Category: Dark Reading

Deepfake Quantum AI Investment Scam Pops Up on Facebook

A consumer finance journalist and television personality took to Twitter to warn his followers about advertisements using his name and face to scam victims. This article has been indexed from Dark Reading Read the original article: Deepfake Quantum AI Investment…

Banking Firms Under Attack by Sophisticated ‘Toitoin’ Campaign

An attack involves a multi-stage infection chain with custom malware hosted on Amazon EC2 that ultimately steals critical system and browser data; so far, targets have been located in Latin America. This article has been indexed from Dark Reading Read…

Zero Trust Keeps Digital Attacks From Entering the Real World

Amid IT/OT convergence, organizations must adopt an “assume breach” mindset to stop bad actors and limit their impact. This article has been indexed from Dark Reading Read the original article: Zero Trust Keeps Digital Attacks From Entering the Real World

How to Use Log Management to Retrace Your Digital Footsteps

Log management tools help IT and security teams monitor and improve a system’s performance by identifying bugs, cybersecurity breaches, and other issues that can create outages or compliance problems. This article has been indexed from Dark Reading Read the original…

Exposure Management Looks to Attack Paths, Identity to Better Measure Risk

Security firms analyze attack paths and seek out weak identities to find compromise vectors and critical assets that need better controls. This article has been indexed from Dark Reading Read the original article: Exposure Management Looks to Attack Paths, Identity…

Global Hacking Competition Addresses Critical Increase in Cybersecurity Threats for Businesses

Hack The Box launches Capture The Flag competition, including offensive and defensive challenges, to unite teams as cyberattacks increase in 2023 to unprecedented levels. This article has been indexed from Dark Reading Read the original article: Global Hacking Competition Addresses…

How to Safely Architect AI in Your Cybersecurity Programs

Guardrails need to be set in place to ensure confidentiality of sensitive information, while still leveraging AI as a force multiplier for productivity. This article has been indexed from Dark Reading Read the original article: How to Safely Architect AI…

Spyware Gamed 1.5M Users of Google Play Store

Malware spoofed file management applications thanks to elevated permissions, enabling exfiltration of sensitive data with no user interaction, researchers find. This article has been indexed from Dark Reading Read the original article: Spyware Gamed 1.5M Users of Google Play Store

MOVEit Transfer Faces Another Critical Data-Theft Bug

Users need to patch the latest SQL injection vulnerability as soon as possible. Meanwhile, Cl0p’s data extortion rampage gallops on. This article has been indexed from Dark Reading Read the original article: MOVEit Transfer Faces Another Critical Data-Theft Bug

Startup Spotlight: Endor Labs Focuses on Reachability

The company, one of four finalists in Black Hat USA’s 2023 startup competition, looks to find the vulnerabilities an attacker could actually access. This article has been indexed from Dark Reading Read the original article: Startup Spotlight: Endor Labs Focuses…

Black Hat Announces Maria Markstedter, Jen Easterly, Viktor Zhora, and Kemba Walden As Keynote Speakers for Black Hat USA 2023

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Black Hat Announces Maria Markstedter, Jen Easterly, Viktor Zhora, and Kemba…

Cybersecurity’s Future Hinges on Stronger Public-Private Partnerships

Public and private sector organizations must collaborate on a shared cybersecurity agenda to protect and benefit society at large. This article has been indexed from Dark Reading Read the original article: Cybersecurity’s Future Hinges on Stronger Public-Private Partnerships

Google Searches for ‘USPS Package Tracking’ Leads to Banking Theft

Attackers are leveraging well-executed brand impersonation in a Google ads malvertising effort that collects both credit card and bank details from victims. This article has been indexed from Dark Reading Read the original article: Google Searches for ‘USPS Package Tracking’…

CISOs Find ‘Business as Usual’ Shows the Harsh Realities of Cyber-Risk

C-suite security leaders are feeling less prepared to cope with cyberattacks and more at risk than last year. This article has been indexed from Dark Reading Read the original article: CISOs Find ‘Business as Usual’ Shows the Harsh Realities of…

Startup Spotlight: Gomboc.ai Balances Cloud Infrastructure Security

The startup, one of four finalists in Black Hat USA’s 2023 startup competition, uses deterministic AI to optimize cloud security. This article has been indexed from Dark Reading Read the original article: Startup Spotlight: Gomboc.ai Balances Cloud Infrastructure Security

Microsoft Teams Exploit Tool Auto-Delivers Malware

The “TeamsPhisher” cyberattack tool gives pentesters — and adversaries — a way to deliver malicious files directly to a Teams user from an external account, or tenant. This article has been indexed from Dark Reading Read the original article: Microsoft…

83% of Brits Demand Messaging Apps Remain Private, Ahead of Threat From Online Safety Bill

70% think criminals will move from WhatsApp etc to non-regulated apps, post OSB. This article has been indexed from Dark Reading Read the original article: 83% of Brits Demand Messaging Apps Remain Private, Ahead of Threat From Online Safety Bill

3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering Grid Systems

Exposed and unpatched solar power monitoring systems have been exploited by both amateurs and professionals, including Mirai botnet hackers. This article has been indexed from Dark Reading Read the original article: 3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering…

OPERA1ER Cybercrime Group’s Leader Arrested by Interpol

The group’s mastermind was nabbed in Côte d’Ivoire for stealing up to $30 million using malware, phishing campaigns, and BEC scams, as part of international law enforcement’s Operation Nervone. This article has been indexed from Dark Reading Read the original…

OPERA1ER Cybercrime Group’s Leader Arrested by INTERPOL

The group’s mastermind was nabbed in Côte d’Ivoire for stealing up to $30 million using malware, phishing campaigns, and BEC scams, as part of international law enforcement’s Operation Nervone. This article has been indexed from Dark Reading Read the original…

China’s Mustang Panda Linked to SmugX Attacks on European Governments

Attackers use HTML smuggling to spread the PlugX RAT in the campaign, which has been ongoing since at least December. This article has been indexed from Dark Reading Read the original article: China’s Mustang Panda Linked to SmugX Attacks on…

Fortanix Builds Hardware Security Wall Around Plaintext Search

The company’s Confidential Data Search technique relies on confidential computing to keep data secure even while it is in use. This article has been indexed from Dark Reading Read the original article: Fortanix Builds Hardware Security Wall Around Plaintext Search

Researchers Develop Exploit Code for Critical Fortinet VPN Bug

Some 340,000 FortiGate SSL VPN appliances remain exposed to the threat more than three weeks after Fortinet released firmware updates to address the issue. This article has been indexed from Dark Reading Read the original article: Researchers Develop Exploit Code…

Russian Satellite Internet Downed via Attackers Claiming Ties to Wagner Group

Attribution for the cyberattack on Dozor-Teleport remains murky, but the effects are real — downed communications and compromised data. This article has been indexed from Dark Reading Read the original article: Russian Satellite Internet Downed via Attackers Claiming Ties to…

Mobile Cyberattacks Soar, Especially Against Android Users

The number of malware samples is up as attackers aim to compromise users where they work and play: Their smartphones. This article has been indexed from Dark Reading Read the original article: Mobile Cyberattacks Soar, Especially Against Android Users

Nokod Raises $8M Seed Round From Seasoned Cybersecurity Investors to Enhance Low-Code/No-Code App Security

Nokod Security is building a platform that enables organizations to secure in-house low-code/no-code custom applications by scanning for security and compliance issues and applying remediation policies This article has been indexed from Dark Reading Read the original article: Nokod Raises…

Making Diversity the ‘How’ and Not the ‘What’ of Cybersecurity Success

Cybersecurity leaders should strive to reward high-performing teams that are powered by high levels of inclusion. This article has been indexed from Dark Reading Read the original article: Making Diversity the ‘How’ and Not the ‘What’ of Cybersecurity Success

Russian Hacktivist Platform ‘DDoSia’ Grows Exponentially

As cybercrime amidst the Russia-Ukraine war continues to escalate, the DDoSia project, launched by a known hacktivist group, has exploded in its number of members and quality of tools used for attacks. This article has been indexed from Dark Reading…

African Nations Face Escalating Phishing & Compromised Password Cyberattacks

Cyberattacks against organizations in some African nations increased significantly in 2022, despite a major expansion in cybersecurity hiring to support cloud and digital migration. This article has been indexed from Dark Reading Read the original article: African Nations Face Escalating…

Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools

The APT35 group (aka Charming Kitten), have added backdoor capabilities to their spear-phishing payloads — and targeted an Israeli reporter with it. This article has been indexed from Dark Reading Read the original article: Iran-Linked APT35 Targets Israeli Media With…

Perception Point Unveils AI Model to Thwart Generative AI-Based BEC Attacks

The detection model identifies LLM patterns to counter the rising abuse of generative AI in social engineering attacks. This article has been indexed from Dark Reading Read the original article: Perception Point Unveils AI Model to Thwart Generative AI-Based BEC…

IP Fabric Announces $25M Series B Funding to Accelerate Adoption of Network Assurance

One Peak investment will advance the ubiquity of network assurance, helping organizations to reduce network complexity, assure network automation, and improve network security. This article has been indexed from Dark Reading Read the original article: IP Fabric Announces $25M Series…

CISA Wants Exposed Government Devices Remediated in 14 Days

Though government agencies have hundreds of devices exposed to the open Internet, experts wonder if CISA is moving at the right pace. This article has been indexed from Dark Reading Read the original article: CISA Wants Exposed Government Devices Remediated…

Researchers Detail 4 SAP Bugs, Including Flaw in ABAP Kernel

Patches are available for three bugs, but with technical details and PoCs now available, threat actors can craft targeted attacks. This article has been indexed from Dark Reading Read the original article: Researchers Detail 4 SAP Bugs, Including Flaw in…

Apple Objects to UK Bill That Would Break Encrypted Messaging

New online safety bill could force encrypted messaging apps like iMessage and WhatsApp to scan for child abuse material, but platforms warn about privacy implications. This article has been indexed from Dark Reading Read the original article: Apple Objects to…

IEC Standardization Leaders Convene in Amsterdam to Review Utility Interworking of Key Standards

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: IEC Standardization Leaders Convene in Amsterdam to Review Utility Interworking of…

CISA Wants Exposed Government Devices Remediated In 14 Days

Though government agencies have hundreds of devices exposed to the open Internet, experts wonder if CISA’s moving at the right pace. This article has been indexed from Dark Reading Read the original article: CISA Wants Exposed Government Devices Remediated In…

TXOne Networks’ Stellar Solution Safeguards Operational Stability for Organizations in Various Industries

Stellar leverages cyber physical system detection and response (CPSDR) to prevent unexpected system changes from impacting operational reliability and availability. This article has been indexed from Dark Reading Read the original article: TXOne Networks’ Stellar Solution Safeguards Operational Stability for…

Center for Internet Security, CREST Join Forces to Secure Organizations Globally

New program provides organizations a way to show customers and partners their cybersecurity posture meets rigorous standards of CREST accreditation. This article has been indexed from Dark Reading Read the original article: Center for Internet Security, CREST Join Forces to…

Cybellum Unveils New Brand, Amplifying Commitment to Team-Centric Product Security

The new brand is launched alongside new product security platform capabilities such as a vulnerability management (VM) co-pilot and incident response investigation management, providing automation and workflows for the many teams involved in product security. This article has been indexed…

WatchGuard Threat Lab Report Reveals New Browser-Based Social Engineering Trends

Key findings from the research also show three of the four new malware threats on this quarter’s top-ten list originated in China and Russia, living-off-the-land attacks on the rise, and more. This article has been indexed from Dark Reading Read…

Mend.io Launches Inaugural Open Source Reliability Leaderboard

New report offers valuable resource to help organizations evaluate the safety and reliability of open-source packages. This article has been indexed from Dark Reading Read the original article: Mend.io Launches Inaugural Open Source Reliability Leaderboard

Invary Raises $1.85M in Pre-Seed Funding to Close Critical Gap in Zero Trust Security

The company introduces a solution to restore trust in customers’ existing cyber defense techstack. This article has been indexed from Dark Reading Read the original article: Invary Raises $1.85M in Pre-Seed Funding to Close Critical Gap in Zero Trust Security

Cybersecurity Is the Healthcare Your Organization Needs

Organizations should consider their security practices the same way people think about their well-being. Focus on staying healthy instead of finding a new pill for every security symptom you see. This article has been indexed from Dark Reading Read the…

UAE, Israel Ink Pivotal Joint Cyber-Threat Intelligence Agreement

Two Mideast nations that were at odds until recently have announced the “Crystal Ball” project, aimed at better protecting against cyberattacks via collaboration and knowledge sharing. This article has been indexed from Dark Reading Read the original article: UAE, Israel…

Newbie Akira Ransomware Builds Momentum With Linux Shift

A new version of the double-extortion group’s malware reflects a growing trend among ransomware actors to expand cybercrime opportunities beyond Windows. This article has been indexed from Dark Reading Read the original article: Newbie Akira Ransomware Builds Momentum With Linux…

When It Comes to Secure Coding, ChatGPT Is Quintessentially Human

We’re still unprepared to fight the security bugs we already encounter, let alone new AI-borne issues. This article has been indexed from Dark Reading Read the original article: When It Comes to Secure Coding, ChatGPT Is Quintessentially Human

NPM Plagued With ‘Manifest Confusion’ Malware-Hiding Weakness

The popular package manager for software developers has been vulnerable to this attack vector for a while, and negligent in fixing the problem, according to a former employee. This article has been indexed from Dark Reading Read the original article:…

Russian Spies, War Ministers Reliant on Cybercrime in Pariah State

Swiss intelligence warns that Russia ramping up cyberattacks on infrastructure and cyber espionage as on-the-ground options evaporate. This article has been indexed from Dark Reading Read the original article: Russian Spies, War Ministers Reliant on Cybercrime in Pariah State

Social Engineering Adds Depth to Red Team Exercises

Because social engineering usually succeeds, companies need to test whether their defenses can block adversaries that gain employees’ trust. This article has been indexed from Dark Reading Read the original article: Social Engineering Adds Depth to Red Team Exercises

Cato Networks Revolutionizes Network Security With Real-Time, Machine Learning-Powered Protection

The combination of data science expertise, cloud resources, and Cato’s vast data lake enables real-time, ML-powered protection against evasive cyberattacks, reducing risk and improving security. This article has been indexed from Dark Reading Read the original article: Cato Networks Revolutionizes…

Astrix Security Raises $25M in Series A Funding

The investment will allow enterprises to further secure non-human identities and safely leverage the soaring adoption of third-party apps and Generative AI services. This article has been indexed from Dark Reading Read the original article: Astrix Security Raises $25M in…

FIDO Alliance Publishes Guidance for Deploying Passkeys in the Enterprise

Half-day virtual Authenticate Summit to educate on how passkeys can fit into a variety of enterprise environments. This article has been indexed from Dark Reading Read the original article: FIDO Alliance Publishes Guidance for Deploying Passkeys in the Enterprise

Malwarebytes ChatGPT Survey Reveals 81% are Concerned by Generative AI Security Risks

Survey also uncovers 63% of respondents distrust ChatGPT while 51% question AI’s ability to improve Internet safety. This article has been indexed from Dark Reading Read the original article: Malwarebytes ChatGPT Survey Reveals 81% are Concerned by Generative AI Security…

Generative AI Projects Pose Major Cybersecurity Risk to Enterprises

Developers’ enthusiasm for ChatGPT and other LLM tools leaves most organizations largely unprepared to defend against the vulnerabilities that the nascent technology creates. This article has been indexed from Dark Reading Read the original article: Generative AI Projects Pose Major…

Saudi Arabia’s Cyber Capabilities Ranked Second Globally

Saudi Arabia is one of the world’s leaders in cybersecurity development and preparedness, according to the latest rankings. This article has been indexed from Dark Reading Read the original article: Saudi Arabia’s Cyber Capabilities Ranked Second Globally

3 Strategies for Bringing Rigor to Software Security

With the National Cybersecurity Strategy planning to add real teeth into enforcement actions, software vendors have extra incentive to reduce applications’ security debt. This article has been indexed from Dark Reading Read the original article: 3 Strategies for Bringing Rigor…

Trans-Rights Hacktivists Steal City of Ft. Worth’s Data

In a move to embarrass the city, hacking group known as SiegedSec accessed thousands of files with administrator logins, but it’s making no ransom demands. This article has been indexed from Dark Reading Read the original article: Trans-Rights Hacktivists Steal…

Mockingjay Slips By EDR Tools With Process Injection Technique

By leveraging misconfigured DLLs instead of EDR-monitored APIs, this new technique injects malicious code into running processes, completely evading endpoint security. This article has been indexed from Dark Reading Read the original article: Mockingjay Slips By EDR Tools With Process…

Most Enterprise SIEMs Blind to MITRE ATT&CK Tactics

Organizations are largely deluded about their own security postures, according to an analysis, with the average SIEM failing to detect a whopping 76% of attacker TTPs. This article has been indexed from Dark Reading Read the original article: Most Enterprise…

Pilot Applicant Information for American, Southwest Hacked

The attack exposed personal information from pilot applicants, prompting both airlines to ditch their third-party provider and move services internally. This article has been indexed from Dark Reading Read the original article: Pilot Applicant Information for American, Southwest Hacked

Why the FDA’s SBOM Mandate Changes the Game for OSS Security

The new FDA software bill of materials (SBOM) guidelines for medical devices could have broad impact on the healthcare industry and the broader open source ecosystem. This article has been indexed from Dark Reading Read the original article: Why the…

Preventing Cyberattacks on Schools Starts With K–12 Cybersecurity Education

By investing in a strong future cybersecurity workforce, we can prevent future attacks on US critical infrastructure before they occur. This article has been indexed from Dark Reading Read the original article: Preventing Cyberattacks on Schools Starts With K–12 Cybersecurity…

Genworth Financial Reports Data Breach Leaking SSNs Belonging to 2.7M Policyholders and Customers

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Genworth Financial Reports Data Breach Leaking SSNs Belonging to 2.7M Policyholders…