FreshRSS

๐Ÿ”’
โ˜ โ˜† โœ‡ Dark Reading:

Do Standards Exist That Certify Secure IoT Systems?

By Loren Browman, senior security consultant, Optiv: The IoT industry remains fragmented with a lot of players, big and smal...While these products may be cool and innovative ... โ€” October 20th 2020 at 19:15
The IoT industry remains fragmented with a lot of players, big and small, churning out a lot of products.

โ˜ โ˜† โœ‡ Dark Reading:

NSA Reveals the Top 25 Vulnerabilities Exploited by Chinese Nation-State Hackers

By Dark Reading Staff โ€” October 20th 2020 at 18:50
Officials urge organizations to patch the vulnerabilities most commonly scanned for, and exploited by, Chinese attackers.

โ˜ โ˜† โœ‡ Dark Reading:

The Cybersecurity Maturity Model Certification: Are You in Compliance?

By Nahla Davies Tech Writer and Coder โ€” October 20th 2020 at 18:00
Not only can this framework help companies remain solvent, but it will also protect critical information from getting into the wrong hands.

โ˜ โ˜† โœ‡ Dark Reading:

Farsight Labs Launched as Security Collaboration Platform

By Dark Reading Staff โ€” October 20th 2020 at 16:50
Farsight Security's platform will offer no-cost access to certain tools and services.

โ˜ โ˜† โœ‡ Dark Reading:

Businesses Rethink Endpoint Security for 2021

By Kelly Sheridan Staff Editor, Dark Reading โ€” October 20th 2020 at 15:08
The mass movement to remote work has forced organizations to rethink their long-term plans for endpoint security. How will things look different next year?

โ˜ โ˜† โœ‡ Dark Reading:

Building the Human Firewall

By Aamir Lakhani Cybersecurity Researcher and Practitioner for FortiGuard Labs โ€” October 20th 2020 at 14:00
Cybersecurity was a challenge before COVID-19 sent millions of employees home to work from their own devices and networks. Now what?

โ˜ โ˜† โœ‡ Dark Reading:

Trickbot Tenacity Shows Infrastructure Resistant to Takedowns

By Robert Lemos Contributing Writer โ€” October 20th 2020 at 12:15
Both the US Cyber Command and a Microsoft-led private-industry group have attacked the infrastructure used by attackers to manage Trickbot -- but with only a short-term impact.

โ˜ โ˜† โœ‡ Dark Reading:

NSS Labs Shuttered

By Kelly Jackson Higgins Executive Editor at Dark Reading โ€” October 19th 2020 at 23:10
The testing firm's website says it has "ceased operations" as of Oct. 15.

โ˜ โ˜† โœ‡ Dark Reading:

Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns

By Kelly Jackson Higgins Executive Editor at Dark Reading โ€” October 19th 2020 at 22:40
US Department of Justice charges members of Sandworm/APT28 for BlackEnergy, NotPetya, Olympic Destroyer, and other major attacks.

โ˜ โ˜† โœ‡ Dark Reading:

GravityRAT Spyware Targets Android & MacOS in India

By Dark Reading Staff โ€” October 19th 2020 at 21:25
The Trojan once used in attacks against Windows systems has been transformed into a multiplatform tool targeting macOS and Android.

โ˜ โ˜† โœ‡ Dark Reading:

IoT Vulnerability Disclosure Platform Launched

By Dark Reading Staff โ€” October 19th 2020 at 21:03
VulnerableThings.com is intended to help vendors meet the terms of a host of new international IoT security laws and regulations.

โ˜ โ˜† โœ‡ Dark Reading:

Microsoft Tops Q3 List of Most-Impersonated Brands

By Steve Zurier Contributing Writer โ€” October 19th 2020 at 21:00
The technology sector was also the most likely targeted industry for brand phishing attacks, according to Check Point's latest report on brand phishing.

โ˜ โ˜† โœ‡ Dark Reading:

Trickbot, Phishing, Ransomware & Elections

By Adam Caudill Principal Security Engineer at 1Password โ€” October 19th 2020 at 18:00
The botnet has taken some hits lately, but that doesn't mean the threat is over. Here are some steps you can take to keep it from your door.

โ˜ โ˜† โœ‡ Dark Reading:

7 Tips for Choosing Security Metrics That Matter

By Ericka Chickowski Contributing Writer โ€” October 19th 2020 at 16:45
Experts weigh in on picking metrics that demonstrate how the security team is handling operational efficiency and reducing risk.

โ˜ โ˜† โœ‡ Dark Reading:

Chart: The Pandemic Reprioritizes Security Projects

By Edge Editors Dark Reading โ€” October 19th 2020 at 16:20
Responses among IT and security pros reflect concern over vulnerabilities incurred by workers accessing the enterprise network from poorly protected home networks.

โ˜ โ˜† โœ‡ Dark Reading:

A Swift Reminder About Cybersecurity

By Edge Editors Dark Reading โ€” October 19th 2020 at 15:15
The hackers gonna crack, crack, crack, crack, crack ...

โ˜ โ˜† โœ‡ Dark Reading:

Expert Tips to Keep WordPress Safe

By Curtis Franklin Jr. Senior Editor at Dark Reading โ€” October 19th 2020 at 14:55
The most widely used content management system on the Web relies heavily on plug-ins and add-on software -- and that requires rigorous security measures at every level.

โ˜ โ˜† โœ‡ Dark Reading:

A New Risk Vector: The Enterprise of Things

By Greg Clark CEO, Forescout Technologies Inc. โ€” October 19th 2020 at 14:00
Billions of devices -- including security cameras, smart TVs, and manufacturing equipment -- are largely unmanaged and increase an organization's risk.

โ˜ โ˜† โœ‡ Dark Reading:

Massive New Phishing Campaigns Target Microsoft, Google Cloud Users

By Dark Reading Staff โ€” October 16th 2020 at 21:45
At least three campaigns are now underway.

โ˜ โ˜† โœ‡ Dark Reading:

US Counterintelligence Director & Fmr. Europol Leader Talk Election Security

By Kelly Sheridan Staff Editor, Dark Reading โ€” October 16th 2020 at 19:35
The US counterintelligence lead joins a former Europol cyber chief to discuss modern election threats and the benefits of public-private collaboration.

โ˜ โ˜† โœ‡ Dark Reading:

An Uncommon 20 Years of Commonly Enumerating Vulns

By Curtis Franklin Jr. Senior Editor at Dark Reading โ€” October 16th 2020 at 19:15
Larry Cashdollar, a researcher with more than 300 CVEs to his credit, looks back at his favorite vulnerabilities (and being the only individual CNA on Mitre's list).

โ˜ โ˜† โœ‡ Dark Reading:

Academia Adopts Mitre ATT&CK Framework

By Robert Lemos Contributing Writer โ€” October 16th 2020 at 16:05
Security pros and academic researchers discuss the best ways to use MITRE's framework to inform cybersecurity efforts, analyze threats, and teach future workers.

โ˜ โ˜† โœ‡ Dark Reading:

Cybercrime Losses Up 50%, Exceeding $1.8B

By Marc Wilczek Digital Strategist & COO of Link11 โ€” October 16th 2020 at 14:00
Fewer companies are being hit by cyber incidents, but those that do get hit are hit harder and more often.

โ˜ โ˜† โœ‡ Dark Reading:

Prolific Cybercrime Group Now Focused on Ransomware

By Robert Lemos Contributing Writer โ€” October 15th 2020 at 22:30
Cybercriminal team previously associated with point-of-sale malware and data theft has now moved almost completely into the more lucrative crimes of ransomware and extortion.

โ˜ โ˜† โœ‡ Dark Reading:

US Indicts Members of Transnational Money-Laundering Organization

By Jai Vijayan Contributing Writer โ€” October 15th 2020 at 22:20
Members of the QQAAZZ group helped cybercriminals conceal origins of stolen funds, DoJ alleges.

โ˜ โ˜† โœ‡ Dark Reading:

Twitter Hack Analysis Drives Calls for Greater Security Regulation

By Dark Reading Staff โ€” October 15th 2020 at 19:45
New York's Department of Financial Services calls for more cybersecurity regulation at social media firms following the "jarringly easy" Twitter breach.

โ˜ โ˜† โœ‡ Dark Reading:

Barnes & Noble Warns Customers About Data Breach

By Dark Reading Staff โ€” October 15th 2020 at 19:00
Famed bookseller says non-financial data was exposed in a new attack.

โ˜ โ˜† โœ‡ Dark Reading:

Overcoming the Challenge of Shorter Certificate Lifespans

By Mike Cooper Founder & CEO of Revocent โ€” October 15th 2020 at 18:00
We could be in the middle of a major transition to shorter and shorter certificate life spans, which has significant implications for how IT organizations manage certificates across the enterprise.

โ˜ โ˜† โœ‡ Dark Reading:

The Ruthless Cyber Chaos of Business Recovery

By Emil Sayegh CEO and President, Ntirety โ€” October 15th 2020 at 14:00
Critical technology initiatives leveraging the best of technology solutions are the only way through the cyber chaos of 2020.

โ˜ โ˜† โœ‡ Dark Reading:

Microsoft Office 365 Accounts a Big Target for Attackers

By Jai Vijayan Contributing Writer โ€” October 15th 2020 at 10:50
Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.

โ˜ โ˜† โœ‡ Dark Reading:

Zoom Announces Rollout of End-to-End Encryption

By Dark Reading Staff โ€” October 14th 2020 at 20:35
Phase 1 removes Zoom servers from the key generation and distribution processes.

โ˜ โ˜† โœ‡ Dark Reading:

London Borough of Hackney Investigates 'Serious' Cyberattack

By Dark Reading Staff โ€” October 14th 2020 at 19:50
London's Hackney Council says some services may be slow or unavailable as it looks into a cyberattack affecting services and IT systems.

โ˜ โ˜† โœ‡ Dark Reading:

What's Really Happening in Infosec Hiring Now?

By Joan Goodchild Contributing Writer โ€” October 14th 2020 at 19:30
As the pandemic continues, security teams still need help they can't get. But the "skills shortage" is only part of the story.

โ˜ โ˜† โœ‡ Dark Reading:

Assuring Business Continuity by Reducing Malware Dwell Time

By Brendan O'Flaherty Chief Executive Officer at cPacket Networks โ€” October 14th 2020 at 18:00
Here's how CISOs and IT security operations teams can best address key challenges to network monitoring that could increase malware dwell time.

โ˜ โ˜† โœ‡ Dark Reading:

Intel's Ice Lake Beefs Up CPU Security for Cloud Workloads

By Robert Lemos Contributing Writer โ€” October 14th 2020 at 16:45
The third-generation Xeon processors build in hardware security features to provide extra protection to data in transit, at rest, and in use.

โ˜ โ˜† โœ‡ Dark Reading:

NIST Quantum Cryptography Program Nears Completion

By Bernie Brode Nano Product Researcher โ€” October 14th 2020 at 14:00
The National Institute of Standards and Technology's first post-quantum cryptography standard will address key issues, approaches, an arms race, and the technology's uncertain future.

โ˜ โ˜† โœ‡ Dark Reading:

Microsoft Fixes Critical Windows TCP/IP Flaw in Patch Rollout

By Kelly Sheridan Staff Editor, Dark Reading โ€” October 13th 2020 at 21:40
The October 2020 Patch Tuesday fixed 87 vulnerabilities, including 21 remote code execution flaws, in Microsoft products and services.

โ˜ โ˜† โœ‡ Dark Reading:

Coalition Pokes Five Eyes on Call for Backdoors

By Dark Reading Staff โ€” October 13th 2020 at 21:15
The Five Eyes international law enforcement group had called for implementing backdoors for law enforcement in all encryption implementations.

โ˜ โ˜† โœ‡ Dark Reading:

Phishing in Troubled Waters: 3 Ways Email Attacks May Impact Elections

By Darktrace Experts Staff โ€” October 13th 2020 at 19:30
The state of email defenses has a role to play in the US presidential election.

โ˜ โ˜† โœ‡ Dark Reading:

Treasury Dept. Advisory Shines Spotlight on Ransomware Negotiators

By Jai Vijayan Contributing Writer โ€” October 13th 2020 at 18:45
With attacks showing no signs of abating, some companies have begun offering services to help reduce ransom demands, buy more time, and arrange payments.

โ˜ โ˜† โœ‡ Dark Reading:

25% of BEC Cybercriminals Based in the US

By Kelly Sheridan Staff Editor, Dark Reading โ€” October 13th 2020 at 18:10
While the US is known to be a prime target for BEC attacks, just how many perpetrators are based there came as a surprise to researchers.

โ˜ โ˜† โœ‡ Dark Reading:

Where are the 'Great Exits' in the Data Security Market?

By Dave Cole Cofounder and CEO, Open Raven โ€” October 13th 2020 at 18:00
If data security were a student, its report card would read "Not performing to potential." Here's why.

โ˜ โ˜† โœ‡ Dark Reading:

Trickbot Botnet Response Highlights Partnerships Preventing US Election Interference

By Tanner Johnson Senior Analyst, Connectivity & IoT, OMDIA โ€” October 13th 2020 at 16:00
Recent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption.

โ˜ โ˜† โœ‡ Dark Reading:

Security Officers, Are Your Employees Practicing Good Habits from Home?

By Chip Witt Vice President of Product Management at SpyCloud โ€” October 12th 2020 at 14:00
Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.

โ˜ โ˜† โœ‡ Dark Reading:

Online Voting Is Coming, but How Secure Will It Be?

By Brad Brooks CEO of OneLogin โ€” October 13th 2020 at 14:00
It's time for state governments to act as leaders, adopt digital ID standards, enable new online voting systems, and provide broad-based access to all communities for the benefit of all.

โ˜ โ˜† โœ‡ Dark Reading:

Software AG Continues Efforts Against $20M Ransomware Attack

By Dark Reading Staff โ€” October 12th 2020 at 21:10
The attack, which now includes extortion components, has moved into its second week.

โ˜ โ˜† โœ‡ Dark Reading:

Security Firms & Financial Group Team Up to Take Down Trickbot

By Robert Lemos Contributing Writer โ€” October 12th 2020 at 19:20
Microsoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation's C2 infrastructure.

โ˜ โ˜† โœ‡ Dark Reading:

What Is End-to-End Encryption?

By Hudson Bloom, Senior Consultant, Application Security, Optiv: End-to-end encryption is a style of encrypted connection in which... โ€” October 12th 2020 at 18:30
Many services advertise E2EE, but not all of them actually offer it.

โ˜ โ˜† โœ‡ Dark Reading:

Security Officers, Are Your Employers Practicing Good Habits from Home?

By Chip Witt Vice President of Product Management at SpyCloud โ€” October 12th 2020 at 14:00
Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.

โ˜ โ˜† โœ‡ Dark Reading:

A 7-Step Cybersecurity Plan for Healthcare Organizations

By Steve Zurier Contributing Writer โ€” October 12th 2020 at 14:00
With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations.

โ˜ โ˜† โœ‡ Dark Reading:

How to Pinpoint Rogue IoT Devices on Your Network

By Kelly Sheridan Staff Editor, Dark Reading โ€” October 12th 2020 at 13:10
Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.

โ˜ โ˜† โœ‡ Dark Reading:

Security and DevOps

October 12th 2020 at 10:00
โ˜ โ˜† โœ‡ Dark Reading:

Latest Version of MalLocker Android Ransomware Packs New Tricks

By Jai Vijayan Contributing Writer โ€” October 9th 2020 at 20:20
Like most such mobile malware, the new one doesn't encrypt data but attempts to make an infected system impossible to use, Microsoft says.

โ˜ โ˜† โœ‡ Dark Reading:

Apple Pays Bug Bounty to Enterprise Network Researchers

By Dark Reading Staff โ€” October 9th 2020 at 20:10
So far, the company has doled out $288,000 to five researchers who, in three months, found 55 vulnerabilities in its corporate infrastructure.

โ˜ โ˜† โœ‡ Dark Reading:

Critical Zerologon Flaw Exploited in TA505 Attacks

By Dark Reading Staff โ€” October 9th 2020 at 18:15
Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.

โ˜ โ˜† โœ‡ Dark Reading:

CISOs Planning on Bigger Budgets: Report

By Dark Reading Staff โ€” October 9th 2020 at 17:20
Budgets are on the rise, even in a time of revenue worries across the industry.

โ˜ โ˜† โœ‡ Dark Reading:

Why MSPs Are Hacker Targets, and What To Do About It

By John Hammond Senior Security Researcher at Huntress โ€” October 9th 2020 at 14:00
Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.

โ˜ โ˜† โœ‡ Dark Reading:

Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

By Samuel Greengard Freelance Writer โ€” October 9th 2020 at 11:30
In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.

โ˜ โ˜† โœ‡ Dark Reading:

Cyberattacks Up, But Companies (Mostly) Succeed in Securing Remote Workforce

By Robert Lemos Contributing Writer โ€” October 8th 2020 at 21:50
Despite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.

โ˜ โ˜† โœ‡ Dark Reading:

Scale Up Threat Hunting to Skill Up Analysts

By Chris Hoff Product Marketing Manager, ReversingLabs โ€” October 8th 2020 at 18:00
Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why.

โŒ