Category: Dark Reading

Massive Adware Campaign Shuttered

Mainly Apple iOS in-app ads were targeted, injecting malicious JavaScript code to rack up phony views. This article has been indexed from Dark Reading Read the original article: Massive Adware Campaign Shuttered

Shift Identity Left: Preventing Identity-Based Breaches

Traditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches. This article has been indexed from Dark Reading Read the original article: Shift Identity Left: Preventing…

Name That Toon: Poker Hand

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Toon: Poker Hand

Ethically Exploiting Vulnerabilities: A Play-by-Play

There’s a fine line between a hacker and an attacker, but it pays to be proactive. Consider tests by ethical hackers, a red team, or pen testers, and then bolster your company’s defenses against malicious attacks. This article has been…

Cybercriminals Target Telecom Provider Networks

The growing use of mobile devices for MFA and the proliferation of 5G and VoIP in general could result in more attacks in future, experts say. This article has been indexed from Dark Reading Read the original article: Cybercriminals Target…

Vulnerable Historian Servers Imperil OT Networks

These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks. This article has been indexed from Dark Reading Read the original article: Vulnerable Historian Servers Imperil OT Networks

Governance in the Cloud Shifts Left

CISOs’ top cloud challenge is harmonizing standards, policies, and procedures across blended environments. This article has been indexed from Dark Reading Read the original article: Governance in the Cloud Shifts Left

Cybersecurity and the Myth of Quiet Quitting

People are working harder than ever, but they’re not happy about it — and the insider threat is all too real. This article has been indexed from Dark Reading Read the original article: Cybersecurity and the Myth of Quiet Quitting

Okta Expands No-Code Offerings for Identity Cloud

With Actions Integrations, Okta is expanding its no-code offerings to help administrators manage and customize their identity workflow. This article has been indexed from Dark Reading Read the original article: Okta Expands No-Code Offerings for Identity Cloud

Why Businesses Need to Think Like Hackers This Year

Security professionals must update their skill sets and be proactive to stay ahead of cybercriminals. It’s time to learn to think and act like an attacker to cope with the cyber “new normal.” This article has been indexed from Dark…

3 Lessons Learned in Vulnerability Management

In 2022, multiple high-profile vulnerabilities like Log4j and OpenSSL provided important takeaways for future public reporting. This article has been indexed from Dark Reading Read the original article: 3 Lessons Learned in Vulnerability Management

5 Cybersecurity Tips for Higher Education Institutions

Following these basic cybersecurity hygiene policies can help make data more secure and protect colleges and universities from becoming the next ransomware headline. The steps aren’t complicated, and they won’t break the bank. This article has been indexed from Dark…

Malware Comes Standard With This Android TV Box on Amazon

The bargain T95 Android TV device was delivered with preinstalled malware, adding to a trend of Droid devices coming out-of-the-box tainted. This article has been indexed from Dark Reading Read the original article: Malware Comes Standard With This Android TV…

Fast-Track Secure Development Using Lite Threat Modeling

Establish clear and consistent processes and standards to scale lite threat modeling’s streamlined approach across your organization. This article has been indexed from Dark Reading Read the original article: Fast-Track Secure Development Using Lite Threat Modeling

Software Supply Chain Security Needs a Bigger Picture

SBOMs aren’t enough. OpenSSF’s Alpha-Omega brings in new blood to help secure the open source projects most impactful to the software supply chain. This article has been indexed from Dark Reading Read the original article: Software Supply Chain Security Needs…

Cloudflare Expands Relationship With Microsoft

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Cloudflare Expands Relationship With Microsoft

Kubernetes-Related Security Projects to Watch in 2023

Organizations must be vigilant about balancing performance gains with security, governance, and compliance as they expand their use of Kubernetes. This article has been indexed from Dark Reading Read the original article: Kubernetes-Related Security Projects to Watch in 2023

Use CircleCI? Here Are 3 Steps You Need to Take

This Tech Tip outlines the steps enterprise defenders should take as they protect their data in cloud environments in response to the security incident with the CI/CD platform. This article has been indexed from Dark Reading Read the original article:…

Governance in the Cloud Shifts Left

CISOs’ top cloud challenge is harmonizing standards, policies, and procedures across blended environments. This article has been indexed from Dark Reading Read the original article: Governance in the Cloud Shifts Left

Infoblox Appoints Scott Harrell to CEO

Jesper Andersen has decided to retire and will continue to serve on the Board of Directors. This article has been indexed from Dark Reading Read the original article: Infoblox Appoints Scott Harrell to CEO

Security Planning: Ask What Could Go Wrong

Are you asking the right questions about potential scenarios when thinking about disaster recovery and business continuity? This article has been indexed from Dark Reading Read the original article: Security Planning: Ask What Could Go Wrong

SCOTUS OKs WhatsApp Suit Against NSO Group

Supreme Court rules WhatsApp can sue NSO Group for damages caused by unauthorized Pegasus spyware installations. This article has been indexed from Dark Reading Read the original article: SCOTUS OKs WhatsApp Suit Against NSO Group

San Fran’s BART Investigates Vice Society Data Breach Claims

Vice Society is boasting that it compromised the San Francisco transportation system, while BART maintains operations and mounts an investigation. This article has been indexed from Dark Reading Read the original article: San Fran’s BART Investigates Vice Society Data Breach…

Quantum Decryption Breakthrough? Not So Fast

A paper by two dozen Chinese researchers maintains that near-future quantum computers could crack RSA-2048 encryption, but experts call the claims misleading. This article has been indexed from Dark Reading Read the original article: Quantum Decryption Breakthrough? Not So Fast

Microsoft: Kinsing Targets Kubernetes via Containers, PostgreSQL

The cryptomining malware, which typically targets Linux, is exploiting weaknesses in an open source container tool for initial access to cloud environments. This article has been indexed from Dark Reading Read the original article: Microsoft: Kinsing Targets Kubernetes via Containers,…

NetSPI Acquires nVisium

nVisium’s cloud and application security experts join NetSPI to support, scale, and deliver the most comprehensive suite of offensive security solutions. This article has been indexed from Dark Reading Read the original article: NetSPI Acquires nVisium

Serbia Slammed With DDoS Attacks

The Serbian government reports that it staved off five attacks aimed at crippling Serbian infrastructure. This article has been indexed from Dark Reading Read the original article: Serbia Slammed With DDoS Attacks