Category: Dark Reading

‘Very Noisy:’ For the Black Hat NOC, It’s All Malicious Traffic All the Time

Black Hat Asia’s NOC team gives a look inside what’s really happening on the cyber front during these events. This article has been indexed from Dark Reading Read the original article: ‘Very Noisy:’ For the Black Hat NOC, It’s All…

Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains

New data shows cyberattacks targeting software supply chains will cost the global economy $80.6 billion annually by 2026. This article has been indexed from Dark Reading Read the original article: Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply…

Plug-and-Play Microsoft 365 Phishing Tool ‘Democratizes’ Attack Campaigns

New “Greatness” phishing-as-a-service used in attacks targeting manufacturing, healthcare, technology, and other sectors. This article has been indexed from Dark Reading Read the original article: Plug-and-Play Microsoft 365 Phishing Tool ‘Democratizes’ Attack Campaigns

Billy Corgan Paid Off Hacker Who Threatened to Leak New Smashing Pumpkins Songs

Corgan got FBI involved to track down the cybercriminal, who had stolen from other artists as well, he said. This article has been indexed from Dark Reading Read the original article: Billy Corgan Paid Off Hacker Who Threatened to Leak…

Startup Competition Secures ML Systems, Vulnerabilities in Automation

RSA’s Innovation Sandbox 2023 focused on the software supply chain, as well as attack surfaces exposed by generative AI, ML systems, and APIs. This article has been indexed from Dark Reading Read the original article: Startup Competition Secures ML Systems,…

CISA Addresses ‘Cyber Poor’ Small Biz, Local Government

Relatively few organizations have the resources for security programs and security professionals, so the US cyber agency is putting programs in place to help them, while striving to understand the scope of the problem itself. This article has been indexed…

Dragos Employee Hacked, Revealing Ransomware, Extortion Scheme

Attackers compromised the personal email of a new employee and, when the initial attack failed, attempted through socially engineered messages to get the company to pay them off. This article has been indexed from Dark Reading Read the original article:…

Why Economic Downturns Put Innovation at Risk & Threaten Cyber Safety

Supplementing staff by hiring hackers to seek holes in a company’s defense makes economic sense in a downturn. Could they be cybersecurity’s unlikely heroes in a recession? This article has been indexed from Dark Reading Read the original article: Why…

2023 AT&T Cybersecurity Insights Report: Edge Ecosystem

The 2023 AT&T Cybersecurity Insights Report examines how edge use cases are evolving, how organizations are changing to deliver better business outcomes through digital first experiences, and how an integrated ecosystem can work together to put security at the core…

Multiple Ransomware Groups Adapt Babuk Code to Target ESXi VMs

Two years ago, a popular ransomware-as-a-service group’s source code got leaked. Now other ransomware groups are using it for their own purposes. This article has been indexed from Dark Reading Read the original article: Multiple Ransomware Groups Adapt Babuk Code…

Secureframe Finds 37% of Organizations Reuse Passwords for Cloud Service Providers

Secureframe launches Secureframe Trust to empower businesses to showcase a strong security posture. This article has been indexed from Dark Reading Read the original article: Secureframe Finds 37% of Organizations Reuse Passwords for Cloud Service Providers

Global Research From Delinea Reveals That 61% of IT Security Decision Makers Think Leadership Overlooks the Role of Cybersecurity in Business Success

Disconnect between security and business goals had negative consequences for 89% of respondents and increased the success of cyberattacks at one in four companies. This article has been indexed from Dark Reading Read the original article: Global Research From Delinea…

Infamous Twitter Hacker Cops to Cybercrimes, Extradited to US for Trial

Confessed cybercriminal hijacked Twitter, TikTok, and Snapchat accounts; defrauded victims; and more. This article has been indexed from Dark Reading Read the original article: Infamous Twitter Hacker Cops to Cybercrimes, Extradited to US for Trial

Microsoft Fixes Failed Patch for Exploited Outlook Vulnerability

Adding a single character to a function in the previous Outlook patch rendered that fix useless, researchers say. This article has been indexed from Dark Reading Read the original article: Microsoft Fixes Failed Patch for Exploited Outlook Vulnerability

Leak of Intel Boot Guard Keys Could Have Security Repercussions for Years

While Intel is still investigating the incident, the security industry is bracing itself for years of potential firmware insecurity if the keys indeed were exposed. This article has been indexed from Dark Reading Read the original article: Leak of Intel…

RapperBot Crew Drops DDoS/CryptoJacking Botnet Collab

Cryptomining is a logical partner for an existing IoT-focused DDoS botnet, so the RapperBot authors customized XMRig to make it happen. This article has been indexed from Dark Reading Read the original article: RapperBot Crew Drops DDoS/CryptoJacking Botnet Collab

Microsoft Digital Defense Report: Trends In Device and Infrastructure Attacks

In part two of this three-part series, Microsoft synthesizes the impact of IoT/OT security challenges and offers tips for strengthening security there. This article has been indexed from Dark Reading Read the original article: Microsoft Digital Defense Report: Trends In…

Free Tool Unlocks Some Encrypted Data in Ransomware Attacks

“White Phoenix” automated tool for recovering data on partially encrypted files hit with ransomware is available on GitHub. This article has been indexed from Dark Reading Read the original article: Free Tool Unlocks Some Encrypted Data in Ransomware Attacks

Keeper Security Announces Minority Growth Equity Investment From Summit Partners

Investment marks the second significant funding round from a leading technology growth equity firm. This article has been indexed from Dark Reading Read the original article: Keeper Security Announces Minority Growth Equity Investment From Summit Partners

Privoro and Samsung Partner to Provide Trusted Control Over Smartphone Radios and Sensors

New hardware-to-hardware integration between SafeCase and Galaxy’s Hardware Device Manager fortifies mobile security, protecting customers from spyware attacks. This article has been indexed from Dark Reading Read the original article: Privoro and Samsung Partner to Provide Trusted Control Over Smartphone…

ESET APT Report: Attacks by China-, North Korea-, and Iran-aligned Threat Actors; Russia Eyes Ukraine and the EU

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: ESET APT Report: Attacks by China-, North Korea-, and Iran-aligned Threat…

SideWinder Strikes Victims in Pakistan, Turkey in Multiphase Polymorphic Attack

The APT is exploiting a remote template injection flaw to deliver malicious documents that lure in government officials and other targets with topics of potential interest. This article has been indexed from Dark Reading Read the original article: SideWinder Strikes…

Half of npm Packages Vulnerable to Old-School Weapon: the ‘Shift’ Key

For years, hackers could have tricked enterprises into downloading malware by simply de-capitalizing letters. This article has been indexed from Dark Reading Read the original article: Half of npm Packages Vulnerable to Old-School Weapon: the ‘Shift’ Key

Keep Your Company Cyber Competent Without Adding Cyber Anxiety

With the right attitude, businesses can maximize employee satisfaction and protection, without sacrificing productivity. This article has been indexed from Dark Reading Read the original article: Keep Your Company Cyber Competent Without Adding Cyber Anxiety

New Bazel Ruleset Helps Developers Build Secure Container Images

A new ruleset from Bazel, an open source build and test tool from Google, allows developers to create Docker images and generate software bills of materials about what is inside the containers. This article has been indexed from Dark Reading…

Consilient Inc. and Harex InfoTech Partner to Fight Financial Crime in South Korea

Companies bring generative AI-Federated Learning to the forefront to transform business processes and enable dynamic risk management. This article has been indexed from Dark Reading Read the original article: Consilient Inc. and Harex InfoTech Partner to Fight Financial Crime in…

Government, Industry Efforts to Thwart Ransomware Slowly Start to Pay Off

Public-private collaboration, law enforcement, and better defenses are helping make inroads in the war against ransomware, according to the Ransomware Task Force. This article has been indexed from Dark Reading Read the original article: Government, Industry Efforts to Thwart Ransomware…

Satori Unveils Universal Data Permissions Scanner, A Free Open-Source Tool that Sheds Light on Data Access Authorization

Addressing data access blindspots commonly faced by enterprises, data security leader launches the first open-source authorization analysis tool to provide universal visibility into data access permissions across multiple data stores. This article has been indexed from Dark Reading Read the…

KnowBe4 Launches Password Kit to Celebrate World Password Day

KnowBe4 is offering a no-cost password kit to help end users practice good password hygiene and strengthen their defenses against social engineering. This article has been indexed from Dark Reading Read the original article: KnowBe4 Launches Password Kit to Celebrate…

Browser Isolation Adapts to Remote Work, Greater Cloud Usage

As browsers become the center of many workers’ days, isolation technologies shift to protecting the extended enterprise. This article has been indexed from Dark Reading Read the original article: Browser Isolation Adapts to Remote Work, Greater Cloud Usage

Judge Spares Former Uber CISO Jail Time Over 2016 Data Breach Charges

Tell other CISO’s “you got a break,” judge says in handing down a three-year probation sentence to Joseph Sullivan. This article has been indexed from Dark Reading Read the original article: Judge Spares Former Uber CISO Jail Time Over 2016…

New White House AI Initiatives Include AI Software-Vetting Event at DEF CON

The Biden administration outlined its plans to ensure responsible AI development — cyber-risk is a core element. This article has been indexed from Dark Reading Read the original article: New White House AI Initiatives Include AI Software-Vetting Event at DEF…

2 Years After Colonial Pipeline, US Critical Infrastructure Still Not Ready for Ransomware

Sweeping changes implemented since the May 2021 cyberattack are helping — but more work remains to be done, security experts say. This article has been indexed from Dark Reading Read the original article: 2 Years After Colonial Pipeline, US Critical…

Google Expands Passkey Support With Passwordless Authentication

One year after Apple, Google and Microsoft pledged to support the FIDO Alliance’s passkeys standard, support is growing, though still early in adoption. This article has been indexed from Dark Reading Read the original article: Google Expands Passkey Support With…

Google Expands Passkey Support with Passwordless Authentication

One year after Apple, Google and Microsoft pledged to support the FIDO Alliance’s passkeys standard, support is growing, though still early in adoption. This article has been indexed from Dark Reading Read the original article: Google Expands Passkey Support with…

Identifying Compromised Data Can Be a Logistical Nightmare

Being able to trace an incident backwards from breach to data source is vital in restoring and improving cybersecurity. This article has been indexed from Dark Reading Read the original article: Identifying Compromised Data Can Be a Logistical Nightmare

Databricks Ventures Invests in Data Security Leader Immuta

Strategic investment builds upon long-standing partnership and reinforces Databricks’ commitment to Immuta as its trusted partner for data security. This article has been indexed from Dark Reading Read the original article: Databricks Ventures Invests in Data Security Leader Immuta

Autocrypt Releases Comprehensive Key Management Solution for Automotive Manufacturing

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Autocrypt Releases Comprehensive Key Management Solution for Automotive Manufacturing

OneTrust Enhances Data Discovery and Governance by Introducing AI-Powered Document Classification

Organizations can effectively classify unstructured data, automatically apply policies, and remediate violations. This article has been indexed from Dark Reading Read the original article: OneTrust Enhances Data Discovery and Governance by Introducing AI-Powered Document Classification

InsightCyber Launches Platform to Provide Cyber Threat Management and Security to Global Critical Infrastructure

The InsightCyber Platform delivers continuous AI-monitoring of cyber-physical assets. This article has been indexed from Dark Reading Read the original article: InsightCyber Launches Platform to Provide Cyber Threat Management and Security to Global Critical Infrastructure

Netskope: Attackers Double Down on Social Engineering Techniques and Malicious Functionalities

Researchers find attackers are successfully evading detection by blending in with normal network traffic via HTTP and HTTPS. This article has been indexed from Dark Reading Read the original article: Netskope: Attackers Double Down on Social Engineering Techniques and Malicious…

Google Launches Cybersecurity Career Certificate Program

Google’s new program aims to offer accessible training to fill 750K open cybersecurity jobs with diverse array of talent. This article has been indexed from Dark Reading Read the original article: Google Launches Cybersecurity Career Certificate Program

How Public-Private Information Sharing Can Level the Cybersecurity Playing Field

Sharing information is critical to help organizations protect data and systems. To be even more effective, collaboration should be inclusive — vendors, researchers, and private companies large and small. This article has been indexed from Dark Reading Read the original…

Microsoft Patches Serious Azure Cloud Security Flaws

Three vulnerabilities in the platform’s API Management Service could allow access sensitive data, mount further attacks, and even hijack developer portals. This article has been indexed from Dark Reading Read the original article: Microsoft Patches Serious Azure Cloud Security Flaws

The Daily Number of Human-Driven Cyber Incidents Increased by 1.5 Times in 2022

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: The Daily Number of Human-Driven Cyber Incidents Increased by 1.5 Times…

Threat Spotlight: Proportion of Malicious HTML Attachments Doubles Within a Year

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Threat Spotlight: Proportion of Malicious HTML Attachments Doubles Within a Year

Moonsense Raises $4.2M in Seed Funding and Introduces Next-Gen User Behavior and Network Intelligence Solution

Hassle-free initial trial, harnesses digital body language and source data for enhanced fraud detection. This article has been indexed from Dark Reading Read the original article: Moonsense Raises $4.2M in Seed Funding and Introduces Next-Gen User Behavior and Network Intelligence…

DNA Sequencing Equipment Vulnerability Adds New Twist to Medical Device Cyber Threats

A vulnerability in a DNA sequencer highlights the expanded attack surface area of healthcare organizations but also shows that reporting of medical device vulnerabilities works. This article has been indexed from Dark Reading Read the original article: DNA Sequencing Equipment…

Court Rejects Merck Insurers’ Attempt to Refuse Coverage for NotPetya Damages

Insurers unsuccessfully argued Merck’s $1.4B in losses following NotPetya cyberattack fell under wartime exclusion. This article has been indexed from Dark Reading Read the original article: Court Rejects Merck Insurers’ Attempt to Refuse Coverage for NotPetya Damages

Meta Expunges Multiple APT, Cybercrime Groups from Facebook, Instagram

The company has removed three APTs and six potentially criminal networks from its platforms who leveraged elaborate campaigns of fake personas and profiles to lure and compromise users. This article has been indexed from Dark Reading Read the original article:…

Legitimate Software Abuse: A Disturbing Trend in Ransomware Attacks

Build a culture of security so that everyone is on the lookout for suspect behavior. Implement least privilege, improve visibility. This article has been indexed from Dark Reading Read the original article: Legitimate Software Abuse: A Disturbing Trend in Ransomware…

Hotels at Risk From Bug in Oracle Property Management Software

Oracle’s characterization of the vulnerability in its Opera software as complex and hard to exploit is incorrect, researchers who found the flaw and reported it say. This article has been indexed from Dark Reading Read the original article: Hotels at…

APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics

The notorious Chinese APT is spreading cyber maliciousness around Southeast Asia, and its next targets are already in sight. This article has been indexed from Dark Reading Read the original article: APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics

North Korean APT Gets Around Macro-Blocking With LNK Switch-Up

APT37 is among a growing list of threat actors that have switched to Windows shortcut files after Microsoft blocked macros last year. This article has been indexed from Dark Reading Read the original article: North Korean APT Gets Around Macro-Blocking…

Google Ads Abused to Lure Corporate Workers to LOBSHOT Backdoor

The cyberattack campaign, similar to one to spread the Rhadamanthys Stealer, is part of a larger trend by attackers to use malvertising as initial access for ransomware and other threat activity. This article has been indexed from Dark Reading Read…

4 Principles for Creating a New Blueprint for Secure Software Development

Improving the security of the software development process is key to thwarting bad actors. This article has been indexed from Dark Reading Read the original article: 4 Principles for Creating a New Blueprint for Secure Software Development

Enterprise Strategy Group Research Reveals 75% of Organizations Change or Update APIs on a Daily or Weekly Basis

According to the ESG Study, 92% of organizations have experienced at least one security incident related to insecure APIs in the past year. This article has been indexed from Dark Reading Read the original article: Enterprise Strategy Group Research Reveals…

APT28 Employs Windows Update Lures to Trick Ukrainian Targets

The phishing emails were sent using names of system administrators and a letter containing instructions to protect against hackers. This article has been indexed from Dark Reading Read the original article: APT28 Employs Windows Update Lures to Trick Ukrainian Targets

What the Cybersecurity Industry Can Learn From the SVB Crisis

The banking industry has safeguards designed to mitigate financial risk, something the cybersecurity industry can learn from. This article has been indexed from Dark Reading Read the original article: What the Cybersecurity Industry Can Learn From the SVB Crisis

‘BellaCiao’ Showcases How Iran’s Threat Groups Are Modernizing Their Malware

The dropper is being used in a Charming Kitten APT campaign that has hit organizations in multiple countries. This article has been indexed from Dark Reading Read the original article: ‘BellaCiao’ Showcases How Iran’s Threat Groups Are Modernizing Their Malware

Google Bans Thousands of Play Store Developer Accounts to Block Malware

Last year Google banned 173,000 developer accounts and prevented 1.5 million apps from reaching the Play Store as it fought policy violations and malware. This article has been indexed from Dark Reading Read the original article: Google Bans Thousands of…