FreshRSS

πŸ”’
☐ β˜† βœ‡ Dark Reading:

Mysterious 'Worok' Group Launches Spy Effort With Obfuscated Code, Private Tools

By Robert Lemos, Contributing Writer, Dark Reading β€” September 6th 2022 at 20:44
The threat actor β€” whose techniques and procedures do not match known groups β€” has created custom attack tools, including a program that hides scripts in .PNG images.

☐ β˜† βœ‡ Dark Reading:

TeslaGun Primed to Blast a New Wave of Backdoor Cyberattacks

By Ericka Chickowski, Contributing Writer, Dark Reading β€” September 6th 2022 at 20:16
What under-the-hood details of newly discovered attack control panel tell us about how the Evil Corp threat group manages its ServHelper backdoor malware campaigns.

☐ β˜† βœ‡ Dark Reading:

As LA Unified Battles Ransomware, CISA Warns About Back-to-School Attacks

By Dark Reading Staff, Dark Reading β€” September 6th 2022 at 19:51
Hours after Los Angeles Unified School District was hit with ransomware attack, CISA issued an alert that threat actors are actively targeting the education sector.

☐ β˜† βœ‡ Dark Reading:

Name That Edge Toon: Mime's the Word

By John Klossner, Cartoonist β€” September 6th 2022 at 19:37
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

☐ β˜† βœ‡ Dark Reading:

Internet Security & Encryption Pioneer Peter Eckersley Passes at 43

By Dark Reading Staff, Dark Reading β€” September 6th 2022 at 17:51
The founder of Let's Encrypt and an EFF technologist, Eckersley devoted his life's work to making the Internet safer and more secure.

☐ β˜† βœ‡ Dark Reading:

Critical QNAP NAS Zero-Day Bug Exploited to Deliver DeadBolt Ransomware

By Dark Reading Staff, Dark Reading β€” September 6th 2022 at 17:51
This is the fourth DeadBolt campaign this year against QNAP customers, but it differs from previous attacks in exploiting an unpatched bug instead of a known vulnerability.

☐ β˜† βœ‡ Dark Reading:

The 3 Fundamentals of Building an Effective IoMT Security Strategy

By Luke Smith, Senior Director of Solution Engineering at Asimily β€” September 6th 2022 at 17:17
The high stakes and unique priorities for Internet of Medical Things devices require specialized cybersecurity strategies.

☐ β˜† βœ‡ Dark Reading:

Cymulate Raises $70M Series D Funding for Continuous Security Posture Testing

September 6th 2022 at 15:12
Investor participation from prior round demonstrates confidence in the company's current and future performance.
☐ β˜† βœ‡ Dark Reading:

Botnets in the Age of Remote Work

By Ivan Shefrin, Executive Director, Comcast Business Managed Security Services β€” September 6th 2022 at 14:00
Here are some strategies for protecting the business against botnets poised to take advantage of remote-work vulnerabilities.

☐ β˜† βœ‡ Dark Reading:

EvilProxy Commodifies Reverse-Proxy Tactic for Phishing, Bypassing 2FA

By Elizabeth Montalbano, Contributor, Dark Reading β€” September 6th 2022 at 13:56
The phishing-as-a-service offering targets accounts from tech giants, and also has connections to PyPI phishing and the Twilio supply chain attack.

☐ β˜† βœ‡ Dark Reading:

Defenders Be Prepared: Cyberattacks Surge Against Linux Amid Cloud Migration

By Jai Vijayan, Contributing Writer, Dark Reading β€” September 6th 2022 at 13:00
Ransomware in particular poses a major threat, but security vendors say there has been an increase in Linux-targeted cryptojacking, malware, and vulnerability exploits as well, and defenders need to be ready.

☐ β˜† βœ‡ Dark Reading:

3 Critical Steps for Reducing Cloud Risk

By Randy Armknecht, Managing Director, Protiviti β€” September 5th 2022 at 14:00
Having a better understanding of how clouds are built, connected, and managed helps organizations mitigate risks and reduce attack surfaces.

☐ β˜† βœ‡ Dark Reading:

Feds, npm Issue Supply Chain Security Guidance to Avert Another SolarWinds

By Dark Reading Staff, Dark Reading β€” September 2nd 2022 at 19:02
The US government and the Open Source Security Foundation have released guidance to shore up software supply chain security, and now it's up to developers to act.

☐ β˜† βœ‡ Dark Reading:

Researchers Spot Snowballing BianLian Ransomware Gang Activity

By Nathan Eddy, Contributing Writer, Dark Reading β€” September 2nd 2022 at 18:56
The operators of the emerging cross-platform ransomware BianLian increased their command and control infrastructure this month, indicating an acceleration in their operational pace.

☐ β˜† βœ‡ Dark Reading:

4 Scenarios for the Digital World of 2040

By Laurent CΓ©lΓ©rier, Executive VP of Technology & Marketing at Orange Cyberdefense β€” September 2nd 2022 at 17:44
Our digital future depends on the choices we make today. We need to invest in cybersecurity technologies and skills so that humanity can control its future.

☐ β˜† βœ‡ Dark Reading:

Raspberry Robin Malware Connected to Russian Evil Corp Gang

By Robert Lemos, Contributing Writer, Dark Reading β€” September 2nd 2022 at 16:52
Infections attributed to the USB-based worm have taken off, and now evidence links the malware to Dridex and the sanctioned Russian cybercriminal group Evil Corp.

☐ β˜† βœ‡ Dark Reading:

AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data

By Tara Seals, Managing Editor, News, Dark Reading β€” September 2nd 2022 at 15:16
Thousands of corporate mobile apps developed by businesses for use by their customers contain hardcoded AWS tokens that can be easily extracted and used to access the full run of corporate data stored in cloud buckets.

☐ β˜† βœ‡ Dark Reading:

The Makings of a Successful Threat-Hunting Program

By Joseph Davidson, Senior Manager, Threat Hunting, Adobe β€” September 2nd 2022 at 14:00
Threat hunters can help build defenses as they work with offensive security teams to identify potential threats and build stronger threat barriers.

☐ β˜† βœ‡ Dark Reading:

Ragnar Locker Brags About TAP Air Portugal Breach

By Dark Reading Staff, Dark Reading β€” September 2nd 2022 at 13:25
TAP assures its customers that it stopped data theft in a recent cyberattack, but the Ragnar Locker ransomware group says it made off with user info.

☐ β˜† βœ‡ Dark Reading:

Ghost Data Increases Enterprise Business Risk

By Edge Editors, Dark Reading β€” September 2nd 2022 at 00:00
IT has to get its hands around cloud data sprawl. Another area of focus should be on ghost data, as it expands the organization's cloud attack surface.

☐ β˜† βœ‡ Dark Reading:

Neopets Hackers Had Network Access for 18 Months

By Dark Reading Staff, Dark Reading β€” September 1st 2022 at 20:36
Neopets has confirmed that its IT systems were compromised from January 2021 through July 2022, exposing 69 million user accounts and source code.

☐ β˜† βœ‡ Dark Reading:

Threat Actor Phishing PyPI Users Identified

By Jai Vijayan, Contributing Writer, Dark Reading β€” September 1st 2022 at 20:35
"JuiceLedger" has escalated a campaign to distribute its information stealer by now going after developers who published code on the widely used Python code repository.

☐ β˜† βœ‡ Dark Reading:

Skyrocketing IoT Bug Disclosures Put Pressure on Security Teams

By Robert Lemos, Contributing Writer, Dark Reading β€” September 1st 2022 at 19:49
The expanding Internet of Things ecosystem is seeing a startling rate of vulnerability disclosures, leaving companies with a greater need for visibility into and patching of IoT devices.

☐ β˜† βœ‡ Dark Reading:

New Guidelines Spell Out How to Test IoT Security Products

By Nathan Eddy, Contributing Writer, Dark Reading β€” September 1st 2022 at 19:49
The proposed AMTSO guidelines offer a roadmap for comprehensive testing of IoT security products.

☐ β˜† βœ‡ Dark Reading:

Code-Injection Bugs Bite Google, Apache Open Source GitHub Projects

By Ericka Chickowski, Contributing Writer, Dark Reading β€” September 1st 2022 at 16:52
The insecurities exist in CI/CD pipelines and can be used by attackers to subvert modern development and roll out malicious code at deployment.

☐ β˜† βœ‡ Dark Reading:

Apple Quietly Releases Another Patch for Zero-Day RCE Bug

By Elizabeth Montalbano, Contributor, Dark Reading β€” September 1st 2022 at 14:45
Apple continues a staged update process to address a WebKit vulnerability that allows attackers to craft malicious Web content to load malware on affected devices.

☐ β˜† βœ‡ Dark Reading:

(ISC)Β² Launches 'Certified in Cybersecurity' Entry-Level Certification to Address Global Workforce Gap

September 1st 2022 at 14:18
After a rigorous pilot program, the association's newest certification is officially operational. More than 1,500 pilot participants who passed the exam are on the path to full certification.
☐ β˜† βœ‡ Dark Reading:

Real-World Cloud Attacks: The True Tasks of Cloud Ransomware Mitigation

By Ofer Maor, CTO and Co-Founder, Mitiga β€” September 1st 2022 at 14:00
Cloud breaches are inevitable β€” and so is cloud ransomware. (Second of two parts.)

☐ β˜† βœ‡ Dark Reading:

Closing the Security Gap Opened by the Rise of No-Code Tools

By Kolawole Samuel Adebayo, Contributing Writer β€” August 31st 2022 at 23:20
No-code startups such as Mine PrivacyOps say they offer best of both worlds β€” quick development and compliance with privacy laws.

☐ β˜† βœ‡ Dark Reading:

Google Fixes 24 Vulnerabilities With New Chrome Update

By Jai Vijayan, Contributing Writer, Dark Reading β€” August 31st 2022 at 20:10
But one issue that lets websites overwrite content on a user's system clipboard appears unfixed in the new Version 105 of Chrome.

☐ β˜† βœ‡ Dark Reading:

Crypto-Crooks Spread Trojanized Google Translate App in Watering-Hole Attack

By Tara Seals, Managing Editor, News, Dark Reading β€” August 31st 2022 at 20:09
The ongoing campaign is spreading worldwide, using the lure of a fully functional Google Translate application for desktops that has helped the threat stay undetected for months.

☐ β˜† βœ‡ Dark Reading:

James Webb Telescope Images Loaded With Malware Are Evading EDR

By Dark Reading Staff, Dark Reading β€” August 31st 2022 at 18:00
New Golang cyberattacks use deep space images and a new obfuscator to target systems β€” undetected.

☐ β˜† βœ‡ Dark Reading:

The Pros and Cons of Managed Firewalls

August 31st 2022 at 18:00
Managed firewalls are increasingly popular. This post examines the strengths and weaknesses of managed firewalls to help your team decide on the right approach.
☐ β˜† βœ‡ Dark Reading:

OpenText Goes All-in on Cybersecurity Size and Scale With Micro Focus Purchase

By Curtis Franklin, Senior Analyst, Omdia β€” August 31st 2022 at 17:00
OpenText makes a $6 billion bet that bigger is better in security and that cybersecurity platform plays are the future.

☐ β˜† βœ‡ Dark Reading:

(ISC)Β² Opens Global Enrollment for '1 Million Certified in Cybersecurity' Initiative

August 31st 2022 at 16:41
(ISC)Β² pledges to expand and diversify the cybersecurity workforce by providing free "(ISC)Β² Certified in Cybersecurity" education and exams to 1 million people worldwide.
☐ β˜† βœ‡ Dark Reading:

TikTok for Android Bug Allows Single-Click Account Hijack

By Elizabeth Montalbano, Contributor, Dark Reading β€” August 31st 2022 at 16:00
A security vulnerability (CVE-2022-28799) in one of TikTok for Android's deeplinks could affect billions of users, Microsoft warns.

☐ β˜† βœ‡ Dark Reading:

The Inevitability of Cloud Breaches: Tales of Real-World Cloud Attacks

By Ofer Maor, CTO and Co-Founder, Mitiga β€” August 31st 2022 at 14:00
While cloud breaches are going to happen, that doesn't mean we can't do anything about them. By better understanding cloud attacks, organizations can better prepare for them. (First of two parts.)

☐ β˜† βœ‡ Dark Reading:

SecureAuth Announces General Availability of Arculix, Its Next-Gen Passwordless, Continuous-Authentication Platform

August 31st 2022 at 13:29
Next-gen platform delivers adaptive and robust, continuous authentication with identity orchestration and a frictionless user experience.
☐ β˜† βœ‡ Dark Reading:

New ODGen Tool Unearths 180 Zero-Days in Node.js Libraries

By Jai Vijayan, Contributing Writer, Dark Reading β€” August 30th 2022 at 22:21
New graph-based tool offers a better alternative to current approaches for finding vulnerabilities in JavaScript code, they note.

☐ β˜† βœ‡ Dark Reading:

Don't Let 'Perfect' Be the Enemy of a Good AppSec Program

By Tanya Janca, Founder and CEO, We Hack Purple; Director of Developer Relations and Community, Bright Security β€” August 30th 2022 at 20:51
These five suggestions provide a great place to start building a scalable and affordable program for creating secure apps.

☐ β˜† βœ‡ Dark Reading:

Malicious Chrome Extensions Plague 1.4M Users

By Dark Reading Staff, Dark Reading β€” August 30th 2022 at 20:00
Analysts find five cookie-stuffing extensions, including one that's Netflix-themed, that track victim browsing and insert rogue IDs into e-commerce sites to rack up fake affiliate payments.

☐ β˜† βœ‡ Dark Reading:

Chinese Hackers Target Energy Sector in Australia, South China Sea

By Nathan Eddy, Contributing Writer, Dark Reading β€” August 30th 2022 at 17:34
The phishing campaign deploying a ScanBox reconnaissance framework has targeted the Australian government and companies maintaining wind turbines in the South China Sea.

☐ β˜† βœ‡ Dark Reading:

Security Culture: An OT Survival Story

By Edward Liebig, Global Director of Cyber-Ecosystem, Hexagon β€” August 30th 2022 at 17:00
The relationship between information technology and operational technology will need top-down support if a holistic security culture is to truly thrive.

☐ β˜† βœ‡ Dark Reading:

Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware

August 30th 2022 at 15:04
Nearly half of respondents say their company relies on outdated backup and recovery infrastructure β€” in some cases dating back to the 1990s, before today's sophisticated cyberattacks.
☐ β˜† βœ‡ Dark Reading:

Phishing Campaign Targets PyPI Users to Distribute Malicious Code

By Elizabeth Montalbano, Contributor, Dark Reading β€” August 30th 2022 at 14:16
The first-of-its-kind campaign threatens to remove code packages if developers don’t submit their code to a "validation" process.

☐ β˜† βœ‡ Dark Reading:

Building a Strong SOC Starts With People

By Neil Weitzel, SOC Manager, ThreatX β€” August 30th 2022 at 14:00
A people-first approach reduces fatigue and burnout, and it empowers employees to seek out development opportunities, which helps retention.

☐ β˜† βœ‡ Dark Reading:

Google Expands Bug Bounties to Its Open Source Projects

By Robert Lemos, Contributing Writer, Dark Reading β€” August 30th 2022 at 13:33
The search engine giant's Vulnerability Rewards Program now covers any Google open source software projects β€” with a focus on critical software such as Go and Angular.

☐ β˜† βœ‡ Dark Reading:

Cerberus Sentinel Announces Acquisition of CUATROi

August 30th 2022 at 13:17
US cybersecurity services firm expands services in Latin America.
☐ β˜† βœ‡ Dark Reading:

A Peek Into CISA's Post-Quantum Cryptography Roadmap

By Edge Editors, Dark Reading β€” August 30th 2022 at 00:26
To help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.

☐ β˜† βœ‡ Dark Reading:

Receipt for €8M iOS Zero-Day Sale Pops Up on Dark Web

By Dark Reading Staff, Dark Reading β€” August 29th 2022 at 19:00
Documents appear to show that Israeli spyware company Intellexa sold a full suite of services around a zero-day affecting both Android and iOS ecosystems.

☐ β˜† βœ‡ Dark Reading:

3 Ways No-Code Developers Can Shoot Themselves in the Foot

By Michael Bargury, CTO & Co-Founder, Zenity β€” August 29th 2022 at 16:55
Low/no-code tools allow citizen developers to design creative solutions to address immediate problems, but without sufficient training and oversight, the technology can make it easy to make security mistakes.

☐ β˜† βœ‡ Dark Reading:

Cyber-Insurance Firms Limit Payouts, Risk Obsolescence

By Robert Lemos, Contributing Writer, Dark Reading β€” August 29th 2022 at 14:34
Businesses need to re-evaluate their cyber-insurance policies as firms like Lloyd's of London continue to add restrictions, including excluding losses related to state-backed cyberattackers.

☐ β˜† βœ‡ Dark Reading:

NATO Investigates Dark Web Leak of Data Stolen From Missile Vendor

By Elizabeth Montalbano, Contributor, Dark Reading β€” August 29th 2022 at 14:21
Documents allegedly belonging to an EU defense dealer include those relating to weapons used by Ukraine in its fight against Russia.

☐ β˜† βœ‡ Dark Reading:

The 3 Questions CISOs Must Ask to Protect Their Sensitive Data

By Asaf Kochan, Co-Founder and President, Sentra, and Former Commander of Unit 8200 β€” August 29th 2022 at 14:00
CISOs must adopt a new mindset to take on the moving targets in modern cybersecurity.

☐ β˜† βœ‡ Dark Reading:

Cyber Insurers Clamp Down on Clients' Self-Attestation of Security Controls

By Stephen Lawton, Contributing Writer β€” September 21st 2022 at 16:18
After one company suffered a breach that could have been headed off by the MFA it claimed to have, insurers are looking to confirm claimed cybersecurity measures.

☐ β˜† βœ‡ Dark Reading:

LastPass Suffers Data Breach, Source Code Stolen

By Tara Seals, Managing Editor, News, Dark Reading β€” August 26th 2022 at 17:37
Researchers warned that cyberattackers will be probing the code for weaknesses to exploit later.

☐ β˜† βœ‡ Dark Reading:

'Sliver' Emerges as Cobalt Strike Alternative for Malicious C2

By Jai Vijayan, Contributing Writer, Dark Reading β€” August 26th 2022 at 15:45
Microsoft and others say they have observed nation-state actors, ransomware purveyors, and assorted cybercriminals pivoting to an open source attack-emulation tool in recent campaigns.

☐ β˜† βœ‡ Dark Reading:

'No-Party' Data Architectures Promise More Control, Better Security

By Robert Lemos, Contributing Writer, Dark Reading β€” August 26th 2022 at 14:05
Consumers gain control of their data while companies build better relationships with their customers β€” but third-party ad-tech firms will likely continue to stand in the way.

☐ β˜† βœ‡ Dark Reading:

How DevSecOps Empowers Citizen Developers

By Daniel Riedel, Senior Vice President, Strategic Services, Copado β€” August 26th 2022 at 14:00
DevSecOps can help overcome inheritance mentality, especially in low- and no-code environments.

☐ β˜† βœ‡ Dark Reading:

Endpoint Protection / Antivirus Products Tested for Malware Protection

August 26th 2022 at 13:18
Six out of the eight products achieved an "A" rating or higher for blocking malware attacks. Reports are provided to the community for free.
❌