FreshRSS

πŸ”’
☐ β˜† βœ‡ Dark Reading:

Auth0 Credential Guard Detects Breached Passwords to Prevent Account Takeover

February 9th 2022 at 20:00
New feature adds a dedicated security team and support for multiple languages to prevent fraudulent access with stolen credentials.
☐ β˜† βœ‡ Dark Reading:

Log4j and the Role of SBOMs in Reducing Software Security Risk

By Walter Capitani, Director, Technical Product Management, GrammaTech β€” February 9th 2022 at 15:00
Enterprises are spending a pittance on securing their software supply chain, which makes COTS software dangerous β€” vulnerabilities can be "hidden" in open source components.

☐ β˜† βœ‡ Dark Reading:

Mitigate Ransomware Risks With Modern Log Management

By Simon Simonsen, Sr. Security Architect, CrowdStrike β€” February 9th 2022 at 12:21
Enterprises using a modern log management platform have key tools in place to detect and mitigate some of the risks from a ransomware attack.

☐ β˜† βœ‡ Dark Reading:

Microsoft Issues 51 CVEs for Patch Tuesday, None 'Critical'

By Dark Reading Staff, Dark Reading β€” February 8th 2022 at 23:00
One publicly known flaw β€” an elevation-of-privilege bug in Windows Kernel β€” was included in the patches.

☐ β˜† βœ‡ Dark Reading:

Google Cuts User Account Compromises in Half With Simple Change

By Robert Lemos, Contributing Writer β€” February 8th 2022 at 21:43
The online tech giant auto-enabled two-step verification for more than 150 million users, throwing up steep hurdles against scammers and attackers.

☐ β˜† βœ‡ Dark Reading:

Get Started on Continuous Compliance Ahead of PCI DSS v4.0

By David Bisson, Contributing Writer β€” February 8th 2022 at 21:17
Here's what retailers and anyone collecting payments can do to prepare in the time remaining before the final release of PCI DSS 4.0 this quarter.

☐ β˜† βœ‡ Dark Reading:

Threat Actors Revive 20-Year-Old Tactic in Microsoft 365 Phishing Attacks

By Jai Vijayan, Contributing Writer β€” February 8th 2022 at 21:00
Recent attacks involving so-called "right-to-left override" spoofing aimed at Microsoft 365 users show how attackers sometimes modify and improve old methods to try and stay one step ahead of defenders.

☐ β˜† βœ‡ Dark Reading:

Prioritizing the Right Vulnerabilities to Reduce Risk

By Alyssa Ideboen, Product Marketing, Security Operations, CrowdStrike β€” February 8th 2022 at 09:21
Prioritization needs to be part of vulnerability management if security teams are to keep up and mitigate issues in a timely manner.

☐ β˜† βœ‡ Dark Reading:

Vulnerability Scanning Triples, Leading to Two-Thirds Fewer Flaws

By Robert Lemos, Contributing Writer β€” February 8th 2022 at 18:19
Companies are scanning more applications for vulnerabilities β€” and more often.

☐ β˜† βœ‡ Dark Reading:

Cyber Terrorism Is a Growing Threat & Governments Must Take Action

By Lionel Sigal, Head of CTI, CYE β€” February 8th 2022 at 18:00
With its benefits of deniability, relatively low costs, and the ability to attack from anywhere, cyber terrorism will increasingly threaten civilians everywhere.

☐ β˜† βœ‡ Dark Reading:

Qualys Launches Context XDR

February 8th 2022 at 15:10
Qualys Context XDR provides the security context that operations teams need to eliminate false positives and noise by triangulating risk posture, asset criticality, and threat intelligence.
☐ β˜† βœ‡ Dark Reading:

InterVision Unveils Ransomware Protection as a Service

February 8th 2022 at 15:05
InterVision RPaaS solution provides protection, response, and recovery in one managed service.
☐ β˜† βœ‡ Dark Reading:

DeepSurface Security Secures $4.5M for Business Expansion

February 8th 2022 at 15:00
Funding round was led by Differential Ventures, an artificial intelligence and cybersecurity seed venture fund.
☐ β˜† βœ‡ Dark Reading:

Salesforce DevOps Needs Guardrails

By Vernon Keenan, Senior Industry Analyst, SalesforceDevops.net β€” February 8th 2022 at 15:00
Some companies go too fast when it comes to SaaS, DevOps, and security, but smart developers and implementers will respect some basic guidelines to keep their product safe.

☐ β˜† βœ‡ Dark Reading:

Russian APT Steps Up Malicious Cyber Activity in Ukraine

By Jai Vijayan, Contributing Writer β€” February 7th 2022 at 23:31
Actinium/Gameredon's attacks are another reminder of why organizations need to pay additional scrutiny to systems in the region.

☐ β˜† βœ‡ Dark Reading:

FBI Publishes Indicators of Compromise for LockBit 2.0 Ransomware

By Dark Reading Staff, Dark Reading β€” February 7th 2022 at 21:29
Flash bulletin alert includes mitigation strategies for defending against the ransomware.

☐ β˜† βœ‡ Dark Reading:

A Prophylactic Approach for Today's Vulnerable Websites and Web Apps

February 7th 2022 at 20:00
Take a proactive approach to client-side security: Why monitoring your JavaScript programming language is so important to your overall security posture.
☐ β˜† βœ‡ Dark Reading:

SecurityScorecard Acquires LIFARS

February 7th 2022 at 20:00
SecurityScorecard adds digital forensics and incident response to strengthen its products.
☐ β˜† βœ‡ Dark Reading:

When Multifactor Authentication Is Compromised: Fighting Back With AI

By Max Heinemeyer, Director of Threat Hunting, Darktrace β€” February 7th 2022 at 19:30
Now that attackers can bypass preventative controls, we need to find and stop the attackers when they're already inside.

☐ β˜† βœ‡ Dark Reading:

Log4j: Getting From Stopgap Remedies to Long-Term Solutions

By Jeremy Colvin, Technical Product Marketer, Uptycs β€” February 7th 2022 at 15:00
This pervasive vulnerability will require continued care and attention to fully remediate and detect permutations. Here are some ways to get started.

☐ β˜† βœ‡ Dark Reading:

Name That Edge Toon: Head of the Table

By John Klossner, Cartoonist β€” February 7th 2022 at 14:10
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

☐ β˜† βœ‡ Dark Reading:

The 3 Most Common Causes of Data Breaches in 2021

By Edge Editors, Dark Reading β€” February 4th 2022 at 21:23
Phishing, smishing, and business email compromise continue to do their dirty work.

☐ β˜† βœ‡ Dark Reading:

Expert Insights: Training the Data Elephant in the AI Room

By Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning β€” February 4th 2022 at 20:16
Be aware of the risk of inadvertent data exposure in machine learning systems.

☐ β˜† βœ‡ Dark Reading:

China-Linked Group Attacked Taiwanese Financial Firms for 18 Months

By Robert Lemos, Contributing Writer β€” February 4th 2022 at 16:18
The Antlion group, also known as Pirate Panda and Tropic Trooper, has shifted to targeting mainly Taiwan, using custom backdoors against financial organizations.

☐ β˜† βœ‡ Dark Reading:

Want to Be an Ethical Hacker? Here's Where to Begin

By Luke Stephens (aka Hakluke), Security Researcher and Detectify Crowdsource Hacker β€” February 4th 2022 at 15:00
By utilizing these resources, beginner hackers can find their specific passions within the cybersecurity space and eventually make their own mark in the ethical hacking profession.

☐ β˜† βœ‡ Dark Reading:

Mac Malware-Dropping Adware Gets More Dangerous

By Jai Vijayan, Contributing Writer β€” February 3rd 2022 at 23:05
The authors of UpdateAgent have tweaked it yet again β€” for the fifth time in less than 18 months.

☐ β˜† βœ‡ Dark Reading:

Mandiant Bolsters SaaS Platform With Integration of New Attack Surface Management Module

February 3rd 2022 at 23:00
New automated offering helps organizations gain comprehensive visibility across IT environments, continuously monitor for vulnerabilities, operationalize threat intelligence and manage risk.
☐ β˜† βœ‡ Dark Reading:

Several India-Based Call Centers Indicted by US DoJ

By Dark Reading Staff, Dark Reading β€” February 3rd 2022 at 22:30
"Scam robocall" operators face charges for defrauding US citizens.

☐ β˜† βœ‡ Dark Reading:

The Future of Cybersecurity: Our Predictions for 2022

February 3rd 2022 at 22:00
New technologies and workplace trends are fueling a global explosion in cybercrime. Discover the threats to watch out for in 2022.
☐ β˜† βœ‡ Dark Reading:

Tenable Launches Suite of New Features to Cloud-Native Application Security Platform

February 3rd 2022 at 22:00
Tenable.cs enhancements secure cloud resources, container images, and cloud assets
☐ β˜† βœ‡ Dark Reading:

Research From Quantum and ESG Reveals Top Challenges in Data Management

February 3rd 2022 at 21:55
Unstructured data management, storage complexity and cost remain barriers to adoption, resulting in valuable data being discarded or mismanaged.
☐ β˜† βœ‡ Dark Reading:

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT)

February 3rd 2022 at 21:50
Menlo identified 224% increase in HEAT attacks in the last six months fueling ransomware surge.
☐ β˜† βœ‡ Dark Reading:

DHS Launches Cyber Safety Review Board to Analyze Major Vulnerability Events

By Robert Lemos, Contributing Writer β€” February 3rd 2022 at 21:50
The US Department of Homeland Security has named a 15-member review board to assess significant cybersecurity events and recommend improvements - starting with the Log4J vulnerability.

☐ β˜† βœ‡ Dark Reading:

Microsoft: Multifactor Adoption Remains Low

By Kelly Jackson Higgins, Editor-in-Chief β€” February 3rd 2022 at 21:00
New data shows a slow roll to strong authentication for most enterprise Windows systems.

☐ β˜† βœ‡ Dark Reading:

BIO-key to Expand Customer Reach and Talent in EMEA Region

February 3rd 2022 at 21:00
Expansion comes via definitive agreement to acquire authentication solutions provider Swivel Secure Europe.
☐ β˜† βœ‡ Dark Reading:

Keeper Security Acquires Glyptodon

February 3rd 2022 at 21:00
The acquisition enables distributed teams to connect to remote or cloud infrastructure in a hyper-secure, agentless and passwordless way without a VPN.
☐ β˜† βœ‡ Dark Reading:

BreachQuest Welcomes Sandy Dunn as Chief Information Security Officer

February 3rd 2022 at 21:00
Industry cybersecurity veteran joins executive team of leading cyber experts with key experience In healthcare market.
☐ β˜† βœ‡ Dark Reading:

HackNotice Releases Combined Security and Threat Awareness Service for Free

February 3rd 2022 at 21:00
HackNotice users can now deepen their security awareness with a self-paced training course to prevent themselves from being targets of cyberattacks.
☐ β˜† βœ‡ Dark Reading:

Simplifying Zero Trust Security in Healthcare Organizations

By Kapil Raina, VP Zero Trust & Identity Marketing, CrowdStrike β€” February 3rd 2022 at 19:11
Healthcare organizations are increasingly looking at zero trust to help deter ransomware attacks, safeguard PHI, and prevent downtime.

☐ β˜† βœ‡ Dark Reading:

Big Pharma Finds Patch Management a Bitter Pill

By Dark Reading Staff, Dark Reading β€” February 3rd 2022 at 19:00
One-quarter of pharmaceutical manufacturers received a failing grade on patch management, which is a vital step in heading off ransomware attacks.

☐ β˜† βœ‡ Dark Reading:

Hackers Went Wild in 2021 β€” Every Company Should Do These 5 Things in 2022

By Lech Sandecki, Product Strategy Manager, Canonical, the publisher of Ubuntu β€” February 3rd 2022 at 15:00
Practical steps companies can take to defend their critical infrastructure and avoid the financial and reputational damage that could result from a breach.

☐ β˜† βœ‡ Dark Reading:

If My Organization Is Mostly in the Cloud, Do I Need a Firewall?

By Heather Paunet, Senior Vice President, Untangle β€” February 2nd 2022 at 23:00
A firewall is still a valuable part of the IT security stack, but businesses need to consider all of their attack surfaces.

☐ β˜† βœ‡ Dark Reading:

Cato Networks Delivers Instant Visibility and Control of Cloud Application Data Risk

February 2nd 2022 at 21:16
CASB Cato converges a full CASB into its global SASE platform to defend enterprises against data breach and cloud-delivered threats.
☐ β˜† βœ‡ Dark Reading:

INKY Completes Email Security Offering With Launch of Outbound Mail Protection

February 2nd 2022 at 21:00
INKY Outbound Mail Protection manages a multistep approval workflow providing enforcement within the email system itself.
☐ β˜† βœ‡ Dark Reading:

WhiteSource Threat Report Reveals Massive Uptick In Cyberattacks Related To JavaScript npm

February 2nd 2022 at 20:30
More than 1,300 malicious npm packages have been discovered for use in supply chain attacks, cryptojacking, data stealing, and more.
☐ β˜† βœ‡ Dark Reading:

Why Security Pros Are Frustrated With Cloud Security

By Robert Lemos, Contributing Writer β€” February 2nd 2022 at 20:27
As companies shift more operations to the cloud, a shortfall in security talent and too much security data wastes more than half of the time spent on security issues, a survey finds.

☐ β˜† βœ‡ Dark Reading:

Foresite Cybersecurity Acquires Cyber Lantern

February 2nd 2022 at 20:00
Support for more than 160 important compliance standards have been integrated into SaaS solution for small and midsize enterprises.
☐ β˜† βœ‡ Dark Reading:

Managing Detections Is Not the Same as Stopping Breaches

By Austin Murphy, vice-president of managed services, CrowdStrike β€” February 2nd 2022 at 18:30
Enterprises interested in managed detection and response (MDR) services to monitor endpoints and workloads should make sure the providers have rock-solid expertise in detecting and responding to threats.

☐ β˜† βœ‡ Dark Reading:

The Real-World Impact of the Global Cybersecurity Workforce Gap on Cyber Defenders

By Clar Rosso, CEO, (ISC)Β² β€” February 2nd 2022 at 18:00
The effect is nuanced β€” and fundamental to cyber defense for organizations and nations.

☐ β˜† βœ‡ Dark Reading:

Olympic Athletes Advised by FBI to Bring 'Burner' Phones to Beijing

By Dark Reading Staff, Dark Reading β€” February 2nd 2022 at 15:10
No specific threats against the Olympics, according to the FBI, but instead it's about vigilance against potential ones.

☐ β˜† βœ‡ Dark Reading:

8 Security Dinosaurs and What Filled Their Footprints

By Ericka Chickowski, Contributing Writer β€” February 2nd 2022 at 15:10
Security technology has to evolve as new threats emerge and defenses improve. Here is a look back at the old breeds that are dying out.

☐ β˜† βœ‡ Dark Reading:

TikTok's Roland Cloutier: How CISOs Can Foster a Culture of Security & Transparency

By Jack Koziol, CEO & Founder, Infosec Institute β€” February 2nd 2022 at 15:00
The social media platform's global security chief boils it down to being consistent, keeping it fun, and demonstrating the impact of choices.

☐ β˜† βœ‡ Dark Reading:

Tens of Thousands of Websites Vulnerable to RCE Flaw in WordPress Plug-in

By Jai Vijayan, Contributing Writer β€” February 2nd 2022 at 14:30
Now-patched issue in Essential Addons for Elementor gives attackers a way to carry out local file inclusion attacks, researchers say.

☐ β˜† βœ‡ Dark Reading:

Secure Web Browsers Tackle Ransomware, Insider Threat in Enterprises

By Fahmida Y. Rashid, Features Editor, Dark Reading β€” February 1st 2022 at 23:36
Enterprise security teams can use secure Web browsers to apply controls and governance to cloud applications and customer data.

☐ β˜† βœ‡ Dark Reading:

ThycoticCentrify Renamed Delinea

By Dark Reading Staff, Dark Reading β€” February 1st 2022 at 23:04
Privileged access management vendor rebrands.

☐ β˜† βœ‡ Dark Reading:

Nucleus Security Forms Strategic Partnership with Mandiant

February 1st 2022 at 23:00
Intent is to enhance vulnerability management programs with operationalized threat intelligence.
☐ β˜† βœ‡ Dark Reading:

Vectra Acquires Siriux Security Technologies to Extend Leadership in Identity and SaaS Threat Management

February 1st 2022 at 22:30
The acquisition positions Vectra to help customers securely configure and detect active threats in cloud identity and SaaS applications, including Microsoft Azure AD and Microsoft 365.
☐ β˜† βœ‡ Dark Reading:

Forescout Acquires CyberMDX to Expand Healthcare Cybersecurity Focus

February 1st 2022 at 22:20
Acquisition adds Internet of Medical Things (IoMT) expertise to Forescout’s IT, IoT, and OT coverage.
☐ β˜† βœ‡ Dark Reading:

Ping Identity Launches PingOne DaVinci

February 1st 2022 at 22:20
No-code identity orchestration service enables organizations to design better user experiences with drag-and-drop simplicity.
☐ β˜† βœ‡ Dark Reading:

Digital Shadows Launches New Vulnerability Intelligence Module

February 1st 2022 at 22:15
New capability simplifies challenge of prioritizing CVEs for faster triage and remediation.
❌