Category: Dark Reading

China’s ‘Volt Typhoon’ APT Turns to Zoho ManageEngine for Fresh Cyberattacks

A recent campaign shows that the politically motivated threat actor has more tricks up its sleeve than previously known, targeting a critical exploit and wiping logs to cover their tracks. This article has been indexed from Dark Reading Read the…

It’s Open Season on Law Firms for Ransomware & Cyberattacks

Law firms have an ethical responsibility to protect their clients’ sensitive information, but a recent swell of cyberattacks does not seem to be enough to convince law firms to shore up cybersecurity. This article has been indexed from Dark Reading…

Remediation Ballet Is a Pas de Deux of Patch and Performance

AI-generated code promises quicker fixes for vulnerabilities, but ultimately developers and security teams must balance competing interests. This article has been indexed from Dark Reading Read the original article: Remediation Ballet Is a Pas de Deux of Patch and Performance

How Infrastructure as Code Can Help Minimize Human Error

Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code. This article has been indexed from Dark Reading Read the original article: How Infrastructure as Code Can Help Minimize…

Trojanized Super Mario Installer Goes After Gamer Data

A legitimate installer for the popular Nintendo game infects Windows machines with various malware, including a cryptominer and an infostealer, again showcasing the importance of remote worker security hygiene. This article has been indexed from Dark Reading Read the original…

How Active Directory Bridging Extends Security Automation to Hybrid IT Environments

AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance. This article has been indexed from Dark Reading Read the original article: How Active Directory Bridging Extends Security Automation to Hybrid…

Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023

Integration provides threat intel teams with an early warning system for geopolitical events that could trigger cyberattacks. This article has been indexed from Dark Reading Read the original article: Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe…

ITDR Combines and Refines Familiar Cybersecurity Approaches

Identity threat detection and response adds user entity behavioral analytics to fraud detection, creating a powerful tool for real-time protection. This article has been indexed from Dark Reading Read the original article: ITDR Combines and Refines Familiar Cybersecurity Approaches

NSA: BlackLotus BootKit Patching Won’t Prevent Compromise

It’s unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments. This article has been indexed from Dark Reading Read the original article: NSA: BlackLotus BootKit Patching…

Suspicious Smartwatches Mailed to US Army Personnel

Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise. This article has been indexed from Dark Reading Read the original article: Suspicious Smartwatches Mailed to…

Why Legacy System Users Prioritize Uptime Over Security

For line-of-business execs, the fear of grinding mission-critical systems to a halt overrides the fear of ransomware. How can CISOs overcome this? This article has been indexed from Dark Reading Read the original article: Why Legacy System Users Prioritize Uptime…

Microsoft Teams Attack Skips the Phish to Deliver Malware Directly

Exploiting a flaw in how the app handles communication with external tenants gives threat actors an easy way to send malicious files from a trusted source to an organization’s employees, but no patch is imminent. This article has been indexed…

Black Hat Asia 2023: Cybersecurity Maturity and Concern in Asia

Black Hat Asia 2023 showed that cybersecurity is nascent among organizations in Asia with opportunities for improvement. This article has been indexed from Dark Reading Read the original article: Black Hat Asia 2023: Cybersecurity Maturity and Concern in Asia

How Government Contractors & Agencies Should Navigate New Cyber Rules

The impending regulations highlight the increasing importance of enhanced network security and regulatory compliance across the government sector. This article has been indexed from Dark Reading Read the original article: How Government Contractors & Agencies Should Navigate New Cyber Rules

Millions of Repos on GitHub Are Potentially Vulnerable to Hijacking

Many organizations are unwittingly exposing users of their code repositories to repojacking when renaming projects, a new study shows. This article has been indexed from Dark Reading Read the original article: Millions of Repos on GitHub Are Potentially Vulnerable to…

Deception Technologies Have a Maturity Problem

While there’s plenty of upside to rolling out deception technologies, it’s not clear if cybersecurity leaders — or their organizations — are ready for them. This article has been indexed from Dark Reading Read the original article: Deception Technologies Have…

LockBit Developing Ransomware for Apple M1 Chips, Embedded Systems

Under construction: The world’s leading ransomware gang is workshopping ransomware for less obvious systems beyond Windows environments. Experts weigh in on how worried we should be. This article has been indexed from Dark Reading Read the original article: LockBit Developing…

Former Duo Security Co-Founder Jon Oberheide Joins DNSFilter Board of Directors

Cybersecurity expert and proven entrepreneur to help protective DNS leader drive vision and scale through hypergrowth. This article has been indexed from Dark Reading Read the original article: Former Duo Security Co-Founder Jon Oberheide Joins DNSFilter Board of Directors

Airgap Networks Acquires NetSpyGlass

Acquisition of NetSpyGlass extends Airgap Zero Trust Firewall™ innovation leadership with advanced network and asset intelligence for business-critical networks. This article has been indexed from Dark Reading Read the original article: Airgap Networks Acquires NetSpyGlass

Tanium Platform Advances Threat Identification Capabilities and Enhances Endpoint Reach

Award-winning XEM platform introduces advanced SBOM capabilities, expanded ARM support, and additional Risk & Compliance improvements. This article has been indexed from Dark Reading Read the original article: Tanium Platform Advances Threat Identification Capabilities and Enhances Endpoint Reach

Sumsub Launches Advanced Deepfakes Detector

Full-cycle verification platform enhances its facial biometrics verification with innovative deepfake detection technology; shares new 2023 identity fraud trends. This article has been indexed from Dark Reading Read the original article: Sumsub Launches Advanced Deepfakes Detector

Even With No Recession, Smaller Firms Aim to Consolidate Security Tools

Small and midsized companies work to jettison some security tools to simplify operations and reduce cost, even as any economic downturn continues to remain at bay. This article has been indexed from Dark Reading Read the original article: Even With…

Azure AD ‘Log in With Microsoft’ Authentication Bypass Affects Thousands

The “nOAuth” attack allows cross-platform spoofing and full account takeovers, and enterprises need to remediate the issue immediately, researchers warn. This article has been indexed from Dark Reading Read the original article: Azure AD ‘Log in With Microsoft’ Authentication Bypass…

Patch Now: Cisco AnyConnect Bug Exploit Released in the Wild

A ready-made, low-complexity path to pwning the popular enterprise VPN clients for remote workers is now circulating in the wild. This article has been indexed from Dark Reading Read the original article: Patch Now: Cisco AnyConnect Bug Exploit Released in…

IT Staff Increasingly Saddled With Data Protection Compliance

Compliance, seen as a burden for businesses, is being passed to overloaded IT departments — leaving organizations unsure if they’re compliant at all. This article has been indexed from Dark Reading Read the original article: IT Staff Increasingly Saddled With…

USB Drives Spread Spyware as China’s Mustang Panda APT Goes Global

Camaro Dragon (Mustang Panda) is spreading a malware variant of WispRider quickly across the globe even through air gaps, often unbeknown to users. This article has been indexed from Dark Reading Read the original article: USB Drives Spread Spyware as…

Lessons From a Pen Tester: 3 Steps to Stay Safer

From hardening Windows systems to adding access control and segmenting the network, there are steps organizations can take to better secure corporate data. This article has been indexed from Dark Reading Read the original article: Lessons From a Pen Tester:…

2 More Apple Zero-Days Exploited in Ongoing iOS Spy Campaign

The zero-day security bugs are being used to deploy the sophisticated but “odd” TriangleDB spying implant on targeted iOS devices. This article has been indexed from Dark Reading Read the original article: 2 More Apple Zero-Days Exploited in Ongoing iOS…

Ironscales Adds AI Assistant to Suss Out Phishing Attempts

The company says its Themis Co-pilot for Outlook helps recipients discern business email compromise attacks, reducing false positives for security staff. This article has been indexed from Dark Reading Read the original article: Ironscales Adds AI Assistant to Suss Out…

20-Year-Old Chinese APT15 Finds New Life in Foreign Ministry Attacks

The notorious APT15 used common malware tools and a third-generation custom “Graphican” backdoor to continue its information gathering exploits, this time against foreign ministries. This article has been indexed from Dark Reading Read the original article: 20-Year-Old Chinese APT15 Finds…

New DoJ Cyber Prosecution Team Will Go After Nation-State Threat Actors

The US Department of Justice adds litigators under its National Security Division to take on sophisticated cyber threats from adversarial nation-states. This article has been indexed from Dark Reading Read the original article: New DoJ Cyber Prosecution Team Will Go…

20 Year-Old Chinese APT15 Finds New Life in Foreign Ministry Attacks

The notorious APT15 used common malware tools and a third-generation custom ‘Graphican’ backdoor to continue its information gathering exploits, this time against foreign ministries. This article has been indexed from Dark Reading Read the original article: 20 Year-Old Chinese APT15…

Ransomware Misconceptions Abound, to the Benefit of Attackers

It’s time to update what we think we understand about ransomware, including new defensive measures and how fast the attack response should be. This article has been indexed from Dark Reading Read the original article: Ransomware Misconceptions Abound, to the…

New DOJ Cyber Prosecution Team Will Go After Nation-State Threat Actors

The US Department of Justice adds litigators under its National Security Division to take on sophisticated cyber threats from adversarial nation-states. This article has been indexed from Dark Reading Read the original article: New DOJ Cyber Prosecution Team Will Go…

Ransomware Misconceptions Abound, To the Benefit of Attackers

INFOSEC23 — London — It’s time to update what we think we understand about ransomware, including new defensive measures and how fast the attack response should be. This article has been indexed from Dark Reading Read the original article: Ransomware…

SMB Edge Devices Walloped With Asus, Zyxel Patch Warnings

A slew of critical advisories this week showcase an exploding edge device attack surface for SMBs, which have limited cybersecurity protection, visibility, and maintenance available. This article has been indexed from Dark Reading Read the original article: SMB Edge Devices…

‘Muddled Libra’ Uses Oktapus-Related Smishing to Target Outsourcing Firms

The emerging cyber-threat group is unusually persistent and nimble, bypassing MFA, stealing data, and using compromised environments for downstream customer attacks. This article has been indexed from Dark Reading Read the original article: ‘Muddled Libra’ Uses Oktapus-Related Smishing to Target…

Cyberattacks on OT, ICS Lay Groundwork for Kinetic Warfare

Organizations need to start taking critical infrastructure threats seriously, as they could be a precursor to future, hybrid cyber-kinetic warfare attacks, experts warn. This article has been indexed from Dark Reading Read the original article: Cyberattacks on OT, ICS Lay…

Placing People & Realism at the Center of Your Cybersecurity Strategy

While it’s impossible for an organization to be completely secure, there’s no reason to be defenseless. This article has been indexed from Dark Reading Read the original article: Placing People & Realism at the Center of Your Cybersecurity Strategy

Netskope Enables Secure Enterprise Use of ChatGPT and Generative AI Applications

ChatGPT usage growing 25% monthly in enterprises, prompting key decisions to block or enable based on security, productivity concerns. This article has been indexed from Dark Reading Read the original article: Netskope Enables Secure Enterprise Use of ChatGPT and Generative…

Cymulate Announces Security Analytics for Continuous Threat Exposure Management

New product provides customers with an attacker’s view of their cyber resilience aligned to business context. This article has been indexed from Dark Reading Read the original article: Cymulate Announces Security Analytics for Continuous Threat Exposure Management

eSentire’s AI Investigator Chatbot Aids Human Response to Security Incidents

The tool trained on the company’s investigative cybersecurity services data set, and provides natural language responses to client queries, to improve response and remediation efforts. This article has been indexed from Dark Reading Read the original article: eSentire’s AI Investigator…

Jordanian Cyber Leaders Kick Off Cybersecurity Framework Development

The nation of Jordan begins work on a national cybersecurity framework to align with international practices and better mitigate threats. This article has been indexed from Dark Reading Read the original article: Jordanian Cyber Leaders Kick Off Cybersecurity Framework Development

100K+ Infected Devices Leak ChatGPT Accounts to the Dark Web

Infostealers are as alive as ever, wantonly sweeping up whatever business data might be of use to cybercriminals, including OpenAI credentials. This article has been indexed from Dark Reading Read the original article: 100K+ Infected Devices Leak ChatGPT Accounts to…

NineID Raises $2.6M to Build a Secure Bridge Between the Digital and Physical Worlds of Corporate Security

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: NineID Raises $2.6M to Build a Secure Bridge Between the Digital…

Fresh Ransomware Gangs Emerge As Market Leaders Decline

The ransomware landscape is energized with the emergence of smaller groups and new tactics, while established gangs like LockBit see fewer victims. This article has been indexed from Dark Reading Read the original article: Fresh Ransomware Gangs Emerge As Market…

Schneider Power Meter Vulnerability Opens Door to Power Outages

A severe security vulnerability allows credentials for the power meters to continuously transmit in cleartext, allowing device takeover. This article has been indexed from Dark Reading Read the original article: Schneider Power Meter Vulnerability Opens Door to Power Outages

Mysterious Mystic Stealer Spreads Like Wildfire in Mere Months

A criminal crowd-sourcing campaign has led to swift adoption of the stealer, which can pilfer key computer data, credentials from browsers and chat apps, and cryptocurrency from multiple wallets. This article has been indexed from Dark Reading Read the original…

Hackers Will Be Quick to Bypass Gmail’s Blue Check Verification System

It’s still important to use other security measures, such as strong passwords and two-factor authentication, to protect your data. This article has been indexed from Dark Reading Read the original article: Hackers Will Be Quick to Bypass Gmail’s Blue Check…

Decoding Identity and Access Management For Organizations and Consumers

Workforce IAM and consumer IAM are not interchangeable — they serve different purposes and constituencies. This article has been indexed from Dark Reading Read the original article: Decoding Identity and Access Management For Organizations and Consumers

US Investors Sniffing Around Blacklisted NSO Group Assets

Pressure mounts on the NSO Group’s business viability as Khashoggi widow joins group of plaintiffs suing the Israeli firm for Pegasus spyware abuse. This article has been indexed from Dark Reading Read the original article: US Investors Sniffing Around Blacklisted…

Getting Over the DNS Security Awareness Gap

To properly secure DNS infrastructure, organizations need strong security hygiene around DNS infrastructure and records management as well as closely monitoring and filtering DNS traffic. This article has been indexed from Dark Reading Read the original article: Getting Over the…

The Infrastructure Security Engineer Is a Unicorn Among Thoroughbreds

This new role safeguarding cloud deployments requires an exceedingly rare set of technical and soft skills. This article has been indexed from Dark Reading Read the original article: The Infrastructure Security Engineer Is a Unicorn Among Thoroughbreds

Security LeadHER Wraps Groundbreaking Inaugural Conference for Women in Security

This first-ever event, hosted by the Security Industry Association and ASIS International and designed to advance, connect, and empower women in security, gathered hundreds of industry leaders in Nashville June 12-13, 2023. This article has been indexed from Dark Reading…

Attackers Create Synthetic Security Researchers to Steal IP

Threat groups created a fake security company, “High Sierra,” with faux exploits and fake profiles for security researchers on GitHub and elsewhere, aiming to get targets to install their malware. This article has been indexed from Dark Reading Read the…

How Do I Protect My API Keys From Appearing in Search Results?

A few lines of code can help you prevent accidental exposure, manage sensitive information, and maintain different configurations for various environments. This article has been indexed from Dark Reading Read the original article: How Do I Protect My API Keys…

HashiCorp Expands PAM, Secrets Management Capabilities

The new privileged access management and secrets management capabilities tackles access issues and secret sprawl across the cloud environment. This article has been indexed from Dark Reading Read the original article: HashiCorp Expands PAM, Secrets Management Capabilities

How Do I Protect My API Keys From Appearing in GitHub Search Results?

A few lines of code can help you prevent accidental exposure, manage sensitive information, and maintain different configurations for various environments. This article has been indexed from Dark Reading Read the original article: How Do I Protect My API Keys…

LockBit Affiliate Arrested, as Extortion Totals Reach $91M Since 2020

A third perp has been fingered, but CISA warns that LockBit variants continue to be a major threat on a global scale. This article has been indexed from Dark Reading Read the original article: LockBit Affiliate Arrested, as Extortion Totals…

Action1 Announces $20M Investment in Its Patch Management Platform

The company aims to empower enterprises to securely manage their endpoints and remediate vulnerabilities from the cloud, enabling a work-from-anywhere environment with confidence. This article has been indexed from Dark Reading Read the original article: Action1 Announces $20M Investment in…

Keytos Uncovers 15,000 Vulnerable Subdomains per Month in Azure Using Cryptographic Certificates

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Keytos Uncovers 15,000 Vulnerable Subdomains per Month in Azure Using Cryptographic…

Coalition Releases Security Vulnerability Exploit Scoring System

Coalition ESS uses AI to generate dynamic risk scores to help organizations mitigate their most critical risks faster. This article has been indexed from Dark Reading Read the original article: Coalition Releases Security Vulnerability Exploit Scoring System

Thales Proposes to Acquire Tesserent, Expanding its Global Cybersecurity Leadership

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Thales Proposes to Acquire Tesserent, Expanding its Global Cybersecurity Leadership

Angola Marks Technology Advancements With Cybersecurity Academy Plans

The academy is meant to ensure a safe and strong telecommunication service and information technologies for Angola’s citizens, the president said. This article has been indexed from Dark Reading Read the original article: Angola Marks Technology Advancements With Cybersecurity Academy…

‘Shampoo’ ChromeLoader Variant Difficult to Wash Out

A new version of the infamous browser extension is spreading through files on websites offering pirated wares, and leverages unique persistence mechanisms. This article has been indexed from Dark Reading Read the original article: ‘Shampoo’ ChromeLoader Variant Difficult to Wash…

Borderless Data vs. Data Sovereignty: Can They Co-Exist?

Organizations that remain compliant with data-sovereignty regulations while enabling cross-border data sharing gain significant competitive advantage because they can make quick, agile, and informed decisions. This article has been indexed from Dark Reading Read the original article: Borderless Data vs.…

Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In

Attackers continue to attempt to steal Bitcoin and other virtual coins, with a 40% increase in phishing attacks and fourfold increase in incidents. This article has been indexed from Dark Reading Read the original article: Cryptocurrency Attacks Quadrupled as Cybercriminals…

Russian APT ‘Cadet Blizzard’ Behind Ukraine Wiper Attacks

Microsoft says Cadet Blizzard wielded a custom wiper malware in the weeks leading up to Russia’s invasion of Ukraine, and it remains capable of wanton destruction. This article has been indexed from Dark Reading Read the original article: Russian APT…

Illinois Hospital Closure Showcases Ransomware’s Existential Threat

St. Margaret’s Health is shutting down due to a 2021 ransomware attack and other factors. It’s an object lesson for how small and rural healthcare facilities face grave cyber-risk when extortionists come calling. This article has been indexed from Dark…

XSS Vulnerabilities Found in Microsoft Azure Cloud Services

Microsoft quickly issued patches for the two security issues, which could allow unauthorized access to cloud sessions. This article has been indexed from Dark Reading Read the original article: XSS Vulnerabilities Found in Microsoft Azure Cloud Services

Moving the Cyber Industry Forward Requires a Novel Approach

CISOs need to be better equipped with strategic metrics and proof points to better align their organization for defense against the ever-changing threat landscape. This article has been indexed from Dark Reading Read the original article: Moving the Cyber Industry…

Why Your SEG Could Be Your Email Security Achilles’ Heel

As business email compromise attacks continue to grow and become increasingly sophisticated, is your secure email gateway providing sufficient protection? This article has been indexed from Dark Reading Read the original article: Why Your SEG Could Be Your Email Security…

Fortinet: Patched Critical Flaw May Have Been Exploited

Users urged to apply updates to FortiOS SSL-VPN after attackers may have leveraged a recently discovered vulnerability in attacks against government, manufacturing, and critical infrastructure organizations. This article has been indexed from Dark Reading Read the original article: Fortinet: Patched…

How Popular Messaging Tools Instill a False Sense of Security

It’s time to include messaging tool security in your cloud security program. Good first steps include tightening filter parameters on Slack and Teams. This article has been indexed from Dark Reading Read the original article: How Popular Messaging Tools Instill…

Chinese Threat Actor Abused ESXi Zero-Day to Pilfer Files From Guest VMs

Mandiant’s ongoing investigation of UNC3886 has uncovered new details of threat actors’ TTPs. This article has been indexed from Dark Reading Read the original article: Chinese Threat Actor Abused ESXi Zero-Day to Pilfer Files From Guest VMs

Analysis: Social Engineering Drives BEC Losses to $50B Globally

Threat actors have grown increasingly sophisticated in applying social engineering tactics against their victims, which is key to this oft-underrated cybercriminal scam’s success. This article has been indexed from Dark Reading Read the original article: Analysis: Social Engineering Drives BEC…