Category: Dark Reading

Ermetic Adds Kubernetes Security to CNAPP

The automated capabilities can discover misconfigurations, compliance violations, and risk or excessive privileges in Kubernetes clusters. This article has been indexed from Dark Reading Read the original article: Ermetic Adds Kubernetes Security to CNAPP

Linux Support Expands Cyber Spy Group’s Arsenal

An infamous Chinese cyber-hacking team has extended its SysUpdate malware framework to target Linux systems. This article has been indexed from Dark Reading Read the original article: Linux Support Expands Cyber Spy Group’s Arsenal

The Importance of Recession-Proofing Security Operations

Make sure cybersecurity is taken seriously and consistently across the board. Educate the ecosystem beyond your own organization to mitigate security risks for everyone. This article has been indexed from Dark Reading Read the original article: The Importance of Recession-Proofing…

Cyberattackers Double Down on Bypassing MFA

As companies increasingly adopt MFA (even as companies like Twitter disable it), cybercriminals are developing a variety of strategies to steal credentials and gain access to high-value accounts anyway. This article has been indexed from Dark Reading Read the original…

CISA: ZK Java Framework RCE Flaw Under Active Exploit

The flaw, which drew attention in October when it was found in ConnectWise products, could pose a significant risk to the supply chain if not patched immediately. This article has been indexed from Dark Reading Read the original article: CISA:…

Without FIDO2, MFA Falls Short

The open authentication standard addresses existing multifactor authentication security vulnerabilities. This article has been indexed from Dark Reading Read the original article: Without FIDO2, MFA Falls Short

Google Adds Client-Side Encryption to Gmail, Calendar

The data protection capability is now available across multiple Workspace applications: Gmail, Calendar, Drive, Docs, Slides, Sheets, and Meet. This article has been indexed from Dark Reading Read the original article: Google Adds Client-Side Encryption to Gmail, Calendar

US Marshals Ransomware Hit Is ‘Major’ Incident

Unknown attackers made off with a raft of PII, the Justice Department says — but witnesses in the protection program are still safe. This article has been indexed from Dark Reading Read the original article: US Marshals Ransomware Hit Is…

WannaCry Hero & Kronos Malware Author Named Cybrary Fellow

Marcus Hutchins, who set up a “kill switch” that stopped WannaCry’s spread, later pled guilty to creating the infamous Kronos banking malware. This article has been indexed from Dark Reading Read the original article: WannaCry Hero & Kronos Malware Author…

All CVEs Are Not Created Equal

Vulnerabilities impact each industry differently, so each sector needs to think about its defenses and vulnerability management differently. This article has been indexed from Dark Reading Read the original article: All CVEs Are Not Created Equal

How to Reduce Code Risk Using Pipelineless Security

The exposure and exploitation of hardcoded secrets continues to drive software supply chain attacks. One solution: zero new hardcoded secrets. This article has been indexed from Dark Reading Read the original article: How to Reduce Code Risk Using Pipelineless Security

Mobile Banking Trojans Surge, Doubling in Volume

Mobile malware developers were busy bees in 2022, flooding the cybercrime landscape with twice the number of banking trojans than the year before. This article has been indexed from Dark Reading Read the original article: Mobile Banking Trojans Surge, Doubling…

Tackling Software Supply Chain Issues With CNAPP

The cloud-native application protection platform market is expanding as security teams look to protect their applications and the software supply chain. This article has been indexed from Dark Reading Read the original article: Tackling Software Supply Chain Issues With CNAPP

Student Medical Records Exposed After LAUSD Breach

“Hundreds” of special education students’ psych records have turned up on the Dark Web. School records like these are covered by FERPA, not HIPAA, so parents have little recourse. This article has been indexed from Dark Reading Read the original…

Generative AI Changes Everything We Know About Cyberattacks

Generative AI is heating up everywhere and fundamentally changing everything we know about how cybercriminals develop and deploy attacks. This article has been indexed from Dark Reading Read the original article: Generative AI Changes Everything We Know About Cyberattacks

Wiper Malware Surges Ahead, Spiking 53% in 3 Months

Cybercriminals and hacktivists have joined state-backed actors in using sabotage-bent malware in destructive attacks, new report shows. This article has been indexed from Dark Reading Read the original article: Wiper Malware Surges Ahead, Spiking 53% in 3 Months

(ISC)² Opens Security Congress 2023 Call for Presentations

(ISC)2 members and cybersecurity professionals worldwide are encouraged to share their expertise, best practices and experiences with their peers and career hopefuls. This article has been indexed from Dark Reading Read the original article: (ISC)² Opens Security Congress 2023 Call…

Top Takeaways From CloudNativeSecurityCon 2023

CloudNativeSecurityCon North America 2023 was a vendor-neutral cloud-native security conference. Here’s why it was important. This article has been indexed from Dark Reading Read the original article: Top Takeaways From CloudNativeSecurityCon 2023

Scammers Mimic ChatGPT to Steal Business Credentials

Hackers will take anything newsworthy and turn it against you, including the world’s most advanced AI-enabled chatbot. This article has been indexed from Dark Reading Read the original article: Scammers Mimic ChatGPT to Steal Business Credentials

UL Solutions Advances Automotive Safety and Security

A combined team of UL Solutions safety science experts will address automotive cybersecurity, functional safety, automated driving and software development processes to help customers bring safer, more secure innovations to market. This article has been indexed from Dark Reading Read…

1 in 4 CISOs Wants to Say Sayonara to Security

Thanks to burnout and stress, Gartner predicts churn and even departure from profession among half of today’s security leaders by 2025. This article has been indexed from Dark Reading Read the original article: 1 in 4 CISOs Wants to Say…

US Military Emails Exposed via Cloud Account

A DoD email server hosted in the cloud (and now secured) had no password protection in place for at least two weeks. This article has been indexed from Dark Reading Read the original article: US Military Emails Exposed via Cloud…

Google Delivers Record-Breaking $12M in Bug Bounties

Google’s Android and Chrome Vulnerability Reward Programs (VRPs) in particular saw hundreds of valid reports and payouts for security vulnerabilities discovered by ethical hackers. This article has been indexed from Dark Reading Read the original article: Google Delivers Record-Breaking $12M…

Phishing Fears Ramp Up on Email, Collaboration Platforms

It’s a banner year for attacks coming through traditional email as well as newer collaboration technologies, such as Slack and Microsoft Teams. What’s next? This article has been indexed from Dark Reading Read the original article: Phishing Fears Ramp Up…

Exploit Code Released for Critical Fortinet RCE Bug

Organizations are urged to update to the latest versions of FortiNAC to patch a flaw that allows unauthenticated attackers to write arbitrary files on the system. This article has been indexed from Dark Reading Read the original article: Exploit Code…

4 Tips to Guard Against DDoS Attacks

Attackers are now using multiple types of distributed denial-of-service (DDoS) attacks to take down sites. Here are some ways to defend and protect. This article has been indexed from Dark Reading Read the original article: 4 Tips to Guard Against…

Cyberthreats, Regulations Mount for Financial Industry

Nation-state adversaries, new reporting regulations, and a fast-paced threat landscape mean that financial services and technology firms need to bolster their security posture. This article has been indexed from Dark Reading Read the original article: Cyberthreats, Regulations Mount for Financial…

Name That Toon: Join the Club

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Toon: Join the Club

Insider Threats Don’t Mean Insiders Are Threatening

By implementing tools that enable internal users to do their jobs efficiently and securely, companies reduce insider threat risk by building insider trust. This article has been indexed from Dark Reading Read the original article: Insider Threats Don’t Mean Insiders…

Modern Software: What’s Really Inside?

Open source has changed the software game from build or buy to assemble with care. This article has been indexed from Dark Reading Read the original article: Modern Software: What’s Really Inside?

Majority of Ransomware Attacks Last Year Exploited Old Bugs

New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access to data theft. This article has been indexed from Dark Reading Read the original article: Majority of Ransomware Attacks Last…

Is OWASP at Risk of Irrelevance?

A growing group of OWASP members and board leaders are calling for the AppSec group to make big changes to stay apace with modern development. This article has been indexed from Dark Reading Read the original article: Is OWASP at…