FreshRSS

๐Ÿ”’
โ˜ โ˜† โœ‡ Dark Reading:

Phishing in Troubled Waters: 3 Ways Email Attacks May Impact Elections

By Darktrace Experts Staff โ€” October 13th 2020 at 19:30
The state of email defenses has a role to play in the US presidential election.

โ˜ โ˜† โœ‡ Dark Reading:

Treasury Dept. Advisory Shines Spotlight on Ransomware Negotiators

By Jai Vijayan Contributing Writer โ€” October 13th 2020 at 18:45
With attacks showing no signs of abating, some companies have begun offering services to help reduce ransom demands, buy more time, and arrange payments.

โ˜ โ˜† โœ‡ Dark Reading:

25% of BEC Cybercriminals Based in the US

By Kelly Sheridan Staff Editor, Dark Reading โ€” October 13th 2020 at 18:10
While the US is known to be a prime target for BEC attacks, just how many perpetrators are based there came as a surprise to researchers.

โ˜ โ˜† โœ‡ Dark Reading:

Where are the 'Great Exits' in the Data Security Market?

By Dave Cole Cofounder and CEO, Open Raven โ€” October 13th 2020 at 18:00
If data security were a student, its report card would read "Not performing to potential." Here's why.

โ˜ โ˜† โœ‡ Dark Reading:

Trickbot Botnet Response Highlights Partnerships Preventing US Election Interference

By Tanner Johnson Senior Analyst, Connectivity & IoT, OMDIA โ€” October 13th 2020 at 16:00
Recent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption.

โ˜ โ˜† โœ‡ Dark Reading:

Security Officers, Are Your Employees Practicing Good Habits from Home?

By Chip Witt Vice President of Product Management at SpyCloud โ€” October 12th 2020 at 14:00
Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.

โ˜ โ˜† โœ‡ Dark Reading:

Online Voting Is Coming, but How Secure Will It Be?

By Brad Brooks CEO of OneLogin โ€” October 13th 2020 at 14:00
It's time for state governments to act as leaders, adopt digital ID standards, enable new online voting systems, and provide broad-based access to all communities for the benefit of all.

โ˜ โ˜† โœ‡ Dark Reading:

Software AG Continues Efforts Against $20M Ransomware Attack

By Dark Reading Staff โ€” October 12th 2020 at 21:10
The attack, which now includes extortion components, has moved into its second week.

โ˜ โ˜† โœ‡ Dark Reading:

Security Firms & Financial Group Team Up to Take Down Trickbot

By Robert Lemos Contributing Writer โ€” October 12th 2020 at 19:20
Microsoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation's C2 infrastructure.

โ˜ โ˜† โœ‡ Dark Reading:

What Is End-to-End Encryption?

By Hudson Bloom, Senior Consultant, Application Security, Optiv: End-to-end encryption is a style of encrypted connection in which... โ€” October 12th 2020 at 18:30
Many services advertise E2EE, but not all of them actually offer it.

โ˜ โ˜† โœ‡ Dark Reading:

Security Officers, Are Your Employers Practicing Good Habits from Home?

By Chip Witt Vice President of Product Management at SpyCloud โ€” October 12th 2020 at 14:00
Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.

โ˜ โ˜† โœ‡ Dark Reading:

A 7-Step Cybersecurity Plan for Healthcare Organizations

By Steve Zurier Contributing Writer โ€” October 12th 2020 at 14:00
With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations.

โ˜ โ˜† โœ‡ Dark Reading:

How to Pinpoint Rogue IoT Devices on Your Network

By Kelly Sheridan Staff Editor, Dark Reading โ€” October 12th 2020 at 13:10
Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.

โ˜ โ˜† โœ‡ Dark Reading:

Security and DevOps

October 12th 2020 at 10:00
โ˜ โ˜† โœ‡ Dark Reading:

Latest Version of MalLocker Android Ransomware Packs New Tricks

By Jai Vijayan Contributing Writer โ€” October 9th 2020 at 20:20
Like most such mobile malware, the new one doesn't encrypt data but attempts to make an infected system impossible to use, Microsoft says.

โ˜ โ˜† โœ‡ Dark Reading:

Apple Pays Bug Bounty to Enterprise Network Researchers

By Dark Reading Staff โ€” October 9th 2020 at 20:10
So far, the company has doled out $288,000 to five researchers who, in three months, found 55 vulnerabilities in its corporate infrastructure.

โ˜ โ˜† โœ‡ Dark Reading:

Critical Zerologon Flaw Exploited in TA505 Attacks

By Dark Reading Staff โ€” October 9th 2020 at 18:15
Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.

โ˜ โ˜† โœ‡ Dark Reading:

CISOs Planning on Bigger Budgets: Report

By Dark Reading Staff โ€” October 9th 2020 at 17:20
Budgets are on the rise, even in a time of revenue worries across the industry.

โ˜ โ˜† โœ‡ Dark Reading:

Why MSPs Are Hacker Targets, and What To Do About It

By John Hammond Senior Security Researcher at Huntress โ€” October 9th 2020 at 14:00
Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.

โ˜ โ˜† โœ‡ Dark Reading:

Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

By Samuel Greengard Freelance Writer โ€” October 9th 2020 at 11:30
In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.

โ˜ โ˜† โœ‡ Dark Reading:

Cyberattacks Up, But Companies (Mostly) Succeed in Securing Remote Workforce

By Robert Lemos Contributing Writer โ€” October 8th 2020 at 21:50
Despite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.

โ˜ โ˜† โœ‡ Dark Reading:

Scale Up Threat Hunting to Skill Up Analysts

By Chris Hoff Product Marketing Manager, ReversingLabs โ€” October 8th 2020 at 18:00
Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why.

โ˜ โ˜† โœ‡ Dark Reading:

US Seizes Domain Names Used in Iranian Disinformation Campaign

By Dark Reading Staff โ€” October 8th 2020 at 17:55
The US has seized 92 domain names used by Iran's Islamic Revolutionary Guard Corps to spread a worldwide disinformation campaign.

โ˜ โ˜† โœ‡ Dark Reading:

US Election-Related Websites Vulnerable to Fraud, Abuse

By Steve Zurier Contributing Writer โ€” October 8th 2020 at 16:00
New research finds the vast majority of reputable news, political, and donor-oriented sites don't use registry locks.

โ˜ โ˜† โœ‡ Dark Reading:

Kaspersky Researchers Spot Russia-on-Russia Cyber-Espionage Campaign

By Kelly Jackson Higgins Executive Editor at Dark Reading โ€” October 8th 2020 at 15:55
Steganography-borne malware used to spy on industrial targets in Russia.

โ˜ โ˜† โœ‡ Dark Reading:

Key Considerations & Best Practices for Establishing a Secure Remote Workforce

By Kurt John Chief Cybersecurity Officer, Siemens USA โ€” October 8th 2020 at 14:00
Cybersecurity is challenging but not paralyzing, and now is the moment to educate our employees to overcome these challenges.

โ˜ โ˜† โœ‡ Dark Reading:

'Bahamut' Threat Group Targets Government & Industry in Middle East

By Kelly Sheridan Staff Editor, Dark Reading โ€” October 7th 2020 at 22:00
Researchers say the cyber espionage group was involved in several attacks against government officials and businesses in the Middle East and South Asia.

โ˜ โ˜† โœ‡ Dark Reading:

New 'HEH' Botnet Targets Exposed Telnet Services

By Jai Vijayan Contributing Writer โ€” October 7th 2020 at 21:30
Latest threat is one in a growing list of malware developed in the Go programming language.

โ˜ โ˜† โœ‡ Dark Reading:

Open Source Threat Intelligence Searches for Sustainable Communities

By Robert Lemos Contributing Writer โ€” October 7th 2020 at 21:00
As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...

โ˜ โ˜† โœ‡ Dark Reading:

Rare Firmware Rootkit Discovered Targeting Diplomats, NGOs

By Kelly Jackson Higgins Executive Editor at Dark Reading โ€” October 7th 2020 at 20:45
Second-ever sighting of a firmware exploit in the wild is a grim reminder of the dangers of these mostly invisible attacks.

โ˜ โ˜† โœ‡ Dark Reading:

3 Ways Companies are Working on Security by Design

By Ericka Chickowski Contributing Writer โ€” October 7th 2020 at 20:30
Execs from top financial organizations and other companies share insights on building a security culture.

โ˜ โ˜† โœ‡ Dark Reading:

Cyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare Threats

By Robert Lemos Contributing Writer โ€” October 7th 2020 at 20:05
Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.

โ˜ โ˜† โœ‡ Dark Reading:

CISA Warns of Renewed Emotet Activity

By Dark Reading Staff โ€” October 7th 2020 at 18:30
The Emotet malware dropper is seeing an upsurge in new activity in the second half of 2020.

โ˜ โ˜† โœ‡ Dark Reading:

The New War Room: Cybersecurity in the Modern Era

By Satya Gupta Executive Co-Founder & CTO, Virsec โ€” October 7th 2020 at 18:00
The introduction of the virtual war room is a new but necessary shift. To ensure its success, security teams must implement new systems and a new approach to cybersecurity.

โ˜ โ˜† โœ‡ Dark Reading:

What the Sci-Fi Hit Altered Carbon Teaches Us About Virtualization Security

By Corey Nachreiner Chief Technology Officer, WatchGuard Technologies โ€” October 7th 2020 at 14:00
The Netflix show may be fantastical, but it has real-world lessons about virtualization.

โŒ