Category: Dark Reading

Cyberattacks on Kenya Drop in Third Quarter

National response team attributes reduction to a cyber workforce with better training. This article has been indexed from Dark Reading Read the original article: Cyberattacks on Kenya Drop in Third Quarter

Strengthening Oman’s Economic Backbone

Creating a new regulatory framework to better secure Oman’s banking system against future attacks. This article has been indexed from Dark Reading Read the original article: Strengthening Oman’s Economic Backbone

It’s Time to Establish the NATO of Cybersecurity

Cybercriminals already operate across borders. Nations must do the same to protect their critical infrastructure, people, and technology from threats foreign and domestic. This article has been indexed from Dark Reading Read the original article: It’s Time to Establish the…

Valve’s 2FA Mandate for Game Developers Shows SMS Stickiness

Despite warnings that sending one-time passwords via text messages is a flawed security measure, companies continue to roll out the approach, especially in consumer-facing applications. This article has been indexed from Dark Reading Read the original article: Valve’s 2FA Mandate…

City of Philadelphia Releases Cyber-Breach Notice

The investigation is ongoing, and the city will contact those who may have potentially been affected by the breach, it said. This article has been indexed from Dark Reading Read the original article: City of Philadelphia Releases Cyber-Breach Notice

Ragnar Locker Ransomware Boss Arrested in Paris

Cops track down ransomware developer and seize Ragnar Locker infrastructure and data-leak site, Europol says. This article has been indexed from Dark Reading Read the original article: Ragnar Locker Ransomware Boss Arrested in Paris

Freelance Market Flooded With North Korean IT Actors

US DoJ: Beware of hiring freelance and temporary workers that could be operatives working to funnel money to North Korea’s WMD program. This article has been indexed from Dark Reading Read the original article: Freelance Market Flooded With North Korean…

More Okta Customers Hacked

Attackers compromised customer support files containing cookies and session tokens, which could result in malicious impersonation of valid Okta users. This article has been indexed from Dark Reading Read the original article: More Okta Customers Hacked

DoD Gets Closer to Nominating Cyber Policy Chief

Though there is speculation regarding potential candidates, the Department of Defense will likely not nominate someone in the near term. This article has been indexed from Dark Reading Read the original article: DoD Gets Closer to Nominating Cyber Policy Chief

SIM Card Ownership Slashed in Burkina Faso

Users could hold up to five SIM cards previously, but now they can only have two; it’s a move that the government says is intended to cut down mobile spam levels. This article has been indexed from Dark Reading Read…

23AndMe Hacker Leaks New Tranche of Stolen Data

Two weeks after the first data leak from the DNA ancestry service, the threat actor produces an additional 4 million user records they purportedly stole. This article has been indexed from Dark Reading Read the original article: 23AndMe Hacker Leaks…

Tips for a Successful SecOps Game Plan

Dark Reading’s special report on SecOps data analytics looks at the elements needed to set up a proper data foundation. Getting the data right when collecting, aggregating, and analyzing it is essential. This article has been indexed from Dark Reading…

Tips for a Successful SecOps Gameplan

Dark Reading’s special report on SecOps data analytics looks at the elements needed to set up a proper data foundation. Getting the data right when collecting, aggregating, and analyzing it is essential. This article has been indexed from Dark Reading…

Patch Now: APTs Continue to Pummel WinRAR Bug

State-sponsored cyber espionage actors from Russia and China continue to target WinRAR users with various info-stealing and backdoor malware, as a patching lag plagues the software’s footprint. This article has been indexed from Dark Reading Read the original article: Patch…

Iran-Linked ‘MuddyWater’ Spies on Mideast Gov’t for 8 Months

The state-sponsored threat actors (aka APT34, Crambus, Helix Kitten, or OilRig) spent months seemingly taking whatever government data they wished, using never-before-seen tools. This article has been indexed from Dark Reading Read the original article: Iran-Linked ‘MuddyWater’ Spies on Mideast…

EPA Turns Off Taps on Water Utility Cyber Regulations

Facing a potential cascade of legal challenges from industry groups and state attorneys general, the EPA has rescinded its cyber-rules. But where does that leave local water safety? This article has been indexed from Dark Reading Read the original article:…

The Need for a Cybersecurity-Centric Business Culture

Building a culture of cybersecurity is achievable by acknowledging its importance and consistently reinforcing that message. This article has been indexed from Dark Reading Read the original article: The Need for a Cybersecurity-Centric Business Culture

Data Security and Collaboration in the Modern Enterprise

The CISO Survival Guide explores the complex and shifting challenges, perceptions, and innovations that will shape how organizations securely expand in the future. This article has been indexed from Dark Reading Read the original article: Data Security and Collaboration in…

Amazon Quietly Wades Into the Passkey Waters

The move by the e-commerce kahuna to offer advanced authentication to its 300+ million users has the potential to move the needle on the technology’s adoption, security experts say. This article has been indexed from Dark Reading Read the original…

5 Ways Hospitals Can Help Improve Their IoT Security

HIPAA compliance does not equal security, as continuing attacks on healthcare organizations show. Medical devices need to be secured. This article has been indexed from Dark Reading Read the original article: 5 Ways Hospitals Can Help Improve Their IoT Security

Security Must Empower AI Developers Now

Enterprises need to create a secure structure for tracking, assessing, and monitoring their growing stable of AI business apps. This article has been indexed from Dark Reading Read the original article: Security Must Empower AI Developers Now

Malicious ‘Airstrike Alert’ App Targets Israelis

A spoofed version of the popular RedAlert app collects sensitive user data on Israeli citizens, including contacts, call logs, SMS account details, and more. This article has been indexed from Dark Reading Read the original article: Malicious ‘Airstrike Alert’ App…

Critical, Unpatched Cisco Zero-Day Bug Is Under Active Exploit

No patch or workaround is currently available for the maximum severity flaw, which allows attackers to gain complete administrator privilege on affected devices remotely and without authentication. This article has been indexed from Dark Reading Read the original article: Critical,…

‘RomCom’ Cyber Campaign Targets Women Political Leaders

A threat group known as “Void Rabisu” used a spoofed Women Political Leaders Summit website to target attendees to the actual conference with espionage malware. This article has been indexed from Dark Reading Read the original article: ‘RomCom’ Cyber Campaign…

Name That Toon: Modern Monarchy

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Toon: Modern Monarchy

How Data Changes the Cyber-Insurance Market Outlook

By using data to drive policy underwriting, cyber-insurance companies can offer coverage without a price tag that drives customers away. This article has been indexed from Dark Reading Read the original article: How Data Changes the Cyber-Insurance Market Outlook

3 Essential Steps to Strengthen SaaS Security

SaaS security is broad, possibly confusing, but undeniably crucial. Make sure you have the basics in place: discovery, risk assessment, and user access management. This article has been indexed from Dark Reading Read the original article: 3 Essential Steps to…

How MOVEit Is Likely to Shift Cyber Insurance Calculus

Progress Software plans to collect millions in cyber insurance policy payouts after the MOVEit breaches, which will make getting coverage more expensive and harder to get for everyone else, experts say. This article has been indexed from Dark Reading Read…

Microsoft Debuts AI Bug-Bounty Program, Offers $15K

The goal of the program is to uncover critical or important vulnerabilities within the AI-powered Bing program. This article has been indexed from Dark Reading Read the original article: Microsoft Debuts AI Bug-Bounty Program, Offers $15K

Uber’s Ex-CISO Appeals Conviction Over 2016 Data Breach

Joe Sullivan’s lawyers have claimed his conviction on two felony charges is based on tenuous theories and criminalizes the use of bug bounty programs. This article has been indexed from Dark Reading Read the original article: Uber’s Ex-CISO Appeals Conviction…

Curl Bug Hype Fizzles After Patching Reveal

Touted for days as potentially catastrophic, the curl flaws only impact a narrow set of deployments. This article has been indexed from Dark Reading Read the original article: Curl Bug Hype Fizzles After Patching Reveal

Gaza Conflict: How Israeli Cybersecurity Will Respond

The Israeli-Hamas war will most assuredly impact businesses when it comes to ramped-up cyberattacks. Experts say that Israel’s considerable collection of cybersecurity vendors be a major asset on the cyber-front. This article has been indexed from Dark Reading Read the…

Magecart Campaign Hijacks 404 Pages to Steal Data

The novel technique helps hide the cybercriminal campaign’s efforts to steal credit card information from visitors to major websites, and it represents an evolution for Magecart. This article has been indexed from Dark Reading Read the original article: Magecart Campaign…