scam  2x-musk[.]net  McAfee WebAdvisor  YES 
URL – Crypto Scam  doublecrypto22[.]com  McAfee WebAdvisor  YES 
URL – Crypto Scam  arkinvest22[.]net  McAfee WebAdvisor  YES 

 

The post Crypto Scammers Exploit: Elon Musk Speaks on Cryptocurrency appeared first on McAfee Blog.

☐ ☆ ✇ Dark Reading:

Forescout Launches Forescout Frontline to Help Organizations Tackle Ransomware and Real Time Threats

May 25th 2022 at 20:30
New threat hunting and risk identification service provides organizations with an enterprise-wide baseline of their threat landscape and risk exposure.
☐ ☆ ✇ Dark Reading:

Is Your Data Security Living on the Edge?

May 25th 2022 at 20:14
Gartner's security service edge fundamentally changes how companies should be delivering data protection in a cloud and mobile first world.
☐ ☆ ✇ Dark Reading:

Interpol's Massive 'Operation Delilah' Nabs BEC Bigwig

By Jai Vijayan, Contributing Writer, Dark Reading — May 25th 2022 at 20:09
A sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.

☐ ☆ ✇ Dark Reading:

JFrog Launches Project Pyrsia to Help Prevent Software Supply Chain Attacks

May 25th 2022 at 19:47
Open source software community initiative utilizes blockchain technology.
☐ ☆ ✇ Dark Reading:

Mastercard Launches Cybersecurity “Experience Centre”

May 25th 2022 at 19:44
Experience Centre features emerging Mastercard products and solutions for securing digital payments on a global scale, including those developed locally in Vancouver.
☐ ☆ ✇ Dark Reading:

Qualys to Unveil VMDR 2.0 at Qualys Security Conference in San Francisco

May 25th 2022 at 19:39
Company will detail enhancements to Vulnerability Management, Detection and Response solution next month.
☐ ☆ ✇ Dark Reading:

Corelight Announces New SaaS Platform for Threat Hunting

May 25th 2022 at 19:34
Corelight Investigator aids threat hunting and investigation through intelligent alert aggregation, built-in queries and scalable search
☐ ☆ ✇ Dark Reading:

Cybersecurity-Focused SYN Ventures Closes $300 Million Fund II

May 25th 2022 at 19:28
Cylance co-founder Ryan Permeh has joined full time as an operating partner.
☐ ☆ ✇ Dark Reading:

Vishing Attacks Reach All Time High, According to Latest Agari and PhishLabs Report

May 25th 2022 at 19:25
According to the findings, vishing attacks have overtaken business email compromise as the second most reported response-based email threat since Q3 2021.
☐ ☆ ✇ Dark Reading:

Zero-Click Zoom Bug Allows Code Execution Just by Sending a Message

By Tara Seals, Managing Editor, News, Dark Reading — May 25th 2022 at 19:21
Google has disclosed a nasty set of six bugs affecting Zoom chat that can be chained together for MitM and RCE attacks, no user interaction required.

☐ ☆ ✇ Dark Reading:

Meet the 10 Finalists in the RSA Conference Innovation Sandbox

By Karen Spiegelman, Features Editor — May 25th 2022 at 19:17
This year's finalists tackle such vital security concerns as permissions management, software supply chain vulnerability, and data governance. Winners will be announced June 6.

☐ ☆ ✇ Dark Reading:

Brexit Leak Site Linked to Russian Hackers

By Dark Reading Staff, Dark Reading — May 25th 2022 at 19:07
Purporting to publish leaked emails of pro-Brexit leadership in the UK, a new site's operations have been traced to Russian cyber-threat actors, Google says.

☐ ☆ ✇ McAfee Blogs

Advancing our Secure Home Platform with DNS over HTTPS

By McAfee — May 25th 2022 at 17:38

On the internet, the Domain Name System (DNS) is the way regular people access websites such as ESPN.com or BBC.com. However, the internet uses a unique series of Internet Protocol (IP) addresses to access websites which are tricky for humans to remember.  Web browsers typically interact with websites through IP addresses, and DNS translates websites into IP addresses so browsers can access Internet resources. Historically, this has been done in the form of unencrypted clear text that ISPs and security providers such as McAfee can read and act upon to sort through risky websites or to improve network performance and intelligence.

However, this also opens up vulnerabilities of security and privacy.  As an industry, (Apple, Microsoft, Google, and others) participants are moving toward encrypting this traffic to and from DNS servers with protocols such as DNS over TLS (DoT) and DNS over HTTPS (DoH). Unless the ISP offers DoT/DoH decryption (translation) capabilities, traffic could go directly to outside DNS providers such as Google DNS and Cloudflare who do. Without this visibility, unsafe websites cannot be seen and blocked using DNS filtering technology. Customers can visit sites created by criminals that can trick them to steal their account credentials, download ransomware, or show inappropriate content to their kids.

We’re advancing our Secure Home Platform (SHP) technology to future proof the ability for our partners to protect their customers, their families, and their connected home devices. McAfee is the first in the market to build and introduce this technology. McAfee and OpenXchange have partnered to provide an integration of a forwarder/translator (PowerDNS) with the home router-based SHP product that will make it possible to keep the traffic within the ISP network, as shown in the diagram below – allowing DNS filtering even in encrypted DNS environments.

The ISP can continue to read the traffic and stands to benefit in several ways:

  • Continued ability to offer security protections such as anti-virus, malware filtering, blocking phishing attempts, distinguishing legitimate services, content caching, and parental controls. McAfee Secure Home Platform protects customers/homes from potential harm from an average of 70 potential threats per week
  • Helps defend against DDoS, man-in-the-middle, and botnet attacks
  • More streamlined DoH connections – more private and secure, especially important to sophisticated consumers
  • Locate content based on user demand, and hence improve performance
  • The ISP is not burdened by support issues caused by traffic going outside their network and purview, e.g., to a third-party DNS provider – fewer unhappy customers and support calls due to fewer security incidents.
  • Help comply with Government regulations – block bad actors, terrorist websites, illegal file-sharing, child abuse, national security, court-ordered regulatory blocklists, ban foreign gambling, etc.

Consumers in turn benefit from these additional capabilities that ISPs can provide in security, privacy, and performance.

If you are interested in McAfee’s exciting new DoT-DoH technology for the Secure Home Platform, please contact your McAfee Account Representative for further details.

The post Advancing our Secure Home Platform with DNS over HTTPS appeared first on McAfee Blog.

☐ ☆ ✇ Dark Reading:

Spring Cleaning Checklist for Keeping Your Devices Safe at Work

By Alex Lisle, Chief Technology Officer, Kryptowire — May 25th 2022 at 17:00
Implement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and employees' devices secure.

☐ ☆ ✇ Dark Reading:

CLOP Ransomware Activity Spiked in April

By Dark Reading Staff, Dark Reading — May 25th 2022 at 16:52
In just one month, the ransomware group's activity rose by 2,100%, a new report finds.

☐ ☆ ✇ Dark Reading:

Industry 4.0 Points Up Need for Improved Security for Manufacturers

By Jordan Kendall, President, Security Compass Advisory — May 25th 2022 at 14:00
With manufacturing ranking as the fourth most targeted sector, manufacturers that understand their exposure will be able to build the necessary security maturity.

☐ ☆ ✇ Dark Reading:

DDoS Extortion Attack Flagged as Possible REvil Resurgence

By Nathan Eddy, Contributing Writer, Dark Reading — May 25th 2022 at 13:41
A DDoS campaign observed by Akamai from actors claiming to be REvil would represent a major pivot in tactics for the gang.

☐ ☆ ✇ Dark Reading:

DBIR Makes a Case for Passwordless

By Dark Reading Staff, Dark Reading — May 24th 2022 at 23:21
Verizon's "2022 Data Breach Investigations Report" repeatedly makes the point that criminals are stealing credentials to carry out their attacks.

☐ ☆ ✇ Naked Security

Poisoned Python and PHP packages purloin passwords for AWS access

By Paul Ducklin — May 24th 2022 at 23:04
More supply chain trouble - this time with clear examples so you can learn how to spot this stuff yourself.

☐ ☆ ✇ Dark Reading:

'There's No Ceiling': Ransomware's Alarming Growth Signals a New Era, Verizon DBIR Finds

By Tara Seals, Managing Editor, News, Dark Reading — May 24th 2022 at 22:44
Ransomware has become so efficient, and the underground economy so professional, that traditional monetization of stolen data may be on its way out.

☐ ☆ ✇ Dark Reading:

Microsoft Elevation-of-Privilege Vulnerabilities Spiked Again in 2021

By Jai Vijayan, Contributing Writer, Dark Reading — May 24th 2022 at 21:43
But there was a substantial drop in the overall number of critical vulnerabilities that the company disclosed last year, new analysis shows.

☐ ☆ ✇ Dark Reading:

New Attack Shows Weaponized PDF Files Remain a Threat

By Dark Reading Staff, Dark Reading — May 24th 2022 at 21:13
Notable new infection chain uses PDF to embed malicious files, load remote exploits, shellcode encryption, and more, new research shows.

☐ ☆ ✇ Dark Reading:

DeFi Is Getting Pummeled by Cybercriminals

By Becky Bracken, Editor, Dark Reading — May 24th 2022 at 20:15
Decentralized finance lost $1.8 billion to cyberattacks last year — and 80% of those events were the result of vulnerable code, analysts say.

☐ ☆ ✇ Dark Reading:

New Connecticut Privacy Law Makes Path to Compliance More Complex

By Stephen Lawton, Contributing Writer — May 24th 2022 at 19:33
As states address privacy with ad-hoc laws, corporate compliance teams try to balance yet another set of similar but diverging requirements.

☐ ☆ ✇ Dark Reading:

XM Cyber Adds New Security Capability for Microsoft Active Directory

May 24th 2022 at 17:56
Company to debut its AD capabilities at the 2022 RSA Conference.
☐ ☆ ✇ Dark Reading:

Strong Password Policy Isn't Enough, Study Shows

By Dark Reading Staff, Dark Reading — May 24th 2022 at 17:40
New analysis reveals basic regulatory password requirements fall far short of providing protection from compromise.

☐ ☆ ✇ Dark Reading:

Netskope Expands Data Protection Capabilities to Endpoint Devices and Private Apps

May 24th 2022 at 16:01
New features include context-aware, zero-trust data protection on local peripherals and devices.
☐ ☆ ✇ Dark Reading:

Nisos Announces $15 Million in Series B Funding Round

May 24th 2022 at 15:56
New funding led by global cyber investor Paladin Capital Group, alongside existing investors Columbia Capital and Skylab Capital.
☐ ☆ ✇ Dark Reading:

Crypto Hacks Aren't a Niche Concern; They Impact Wider Society

By Steve Forbes, Government Cyber Security Expert, Nominet — May 24th 2022 at 14:00
Million-dollar crypto heists are becoming more common as the currency starts to go mainstream; prevention and enforcement haven't kept pace.

☐ ☆ ✇ Dark Reading:

Multiple Governments Buying Android Zero-Days for Spying: Google

By Dark Reading Staff, Dark Reading — May 23rd 2022 at 21:22
An analysis from Google TAG shows that Android zero-day exploits were packaged and sold for state-backed surveillance.

☐ ☆ ✇ Dark Reading:

QuSecure Carves Out Space in Quantum Cryptography With Its Vision of a Post-RSA World

By Jeffrey Schwartz, Contributing Writer — May 23rd 2022 at 21:13
NIST may be on the brink of revealing which post-quantum computing encryption algorithms it is endorsing, solidifying commercial developments like QuProtect.

☐ ☆ ✇ Dark Reading:

Malicious Python Repository Package Drops Cobalt Strike on Windows, macOS & Linux Systems

By Jai Vijayan, Contributing Writer, Dark Reading — May 23rd 2022 at 21:03
The PyPI "pymafka" package is the latest example of growing attacker interest in abusing widely used open source software repositories.

☐ ☆ ✇ Dark Reading:

Linux Trojan XorDdos Attacks Surge, Targeting Cloud, IoT

By Dark Reading Staff, Dark Reading — May 23rd 2022 at 18:18
Analysts have seen a massive spike in malicious activity by the XorDdos Trojan in the last six months, against Linux cloud and IoT infrastructures .

☐ ☆ ✇ Dark Reading:

Why the Employee Experience Is Cyber Resilience

By Daniel Riedel, SVP, Strategic Services, Copado — May 23rd 2022 at 17:38
A culture of trust, combined with tools designed around employee experience, can work in tandem to help organizations become more resilient and secure.

☐ ☆ ✇ Dark Reading:

Valeo Networks Acquires Next I.T.

May 23rd 2022 at 14:31
Next I.T. is the sixth and largest acquisition to date for Valeo Networks.
☐ ☆ ✇ Dark Reading:

Kingston Digital Releases Touch-Screen Hardware-Encrypted External SSD for Data Protection

May 23rd 2022 at 14:28
IronKey Vault Privacy 80 External SSD safeguards against brute-force attacks and BadUSB with digitally-signed firmware.
☐ ☆ ✇ Dark Reading:

After the Okta Breach, Diversify Your Sources of Truth

By Gal Diskin, CTO and Co-Founder, Authomize — May 23rd 2022 at 14:00
What subsequent protections do you have in place when your first line of defense goes down?

☐ ☆ ✇ Naked Security

Clearview AI face-matching service fined a lot less than expected

By Paul Ducklin — May 23rd 2022 at 13:01
The fine has finally gone through... but it's less than 45% of what was originally proposed.

eleceye-1200

❌