Category: Dark Reading

Cycode Launches CI/CD Pipeline Monitoring Solution (Cimon) to Prevent Supply Chain Attacks

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Cycode Launches CI/CD Pipeline Monitoring Solution (Cimon) to Prevent Supply Chain…

Popular Apparel, Clothing Brands Being Used in Massive Phishing Scam

Threat actors have created over 3,000 domains, some as old as two years, to lure in customers to false, name brand websites for personal financial gain. This article has been indexed from Dark Reading Read the original article: Popular Apparel,…

How Security Leaders Should Approach Cybersecurity Startups

Vendors and buyers both have the power to make the industry a better place. What’s needed is more collaboration, mutual support, and respect. This article has been indexed from Dark Reading Read the original article: How Security Leaders Should Approach…

Why Critical Infrastructure Remains a Ransomware Target

While protecting critical infrastructure seems daunting, here are some critical steps the industry can take now to become more cyber resilient and mitigate risks. This article has been indexed from Dark Reading Read the original article: Why Critical Infrastructure Remains…

Researchers Report First Instance of Automated SaaS Ransomware Extortion

The attack highlights growing interest among threat actors to target data from software-as-a-service providers. This article has been indexed from Dark Reading Read the original article: Researchers Report First Instance of Automated SaaS Ransomware Extortion

Use of Multifactor Authentication (MFA) Nearly Doubles Since 2020, Okta Secure Sign-in Trends Reports Finds

Okta platform data-based study finds FastPass and WebAuthn offer far stronger security and faster, more reliable user experiences. This article has been indexed from Dark Reading Read the original article: Use of Multifactor Authentication (MFA) Nearly Doubles Since 2020, Okta…

Use of Multi-Factor Authentication (MFA) Nearly Doubles Since 2020, New Okta Secure Sign-In Trends Reports Finds

Okta platform data-based study finds FastPass and WebAuthn offer far stronger security and faster, more reliable user experiences. This article has been indexed from Dark Reading Read the original article: Use of Multi-Factor Authentication (MFA) Nearly Doubles Since 2020, New…

RomCom Threat Actor Targets Ukrainian Politicians, US Healthcare

The group appears to be targeting victims based on their proximity and involvement to and within pro-Ukraine organizations. This article has been indexed from Dark Reading Read the original article: RomCom Threat Actor Targets Ukrainian Politicians, US Healthcare

‘Stealth Soldier’ Attacks Target Libyan Government Entities With Surveillance Malware

Surveillance malware targets Libyan government entities, with possible links to a 2019 Egypt attack campaign. This article has been indexed from Dark Reading Read the original article: ‘Stealth Soldier’ Attacks Target Libyan Government Entities With Surveillance Malware

Passkeys See Fresh Momentum With New Pilot Programs

Apple adds API that will enable sharing of passkeys across platforms, and Google offers passkey authentication in beta for Google Workspace and Google Cloud. This article has been indexed from Dark Reading Read the original article: Passkeys See Fresh Momentum…

Brand-New Security Bugs Affect All MOVEit Transfer Versions

Progress has issued a second patch for additional SQL flaws that are distinct from the zero-day that Cl0p ransomware gang is exploiting. This article has been indexed from Dark Reading Read the original article: Brand-New Security Bugs Affect All MOVEit…

DOS Attacks Dominate, but System Intrusions Cause Most Pain

In the latest Verizon “Data Breach Investigations Report,” denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems. This article has been indexed from Dark Reading Read the original…

‘Asylum Ambuscade’ Cyberattackers Blend Financial Heists & Cyber Espionage

In a rare mix of motivations, the cyberattack group has been linked to both financial cybercrime and political spying efforts on governments. This article has been indexed from Dark Reading Read the original article: ‘Asylum Ambuscade’ Cyberattackers Blend Financial Heists…

DOS Attacks Dominate, But System Intrusions Cause Most Pain

In the latest Verizon Data Breach Investigations Report, denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems. This article has been indexed from Dark Reading Read the original…

3 Elite Communication Skills to Help Security Pros Get Projects Funded

It’s not enough to know how to better protect the enterprise — you have to be able to convince decision-makers that your plans are necessary. This article has been indexed from Dark Reading Read the original article: 3 Elite Communication…

South African Female Students Offered Cyber Scholarship

Women of color are being offered a scholarship opportunity in South Africa — the offer will cover costs for pursuing a cyber career and encourage greater diversity of those studying cybersecurity courses. This article has been indexed from Dark Reading…

How Continuous Monitoring and Threat Intel Can Help Prevent Ransomware

Security teams should be empowered with the right amount of intelligence to track new and emerging threats and connect that intel to historical data. This article has been indexed from Dark Reading Read the original article: How Continuous Monitoring and…

5 Tips for Modernizing Your Security Operations Center Strategy

A solid, dependable SOC strategy that is scalable in the face of various security threats is essential to reduce cybersecurity risks to your business. This article has been indexed from Dark Reading Read the original article: 5 Tips for Modernizing…

Cybersecurity Institute to Open in Saudi Arabia

The Global Cybersecurity Forum branch, which will be in Riyadh, is meant to enable the exchange of ideas and facilitate international projects and partnerships. This article has been indexed from Dark Reading Read the original article: Cybersecurity Institute to Open…

QuSecure Awarded US Army Contract for Post-Quantum Cybersecurity Solutions

United States Army with QuSecure advances toward a quantum-resilient future protecting the country from today and tomorrow’s cybersecurity threats. This article has been indexed from Dark Reading Read the original article: QuSecure Awarded US Army Contract for Post-Quantum Cybersecurity Solutions

The Growing Cyber Threats of Generative AI: Who’s Accountable?

In the wrong hands, malicious actors can use chatbots to unleash sophisticated cyberattacks that could have devastating consequences. This article has been indexed from Dark Reading Read the original article: The Growing Cyber Threats of Generative AI: Who’s Accountable?

Sophisticated ‘Impulse Project’ Crypto Scam Sprawls With 1,000 Affiliate Sites

Ready-to-defraud turnkey services from Russia’s Impulse Team are offered on the cyber underground and have built a campaign that has operated undetected dating back to 2016. This article has been indexed from Dark Reading Read the original article: Sophisticated ‘Impulse…

Easily Exploitable Microsoft Visual Studio Bug Opens Developers to Takeover

The bug is very dangerous and impacts a big swath of the developer community, researchers warn. This article has been indexed from Dark Reading Read the original article: Easily Exploitable Microsoft Visual Studio Bug Opens Developers to Takeover

Fighting AI-Powered Fraud: Let the Battle of the Machines Begin

As cybercriminals tap the power of machine learning and generative AI to outwit fraud-detection systems, online fraud-prevention technologies must evolve accordingly. This article has been indexed from Dark Reading Read the original article: Fighting AI-Powered Fraud: Let the Battle of…

60K+ Android Apps Have Delivered Adware Undetected for Months

A campaign targeting mainly US users disguised malware in fake security software, game cracks, cheats, free Netflix, and other “modded” apps. This article has been indexed from Dark Reading Read the original article: 60K+ Android Apps Have Delivered Adware Undetected…

BioCatch Strengthens Collaboration With Microsoft Cloud for Financial Services

Collaboration delivers end-to-end intelligent banking cloud platform with online fraud detection powered by next-generation behavioral biometrics. This article has been indexed from Dark Reading Read the original article: BioCatch Strengthens Collaboration With Microsoft Cloud for Financial Services

Radiflow’s CIARA 4.0 Delivers Actionable Insights to Simplify the Management of OT Cyber-Risk at Industrial Facilities

CIARA V4.0 boosts compliance with security regulations and best practices while providing effective mitigation guidance. “CISOs are doing more with less, making it challenging to understand their current standing across the OT Cybersecurity landscape,” said Ilan Barda, Radiflow CEO and…

BeyondID Launches Initiative to Accelerate Zero Trust With Okta Identity Engine

OIE upgrade roadmap helps organizations become more secure; saves time, resources. This article has been indexed from Dark Reading Read the original article: BeyondID Launches Initiative to Accelerate Zero Trust With Okta Identity Engine

Defenders Buckle Up for a Future of Detecting Deepfakes

Today, technology companies have high success rates against generative AI-created voices and videos, but future detection will be much more difficult. This article has been indexed from Dark Reading Read the original article: Defenders Buckle Up for a Future of…

FBI: Sextortionist Campaigns Use Deepfakes to Target Children, Adults

Threat actors are lifting public images and videos from the Internet, altering them, and posting them online in a new wave of sextortion campaigns. This article has been indexed from Dark Reading Read the original article: FBI: Sextortionist Campaigns Use…

Researchers Spot a Different Kind of Magecart Card-Skimming Campaign

In addition to injecting a card skimmer into target Magento, WooCommerce, Shopify, and WordPress sites, the the threat actor is also hijacking targeted domains to deliver the malware to other sites. This article has been indexed from Dark Reading Read…

Verizon DBIR: Social Engineering Breaches Double, Leading to Spiraling Ransomware Costs

Ransomware continues its runaway growth with median payments reaching $50,000 per incident. This article has been indexed from Dark Reading Read the original article: Verizon DBIR: Social Engineering Breaches Double, Leading to Spiraling Ransomware Costs

ILTA and Conversant Group Release Cybersecurity Benchmarking Survey of the Legal Industry

Joint research highlights disconnect between legal IT and recommended cybersecurity practices. This article has been indexed from Dark Reading Read the original article: ILTA and Conversant Group Release Cybersecurity Benchmarking Survey of the Legal Industry

With SEC Rule Changes on the Horizon, Research Reveals Only 14% of CISOs Have Traits Desired for Cyber Expert Board Positions

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: With SEC Rule Changes on the Horizon, Research Reveals Only 14%…

Netskope Intelligent SSE Selected by Transdev to Secure and Connect its Hybrid Workforce

Implementation is part of Transdev’s Cloud-First approach to better manage technological obsolescence. This article has been indexed from Dark Reading Read the original article: Netskope Intelligent SSE Selected by Transdev to Secure and Connect its Hybrid Workforce

Filling the Gaps: How to Secure the Future of Hybrid Work

By enhancing remote management and adopting hardware-enforced security, productivity can continue without inviting extra cyber-risk. This article has been indexed from Dark Reading Read the original article: Filling the Gaps: How to Secure the Future of Hybrid Work

US Aerospace Contractor Hacked With ‘PowerDrop’ Backdoor

Hackers used a little to do a lot, cracking a high-value target with hardly more than the living-off-the-land tools (PowerShell especially) found on any standard Windows computer. This article has been indexed from Dark Reading Read the original article: US…

ChatGPT Hallucinations Open Developers to Supply Chain Malware Attacks

Attackers could exploit a common AI experience — false recommendations — to spread malicious code via developers that use ChatGPT to create software. This article has been indexed from Dark Reading Read the original article: ChatGPT Hallucinations Open Developers to…

ChatGPT Hallucinations Open Developers to Supply-Chain Malware Attacks

Attackers could exploit a common AI experience—false recommendations—to spread malicious code via developers that use ChatGPT to create software. This article has been indexed from Dark Reading Read the original article: ChatGPT Hallucinations Open Developers to Supply-Chain Malware Attacks

Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution

New AI feature enhances OnDOMAIN’s capabilities to secure unknown vulnerabilities and strengthen network security posture. This article has been indexed from Dark Reading Read the original article: Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution

Gigabyte Slams Backdoor Shut With Attack-Killing BIOS Update

A firmware update for hundreds of Gigabyte PC models gets rid of a backdoor capability that could be hijacked by cybercriminals, the company says. This article has been indexed from Dark Reading Read the original article: Gigabyte Slams Backdoor Shut…

2.5M Impacted by Enzo Biochem Data Leak After Ransomware Attack

With the leak of information such as Social Security numbers, in addition to other protected information, 600,000 of the nearly 2.5 million affected are at risk for identity theft. This article has been indexed from Dark Reading Read the original…

Microsoft Links MOVEit Attack to Cl0p as British Airways, BBC Fall

Some billion-dollar organizations have already been identified as victims of the prolific ransomware group’s latest exploit, amidst ongoing attacks. This article has been indexed from Dark Reading Read the original article: Microsoft Links MOVEit Attack to Cl0p as British Airways,…

Moonlighter Satellite Offers In-Orbit Target for Space Hackers

Moonlighter, which offers red teams a chance at operational disruption, will be up for pwning at in August, timed with DEF CON. This article has been indexed from Dark Reading Read the original article: Moonlighter Satellite Offers In-Orbit Target for…

Don’t Overlook Twitter’s Trove of Threat Intel for Enterprise Cybersecurity

Social media data can provide critical clues to help get ahead of the next cyberattack, experts say. This article has been indexed from Dark Reading Read the original article: Don’t Overlook Twitter’s Trove of Threat Intel for Enterprise Cybersecurity

Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway

With shades of the GoAnywhere attacks, a cyber threat actor linked to FIN11 is leveraging a bug in the widely used managed file transfer product to steal data from organizations in multiple countries. This article has been indexed from Dark…

After ‘Inception’ Attack, New Due Diligence Requirements Are Needed

To stem supply chain attacks, forging a new dynamic of shared cybersecurity hygiene accountability is the right thing to do. This article has been indexed from Dark Reading Read the original article: After ‘Inception’ Attack, New Due Diligence Requirements Are…

PyPI’s 2FA Requirements Don’t Go Far Enough, Researchers Say

The Python Package Index will require developers to better secure their accounts as cyberattacks ramp up, but protecting the software supply chain will take more than that. This article has been indexed from Dark Reading Read the original article: PyPI’s…

‘Picture-in-Picture’ Obfuscation Spoofs Delta, Kohl’s for Credential Harvesting

A recent campaign tricks victims into visiting credential harvesting sites by hiding malicious URLs behind photos advertising deals from trusted brands. This article has been indexed from Dark Reading Read the original article: ‘Picture-in-Picture’ Obfuscation Spoofs Delta, Kohl’s for Credential…

How CISOs Can Manage the Intersection of Security, Privacy, And Trust

Integrating a subject rights request tool with security and compliance solutions can help identify potential data conflicts more efficiently and with greater accuracy. This article has been indexed from Dark Reading Read the original article: How CISOs Can Manage the…

Want Sustainable Security? Find Middle Ground Between Tech & Education

The winning recipe for sustainable security combines strategic user education and tactical automation of well-constructed processes. This article has been indexed from Dark Reading Read the original article: Want Sustainable Security? Find Middle Ground Between Tech & Education

Cyversity and United Airlines to Provide Cybersecurity Training Scholarships to Cyversity Members

Program designed to equip women and underrepresented individuals with the necessary skills and knowledge to succeed in cybersecurity. This article has been indexed from Dark Reading Read the original article: Cyversity and United Airlines to Provide Cybersecurity Training Scholarships to…

DNB Strengthens its Network Security Posture and Productivity With Ericsson Security Manager Solution

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: DNB Strengthens its Network Security Posture and Productivity With Ericsson Security…

Tel Aviv Stock Exchange Selects CardinalOps to Reduce Risk of Breaches Due to Undetected Attacks

Enables financial services firm to operationalize MITRE ATT&CK with Splunk and eliminate detection coverage gaps based on organizational risk and priorities. This article has been indexed from Dark Reading Read the original article: Tel Aviv Stock Exchange Selects CardinalOps to…

Amazon Pays $30.8M to Settle Ring Spying & Alexa Privacy Lawsuits

The global e-commerce company will pay millions of dollars in two separate lawsuits because of privacy and security violations, the FTC says. This article has been indexed from Dark Reading Read the original article: Amazon Pays $30.8M to Settle Ring…

Jetpack WordPress Plug-in API Bug Triggers Mass Updates

An audit uncovers an API-related security vulnerability dating back to Jetpack version 2.0 released in 2012 — and it affects millions of websites. This article has been indexed from Dark Reading Read the original article: Jetpack WordPress Plug-in API Bug…

Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace

No activity logging in the free subscription for Google’s Web-based productivity suite exposes enterprises to insider and other threats, researchers say. This article has been indexed from Dark Reading Read the original article: Google Drive Deficiency Allows Attackers to Exfiltrate…

Sustained ‘Red Deer’ Phishing Attacks Impersonate Israel Post, Drop RATs

The “missed package” phishing messages, likely the work of a hacking-for-hire group, bounds into inboxes, bearing ASyncRAT. This article has been indexed from Dark Reading Read the original article: Sustained ‘Red Deer’ Phishing Attacks Impersonate Israel Post, Drop RATs

Novel PyPI Malware Uses Compiled Python Bytecode to Evade Detection

In an already fraught environment surrounding the popular Python programming language software package manager, hackers are coming up with new ways to sneak malicious goodies past cybersecurity buffers. This article has been indexed from Dark Reading Read the original article:…

Biometric Bypass: BrutePrint Makes Short Work of Fingerprint Security

Bugs in the biometric protections on Android phones and iPhones allow the limit on the number of tries to unlock the devices with a fingerprint can be bypassed, allowing automated brute-force attacks. This article has been indexed from Dark Reading…

SolarWinds Transforms Brand to Signify Ongoing Evolution, Portfolio Expansion, and Customer Empowerment

Refreshed version of iconic SolarWinds logo and vibrant new brand color palette honor company’s historic success while highlighting future vision. This article has been indexed from Dark Reading Read the original article: SolarWinds Transforms Brand to Signify Ongoing Evolution, Portfolio…

Top macOS Malware Threats Proliferate: Here Are 6 to Watch

Apple’s growing market share — in a shrinking PC market — and the growing use of Golang for malware development is pushing a gradual increase in malicious tools targeting macOS environments. This article has been indexed from Dark Reading Read…

Top MacOS Malware Threats Proliferate: Here Are 6 to Watch

Apple’s growing market share — in a shrinking PC market — and the growing use of Golang for malware development is pushing a gradual increase in malicious tools targeting macOS environments. This article has been indexed from Dark Reading Read…

Yet Another Toyota Cloud Data Breach Jeopardizes Thousands of Customers

The newly found misconfigured cloud services are discovered just two weeks after an initial data breach affecting millions came to light. This article has been indexed from Dark Reading Read the original article: Yet Another Toyota Cloud Data Breach Jeopardizes…

Can Cloud Services Encourage Better Login Security? Netflix’s Accidental Model

Netflix’s unpopular password-sharing policy change had a positive cybersecurity silver lining. Can more B2C service providers nudge their users toward secure authentication? This article has been indexed from Dark Reading Read the original article: Can Cloud Services Encourage Better Login…

MacOS ‘Migraine’ Bug: Big Headache for Device System Integrity

Microsoft says the vulnerability could allow cyberattackers with root access to bypass security protections and install malware. This article has been indexed from Dark Reading Read the original article: MacOS ‘Migraine’ Bug: Big Headache for Device System Integrity

Ways to Help Cybersecurity’s Essential Workers Avoid Burnout

To support and retain the people who protect assets against bad actors, organizations should create a more defensible environment. This article has been indexed from Dark Reading Read the original article: Ways to Help Cybersecurity’s Essential Workers Avoid Burnout

Checkmarx Announces GenAI-powered AppSec Platform, Empowering Developers and AppSec Teams to Find and Fix Vulnerabilities Faster

Powered by GPT-4, innovative new AI-driven capabilities lower application security (AppSec) risk and help security teams “shift everywhere” with speed and accuracy. This article has been indexed from Dark Reading Read the original article: Checkmarx Announces GenAI-powered AppSec Platform, Empowering…

Investment May Be Down, but Cybersecurity Remains a Hot Sector

There’s still a great deal of capital available for innovative companies helping businesses secure their IT environments. This article has been indexed from Dark Reading Read the original article: Investment May Be Down, but Cybersecurity Remains a Hot Sector

New eID Scheme Gives EU Citizens Easy Access to Public Services Online

The European Commission voted a new electronic identification scheme that creates new opportunities for EU citizens and businesses. This article has been indexed from Dark Reading Read the original article: New eID Scheme Gives EU Citizens Easy Access to Public…

Mirai Variant Opens Tenda, Zyxel Gear to RCE, DDoS

Researchers have observed several cyberattacks leveraging a botnet called IZ1H9, which exploits vulnerabilities in exposed devices and servers running on Linux. This article has been indexed from Dark Reading Read the original article: Mirai Variant Opens Tenda, Zyxel Gear to…

Focus Security Efforts on Choke Points, Not Visibility

By finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation. This article has been indexed from Dark Reading Read the original article: Focus Security Efforts on Choke Points, Not Visibility

Salesforce ‘Ghost Sites’ Expose Sensitive Corporate Data

Some companies have moved on from using Salesforce. But without remembering to fully deactivate their clouds, Salesforce won’t move on from them. This article has been indexed from Dark Reading Read the original article: Salesforce ‘Ghost Sites’ Expose Sensitive Corporate…

Spotlight on 2023 Dan Kaminsky Fellow: Dr. Gus Andrews

As the second Kaminsky Fellow, Dr. Andrews will study the use of threat intelligence to track campaigns against the human rights community. This article has been indexed from Dark Reading Read the original article: Spotlight on 2023 Dan Kaminsky Fellow:…

Human-Assisted CAPTCHA-Cracking Services Supercharge Shopper Bots

On-demand human solvers are now augmenting automated website cyberattacks, offering a better way around tougher anti-bot puzzles. This article has been indexed from Dark Reading Read the original article: Human-Assisted CAPTCHA-Cracking Services Supercharge Shopper Bots

Undetected Attacks Against Middle East Targets Conducted Since 2020

Targeted attacks against Saudi Arabia and other Middle East nations have been detected with a tool that’s been in the wild since 2020. This article has been indexed from Dark Reading Read the original article: Undetected Attacks Against Middle East…

9M Dental Patients Affected by LockBit Attack on MCNA

The government-sponsored dental and oral healthcare provider warned its customers that a March attack exposed sensitive data, some of which was leaked online by the ransomware group. This article has been indexed from Dark Reading Read the original article: 9M…