FreshRSS

πŸ”’
☐ β˜† βœ‡ Dark Reading:

Feds, npm Issue Supply Chain Security Guidance to Avert Another SolarWinds

By Dark Reading Staff, Dark Reading β€” September 2nd 2022 at 19:02
The US government and the Open Source Security Foundation have released guidance to shore up software supply chain security, and now it's up to developers to act.

☐ β˜† βœ‡ Dark Reading:

Researchers Spot Snowballing BianLian Ransomware Gang Activity

By Nathan Eddy, Contributing Writer, Dark Reading β€” September 2nd 2022 at 18:56
The operators of the emerging cross-platform ransomware BianLian increased their command and control infrastructure this month, indicating an acceleration in their operational pace.

☐ β˜† βœ‡ Dark Reading:

4 Scenarios for the Digital World of 2040

By Laurent CΓ©lΓ©rier, Executive VP of Technology & Marketing at Orange Cyberdefense β€” September 2nd 2022 at 17:44
Our digital future depends on the choices we make today. We need to invest in cybersecurity technologies and skills so that humanity can control its future.

☐ β˜† βœ‡ Dark Reading:

Raspberry Robin Malware Connected to Russian Evil Corp Gang

By Robert Lemos, Contributing Writer, Dark Reading β€” September 2nd 2022 at 16:52
Infections attributed to the USB-based worm have taken off, and now evidence links the malware to Dridex and the sanctioned Russian cybercriminal group Evil Corp.

☐ β˜† βœ‡ Dark Reading:

AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data

By Tara Seals, Managing Editor, News, Dark Reading β€” September 2nd 2022 at 15:16
Thousands of corporate mobile apps developed by businesses for use by their customers contain hardcoded AWS tokens that can be easily extracted and used to access the full run of corporate data stored in cloud buckets.

☐ β˜† βœ‡ Dark Reading:

The Makings of a Successful Threat-Hunting Program

By Joseph Davidson, Senior Manager, Threat Hunting, Adobe β€” September 2nd 2022 at 14:00
Threat hunters can help build defenses as they work with offensive security teams to identify potential threats and build stronger threat barriers.

☐ β˜† βœ‡ Dark Reading:

Ragnar Locker Brags About TAP Air Portugal Breach

By Dark Reading Staff, Dark Reading β€” September 2nd 2022 at 13:25
TAP assures its customers that it stopped data theft in a recent cyberattack, but the Ragnar Locker ransomware group says it made off with user info.

☐ β˜† βœ‡ Dark Reading:

Ghost Data Increases Enterprise Business Risk

By Edge Editors, Dark Reading β€” September 2nd 2022 at 00:00
IT has to get its hands around cloud data sprawl. Another area of focus should be on ghost data, as it expands the organization's cloud attack surface.

☐ β˜† βœ‡ Dark Reading:

Neopets Hackers Had Network Access for 18 Months

By Dark Reading Staff, Dark Reading β€” September 1st 2022 at 20:36
Neopets has confirmed that its IT systems were compromised from January 2021 through July 2022, exposing 69 million user accounts and source code.

☐ β˜† βœ‡ Dark Reading:

Threat Actor Phishing PyPI Users Identified

By Jai Vijayan, Contributing Writer, Dark Reading β€” September 1st 2022 at 20:35
"JuiceLedger" has escalated a campaign to distribute its information stealer by now going after developers who published code on the widely used Python code repository.

☐ β˜† βœ‡ Dark Reading:

Skyrocketing IoT Bug Disclosures Put Pressure on Security Teams

By Robert Lemos, Contributing Writer, Dark Reading β€” September 1st 2022 at 19:49
The expanding Internet of Things ecosystem is seeing a startling rate of vulnerability disclosures, leaving companies with a greater need for visibility into and patching of IoT devices.

☐ β˜† βœ‡ Dark Reading:

New Guidelines Spell Out How to Test IoT Security Products

By Nathan Eddy, Contributing Writer, Dark Reading β€” September 1st 2022 at 19:49
The proposed AMTSO guidelines offer a roadmap for comprehensive testing of IoT security products.

☐ β˜† βœ‡ Dark Reading:

Code-Injection Bugs Bite Google, Apache Open Source GitHub Projects

By Ericka Chickowski, Contributing Writer, Dark Reading β€” September 1st 2022 at 16:52
The insecurities exist in CI/CD pipelines and can be used by attackers to subvert modern development and roll out malicious code at deployment.

☐ β˜† βœ‡ Dark Reading:

Apple Quietly Releases Another Patch for Zero-Day RCE Bug

By Elizabeth Montalbano, Contributor, Dark Reading β€” September 1st 2022 at 14:45
Apple continues a staged update process to address a WebKit vulnerability that allows attackers to craft malicious Web content to load malware on affected devices.

☐ β˜† βœ‡ Dark Reading:

(ISC)Β² Launches 'Certified in Cybersecurity' Entry-Level Certification to Address Global Workforce Gap

September 1st 2022 at 14:18
After a rigorous pilot program, the association's newest certification is officially operational. More than 1,500 pilot participants who passed the exam are on the path to full certification.
☐ β˜† βœ‡ Dark Reading:

Real-World Cloud Attacks: The True Tasks of Cloud Ransomware Mitigation

By Ofer Maor, CTO and Co-Founder, Mitiga β€” September 1st 2022 at 14:00
Cloud breaches are inevitable β€” and so is cloud ransomware. (Second of two parts.)

☐ β˜† βœ‡ Dark Reading:

Closing the Security Gap Opened by the Rise of No-Code Tools

By Kolawole Samuel Adebayo, Contributing Writer β€” August 31st 2022 at 23:20
No-code startups such as Mine PrivacyOps say they offer best of both worlds β€” quick development and compliance with privacy laws.

☐ β˜† βœ‡ Dark Reading:

Google Fixes 24 Vulnerabilities With New Chrome Update

By Jai Vijayan, Contributing Writer, Dark Reading β€” August 31st 2022 at 20:10
But one issue that lets websites overwrite content on a user's system clipboard appears unfixed in the new Version 105 of Chrome.

☐ β˜† βœ‡ Dark Reading:

Crypto-Crooks Spread Trojanized Google Translate App in Watering-Hole Attack

By Tara Seals, Managing Editor, News, Dark Reading β€” August 31st 2022 at 20:09
The ongoing campaign is spreading worldwide, using the lure of a fully functional Google Translate application for desktops that has helped the threat stay undetected for months.

☐ β˜† βœ‡ Dark Reading:

James Webb Telescope Images Loaded With Malware Are Evading EDR

By Dark Reading Staff, Dark Reading β€” August 31st 2022 at 18:00
New Golang cyberattacks use deep space images and a new obfuscator to target systems β€” undetected.

☐ β˜† βœ‡ Dark Reading:

The Pros and Cons of Managed Firewalls

August 31st 2022 at 18:00
Managed firewalls are increasingly popular. This post examines the strengths and weaknesses of managed firewalls to help your team decide on the right approach.
☐ β˜† βœ‡ Dark Reading:

OpenText Goes All-in on Cybersecurity Size and Scale With Micro Focus Purchase

By Curtis Franklin, Senior Analyst, Omdia β€” August 31st 2022 at 17:00
OpenText makes a $6 billion bet that bigger is better in security and that cybersecurity platform plays are the future.

☐ β˜† βœ‡ Dark Reading:

(ISC)Β² Opens Global Enrollment for '1 Million Certified in Cybersecurity' Initiative

August 31st 2022 at 16:41
(ISC)Β² pledges to expand and diversify the cybersecurity workforce by providing free "(ISC)Β² Certified in Cybersecurity" education and exams to 1 million people worldwide.
☐ β˜† βœ‡ Dark Reading:

TikTok for Android Bug Allows Single-Click Account Hijack

By Elizabeth Montalbano, Contributor, Dark Reading β€” August 31st 2022 at 16:00
A security vulnerability (CVE-2022-28799) in one of TikTok for Android's deeplinks could affect billions of users, Microsoft warns.

☐ β˜† βœ‡ Dark Reading:

The Inevitability of Cloud Breaches: Tales of Real-World Cloud Attacks

By Ofer Maor, CTO and Co-Founder, Mitiga β€” August 31st 2022 at 14:00
While cloud breaches are going to happen, that doesn't mean we can't do anything about them. By better understanding cloud attacks, organizations can better prepare for them. (First of two parts.)

☐ β˜† βœ‡ Dark Reading:

SecureAuth Announces General Availability of Arculix, Its Next-Gen Passwordless, Continuous-Authentication Platform

August 31st 2022 at 13:29
Next-gen platform delivers adaptive and robust, continuous authentication with identity orchestration and a frictionless user experience.
☐ β˜† βœ‡ Dark Reading:

New ODGen Tool Unearths 180 Zero-Days in Node.js Libraries

By Jai Vijayan, Contributing Writer, Dark Reading β€” August 30th 2022 at 22:21
New graph-based tool offers a better alternative to current approaches for finding vulnerabilities in JavaScript code, they note.

☐ β˜† βœ‡ Dark Reading:

Don't Let 'Perfect' Be the Enemy of a Good AppSec Program

By Tanya Janca, Founder and CEO, We Hack Purple; Director of Developer Relations and Community, Bright Security β€” August 30th 2022 at 20:51
These five suggestions provide a great place to start building a scalable and affordable program for creating secure apps.

☐ β˜† βœ‡ Dark Reading:

Malicious Chrome Extensions Plague 1.4M Users

By Dark Reading Staff, Dark Reading β€” August 30th 2022 at 20:00
Analysts find five cookie-stuffing extensions, including one that's Netflix-themed, that track victim browsing and insert rogue IDs into e-commerce sites to rack up fake affiliate payments.

☐ β˜† βœ‡ Dark Reading:

Chinese Hackers Target Energy Sector in Australia, South China Sea

By Nathan Eddy, Contributing Writer, Dark Reading β€” August 30th 2022 at 17:34
The phishing campaign deploying a ScanBox reconnaissance framework has targeted the Australian government and companies maintaining wind turbines in the South China Sea.

☐ β˜† βœ‡ Dark Reading:

Security Culture: An OT Survival Story

By Edward Liebig, Global Director of Cyber-Ecosystem, Hexagon β€” August 30th 2022 at 17:00
The relationship between information technology and operational technology will need top-down support if a holistic security culture is to truly thrive.

☐ β˜† βœ‡ Dark Reading:

Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware

August 30th 2022 at 15:04
Nearly half of respondents say their company relies on outdated backup and recovery infrastructure β€” in some cases dating back to the 1990s, before today's sophisticated cyberattacks.
☐ β˜† βœ‡ Dark Reading:

Phishing Campaign Targets PyPI Users to Distribute Malicious Code

By Elizabeth Montalbano, Contributor, Dark Reading β€” August 30th 2022 at 14:16
The first-of-its-kind campaign threatens to remove code packages if developers don’t submit their code to a "validation" process.

☐ β˜† βœ‡ Dark Reading:

Building a Strong SOC Starts With People

By Neil Weitzel, SOC Manager, ThreatX β€” August 30th 2022 at 14:00
A people-first approach reduces fatigue and burnout, and it empowers employees to seek out development opportunities, which helps retention.

☐ β˜† βœ‡ Dark Reading:

Google Expands Bug Bounties to Its Open Source Projects

By Robert Lemos, Contributing Writer, Dark Reading β€” August 30th 2022 at 13:33
The search engine giant's Vulnerability Rewards Program now covers any Google open source software projects β€” with a focus on critical software such as Go and Angular.

☐ β˜† βœ‡ Dark Reading:

Cerberus Sentinel Announces Acquisition of CUATROi

August 30th 2022 at 13:17
US cybersecurity services firm expands services in Latin America.
☐ β˜† βœ‡ Dark Reading:

A Peek Into CISA's Post-Quantum Cryptography Roadmap

By Edge Editors, Dark Reading β€” August 30th 2022 at 00:26
To help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.

☐ β˜† βœ‡ Dark Reading:

Receipt for €8M iOS Zero-Day Sale Pops Up on Dark Web

By Dark Reading Staff, Dark Reading β€” August 29th 2022 at 19:00
Documents appear to show that Israeli spyware company Intellexa sold a full suite of services around a zero-day affecting both Android and iOS ecosystems.

☐ β˜† βœ‡ Dark Reading:

3 Ways No-Code Developers Can Shoot Themselves in the Foot

By Michael Bargury, CTO & Co-Founder, Zenity β€” August 29th 2022 at 16:55
Low/no-code tools allow citizen developers to design creative solutions to address immediate problems, but without sufficient training and oversight, the technology can make it easy to make security mistakes.

☐ β˜† βœ‡ Dark Reading:

Cyber-Insurance Firms Limit Payouts, Risk Obsolescence

By Robert Lemos, Contributing Writer, Dark Reading β€” August 29th 2022 at 14:34
Businesses need to re-evaluate their cyber-insurance policies as firms like Lloyd's of London continue to add restrictions, including excluding losses related to state-backed cyberattackers.

☐ β˜† βœ‡ Dark Reading:

NATO Investigates Dark Web Leak of Data Stolen From Missile Vendor

By Elizabeth Montalbano, Contributor, Dark Reading β€” August 29th 2022 at 14:21
Documents allegedly belonging to an EU defense dealer include those relating to weapons used by Ukraine in its fight against Russia.

☐ β˜† βœ‡ Dark Reading:

The 3 Questions CISOs Must Ask to Protect Their Sensitive Data

By Asaf Kochan, Co-Founder and President, Sentra, and Former Commander of Unit 8200 β€” August 29th 2022 at 14:00
CISOs must adopt a new mindset to take on the moving targets in modern cybersecurity.

☐ β˜† βœ‡ Dark Reading:

Cyber Insurers Clamp Down on Clients' Self-Attestation of Security Controls

By Stephen Lawton, Contributing Writer β€” September 21st 2022 at 16:18
After one company suffered a breach that could have been headed off by the MFA it claimed to have, insurers are looking to confirm claimed cybersecurity measures.

☐ β˜† βœ‡ Dark Reading:

LastPass Suffers Data Breach, Source Code Stolen

By Tara Seals, Managing Editor, News, Dark Reading β€” August 26th 2022 at 17:37
Researchers warned that cyberattackers will be probing the code for weaknesses to exploit later.

☐ β˜† βœ‡ Dark Reading:

'Sliver' Emerges as Cobalt Strike Alternative for Malicious C2

By Jai Vijayan, Contributing Writer, Dark Reading β€” August 26th 2022 at 15:45
Microsoft and others say they have observed nation-state actors, ransomware purveyors, and assorted cybercriminals pivoting to an open source attack-emulation tool in recent campaigns.

☐ β˜† βœ‡ Dark Reading:

'No-Party' Data Architectures Promise More Control, Better Security

By Robert Lemos, Contributing Writer, Dark Reading β€” August 26th 2022 at 14:05
Consumers gain control of their data while companies build better relationships with their customers β€” but third-party ad-tech firms will likely continue to stand in the way.

☐ β˜† βœ‡ Dark Reading:

How DevSecOps Empowers Citizen Developers

By Daniel Riedel, Senior Vice President, Strategic Services, Copado β€” August 26th 2022 at 14:00
DevSecOps can help overcome inheritance mentality, especially in low- and no-code environments.

☐ β˜† βœ‡ Dark Reading:

Endpoint Protection / Antivirus Products Tested for Malware Protection

August 26th 2022 at 13:18
Six out of the eight products achieved an "A" rating or higher for blocking malware attacks. Reports are provided to the community for free.
☐ β˜† βœ‡ Dark Reading:

Capital One Joins Open Source Security Foundation

August 26th 2022 at 13:02
OpenSSF welcomes Capital One as a premier member affirming its commitment to strengthening the open source software supply chain.
☐ β˜† βœ‡ Dark Reading:

Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply Chain Attack

By Tara Seals, Managing Editor, News, Dark Reading β€” August 25th 2022 at 18:55
The "0ktapus" cyberattackers set up a well-planned spear-phishing effort that affected at least 130 orgs beyond Twilio and Cloudflare, including Digital Ocean, DoorDash and Mailchimp.

☐ β˜† βœ‡ Dark Reading:

ReasonLabs Launches Free Online Security Tool to Power Secure Web Experience for Millions of Global Users

August 25th 2022 at 16:09
Online Security autonomously blocks malicious URLs, extensions, ad trackers, and pop-ups 24/7, protecting consumers from complex and rapidly evolving cyber threats online.
☐ β˜† βœ‡ Dark Reading:

More Bang for the Buck: Cross-Platform Ransomware Is the Next Problem

By Robert Lemos, Contributing Writer, Dark Reading β€” August 25th 2022 at 15:13
As cryptocurrency valuations make strikes less lucrative, ransomware gangs like the new RedAlert and Monster groups are modifying their tools to attack across platforms.

☐ β˜† βœ‡ Dark Reading:

Wyden Renews Call to Encrypt Twitter DMs, Secure Americans' Data From Unfriendly Foreign Governments

August 25th 2022 at 15:00
Following whistleblower complaint, Oregon senator renews commitment to passing bipartisan legislation to address the national security risks.
☐ β˜† βœ‡ Dark Reading:

Senior-Level Women Leaders in Cybersecurity Form New Nonprofit

By Kelly Jackson Higgins, Editor-in-Chief, Dark Reading β€” August 25th 2022 at 15:00
The Forte Group, which gained momentum as an informal organization during the pandemic, will offer career development and advocacy for women execs in cybersecurity as well as newcomers.

☐ β˜† βœ‡ Dark Reading:

Cyberstarts Closes $60M in Seed Fund III

August 25th 2022 at 14:39
Venture firm hires former Splunk CEO to spearhead new GTM advisory board and help portfolio companies scale up.
☐ β˜† βœ‡ Dark Reading:

The (Nation) State of Cyber: 64% of Businesses Suspect They've Been Targeted or Impacted by Nation-State Attacks

August 25th 2022 at 14:19
According to new Venafi research, two-thirds of organizations have changed cyber strategy in response to war in Ukraine.
☐ β˜† βœ‡ Dark Reading:

What You Need to Know About the Psychology Behind Cyber Resilience

By Bec McKeown, Director of Human Science, Immersive Labs β€” August 25th 2022 at 14:00
Understanding how and why people respond to cyber threats is key to building cyber-workforce resilience.

☐ β˜† βœ‡ Dark Reading:

Penetration Testing Market Worth $2.7B By 2027: MarketsandMarkets(TM) Report

August 25th 2022 at 13:56
Increase driven by increasingly sophisticated cyberattacks as well as increase in mobile-based business-critical applications, according to report.
☐ β˜† βœ‡ Dark Reading:

Optiv's Annual $40K Scholarship for Black, African-American-Identifying STEM Students Now Open for Applicants

August 25th 2022 at 13:03
Optiv's Black Employee Network offers the scholarship, paid out over 4 years, for students seeking a career in the cybersecurity/information security industry.
☐ β˜† βœ‡ Dark Reading:

New Exterro FTK Update Accelerates Mobile Digital Forensics

By Dark Reading Staff, Dark Reading β€” August 25th 2022 at 13:00
The FTK 7.6 portfolio promises better integration with other security and network resources, as well as unified analysis of mobile and computer evidence.

❌