Category: Dark Reading

Cyber Hygiene: A First Line of Defense Against Evolving Cyberattacks

Back to basics is a good start, but too often security teams don’t handle their deployment correctly. Here’s how to avoid the common pitfalls. This article has been indexed from Dark Reading Read the original article: Cyber Hygiene: A First…

Don’t Get Burned by CAPTCHAs: A Recipe for Accurate Bot Protection

Traditional CAPTCHAs, such as reCAPTCHA, no longer protect online businesses adequately. Real users hate them. Bots bypass them. It’s time to upgrade. This article has been indexed from Dark Reading Read the original article: Don’t Get Burned by CAPTCHAs: A…

Latest Acquisition Powers AI-based Network Detection and Response and Open XDR Capabilities for WatchGuard

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Latest Acquisition Powers AI-based Network Detection and Response and Open XDR…

Wing Security Launches Compliance-Grade SaaS Security Solution for Just $1.5K

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Wing Security Launches Compliance-Grade SaaS Security Solution for Just $1.5K

ClassLink Provides Cybersecurity Training Course to Help Schools Protect Public Directory Data

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: ClassLink Provides Cybersecurity Training Course to Help Schools Protect Public Directory…

Recast Software Acquires Liquit, Consolidating the Endpoint and Application Management Markets

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Recast Software Acquires Liquit, Consolidating the Endpoint and Application Management Markets

ASPM Is Good, But It’s Not a Cure-All for App Security

What application security posture management does, it does well. But you’ll still need to fill in some holes, especially concerning API security. This article has been indexed from Dark Reading Read the original article: ASPM Is Good, But It’s Not…

Guardians of the Cyberverse: Building a Resilient Security Culture

Whether achieved through AI-enabled automation, proactive identification and resolution of issues, or the equitable distribution of risk management responsibilities, the goal must be resilience. This article has been indexed from Dark Reading Read the original article: Guardians of the Cyberverse:…

Cisco Moves Into SIEM With $28B Deal to Acquire Splunk

Cisco’s surprise agreement could reshape secure information and event management (SIEM) and extended detection and response (XDR) markets. This article has been indexed from Dark Reading Read the original article: Cisco Moves Into SIEM With $28B Deal to Acquire Splunk

Cisco Moves into SIEM with $28B Deal to Acquire Splunk

Cisco’s surprise agreement could reshape secure information and event management (SIEM) and extended detection and response (XDR) markets. This article has been indexed from Dark Reading Read the original article: Cisco Moves into SIEM with $28B Deal to Acquire Splunk

Mysterious ‘Sandman’ APT Targets Telecom Sector With Novel Backdoor

The Sandman group’s main malware is among the very few that use the Lua scripting language and its just-in-time compiler. This article has been indexed from Dark Reading Read the original article: Mysterious ‘Sandman’ APT Targets Telecom Sector With Novel…

Salvador Technologies Wins Funding for $2.2M Cybersecurity Project From BIRD Foundation

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Salvador Technologies Wins Funding for $2.2M Cybersecurity Project From BIRD Foundation

‘Gold Melody’ Access Broker Plays on Unpatched Servers’ Strings

A financially motivated threat actor uses known vulnerabilities, ordinary TTPs, and off-the-shelf tools to exploit the unprepared, highlighting the fact that many organizations still don’t focus on the security basics. This article has been indexed from Dark Reading Read the…

OPSWAT-Sponsored SANS 2023 ICS/OT Cybersecurity Report Reveals Vital Priorities to Mitigate Ongoing Threats

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: OPSWAT-Sponsored SANS 2023 ICS/OT Cybersecurity Report Reveals Vital Priorities to Mitigate…

BBTok Banking Trojan Impersonates 40+ Banks to Hijack Victim Accounts

Attackers use convincing fake website interfaces and sophisticated geo-fencing to target users exclusively in Mexico and Brazil with a new variant of the malware. This article has been indexed from Dark Reading Read the original article: BBTok Banking Trojan Impersonates…

Mastering Defense-In-Depth and Data Security in the Cloud Era

Though widely used in many organizations, the concept still requires adaptation when aimed at protecting against new types of attacks. This article has been indexed from Dark Reading Read the original article: Mastering Defense-In-Depth and Data Security in the Cloud…

Understanding the Differences Between On-Premises and Cloud Cybersecurity

The nature of cloud environments means security and technical teams need a different mindset to understand and manage their new attack surface. This article has been indexed from Dark Reading Read the original article: Understanding the Differences Between On-Premises and…

FBI, CISA Issue Joint Warning on ‘Snatch’ Ransomware-as-a-Service

The group’s use of malware that forces Windows computers to reboot into Safe Mode before encrypting files is noteworthy, advisory says. This article has been indexed from Dark Reading Read the original article: FBI, CISA Issue Joint Warning on ‘Snatch’…

Fake WinRAR PoC Exploit Conceals VenomRAT Malware

A supposed exploit for a notable RCE vulnerability in the popular Windows file-archiving utility delivers a big sting for unwitting researchers and cybercriminals. This article has been indexed from Dark Reading Read the original article: Fake WinRAR PoC Exploit Conceals…

OneLayer Expands Its Private Cellular Network Security Solutions to Operations and Asset Management

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: OneLayer Expands Its Private Cellular Network Security Solutions to Operations and…

Dig Security Enhances DSPM Platform to Secure Enterprise Data in On-Prem, File-Share Environments

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Dig Security Enhances DSPM Platform to Secure Enterprise Data in On-Prem,…

‘Culturestreak’ Malware Lurks Inside GitLab Python Package

The GitLab code hijacks computer resources to mine Dero cryptocurrency as part of a larger cryptomining operation. This article has been indexed from Dark Reading Read the original article: ‘Culturestreak’ Malware Lurks Inside GitLab Python Package

Changing Role of the CISO: A Holistic Approach Drives the Future

The CISO’s role has grown far beyond supervising Patch Tuesday to focus on prevention and response and to cover people, processes, and technology. This article has been indexed from Dark Reading Read the original article: Changing Role of the CISO:…

Pro-Iranian Attackers Target Israeli Railroad Network

The group known as “Cyber Avengers” has targeted other Israeli services in the past and often publishes technical details of its hits. This article has been indexed from Dark Reading Read the original article: Pro-Iranian Attackers Target Israeli Railroad Network

Companies Rely on Multiple Methods to Secure Generative AI Tools

To protect their own and their customers’ data, organizations are exploring different approaches to guard against unwanted effects of using AI. This article has been indexed from Dark Reading Read the original article: Companies Rely on Multiple Methods to Secure…

China-Linked Actor Taps Linux Backdoor in Forceful Espionage Campaign

“SprySOCKS” melds features from multiple previously known badware and adds to the threat actor’s growing malware arsenal, Trend Micro says. This article has been indexed from Dark Reading Read the original article: China-Linked Actor Taps Linux Backdoor in Forceful Espionage…

MGM, Caesars Face Regulatory, Legal Maze After Cyber Incidents

MGM and Caesars are putting new SEC incident disclosure regulations to a real-world test in the aftermath of twin cyberattacks on the casinos, as class-action lawsuits loom. This article has been indexed from Dark Reading Read the original article: MGM,…

Clorox Sees Product Shortages Amid Cyberattack Cleanup

Everyone’s favorite pandemic-era brand is experiencing store shortages in the wake of a cyberattack that impacted its global production lines — and there’s no timeline for normal operations to resume. This article has been indexed from Dark Reading Read the…

CapraRAT Impersonates YouTube to Hijack Android Devices

Pakistani threat group Transparent Tribe targets military and diplomatic personnel in India and Pakistan with romance-themed lures in the latest spyware campaign. This article has been indexed from Dark Reading Read the original article: CapraRAT Impersonates YouTube to Hijack Android…

‘ShroudedSnooper’ Backdoors Use Ultra-Stealth in Mideast Telecom Attacks

The threat cluster hasn’t been seen before, but its custom Windows server backdoors have researchers intrigued thanks to their extremely effective stealth mechanisms. This article has been indexed from Dark Reading Read the original article: ‘ShroudedSnooper’ Backdoors Use Ultra-Stealth in…

Omdia Research Finds Risk-Based Vulnerability Management Set to Encompass the Vulnerability Management Market by 2027

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Omdia Research Finds Risk-Based Vulnerability Management Set to Encompass the Vulnerability…

Niagara Networks and Scope Middle East Announce Strategic VAD Partnership

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Niagara Networks and Scope Middle East Announce Strategic VAD Partnership

Payment Card-Skimming Campaign Now Targeting Websites in North America

“Silent Skimmer” is a technically complex campaign that has successfully targeted online businesses in the Asia Pacific region for over a year. This article has been indexed from Dark Reading Read the original article: Payment Card-Skimming Campaign Now Targeting Websites…

Microsoft Azure Data Leak Exposes Dangers of File-Sharing Links

Shared Access Signature (SAS) link exposed a storage bucket with 38TB of private data, including passwords, Teams messages, and the backups of two Microsoft AI research employees’ workstations. This article has been indexed from Dark Reading Read the original article:…

Companies Explore Ways to Safeguard Data in the Age of LLMs

Generative AI models are forcing companies to become creative in how they keep employees from giving away sensitive data. This article has been indexed from Dark Reading Read the original article: Companies Explore Ways to Safeguard Data in the Age…

How to Get Your Board on Board With Cybersecurity

CISOs can refine their soft skills to help get their cybersecurity best-practices message across. Steps include increasing staff incident-response training and staying current with the threat landscape. This article has been indexed from Dark Reading Read the original article: How…

Evaluating New Partners and Vendors From an Identity Security Perspective

Before working with new vendors, it’s important to understand the potential risks they may pose to your digital environments. This article has been indexed from Dark Reading Read the original article: Evaluating New Partners and Vendors From an Identity Security…

DoD: China’s ICS Cyber Onslaught Aimed at Gaining Kinetic Warfare Advantage

Escalating incursions into military base infrastructure, telecom networks, utilities, and more signal that Beijing is laying the groundwork for mass disruption. This article has been indexed from Dark Reading Read the original article: DoD: China’s ICS Cyber Onslaught Aimed at…

Microsoft Flushes Out ‘Ncurses’ Gremlins

The maintainers of the widely used library recently patched multiple memory corruption vulnerabilities that attackers could have abused to, ahem, curse targets with malicious code and escalate privileges. This article has been indexed from Dark Reading Read the original article:…

CISO Global Deepens Capabilities With Integrated Threat Intelligence Feed

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: CISO Global Deepens Capabilities With Integrated Threat Intelligence Feed

Enea Qosmos Threat Detection SDK Launched to Boost the Performance of Network-Based Cybersecurity

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Enea Qosmos Threat Detection SDK Launched to Boost the Performance of…

Okta Flaw Involved in MGM Resorts Breach, Attackers Claim

ALPHV/BlackCat ransomware operators have used their leak site to “set the record straight” about the MGM Resorts cyberattack. Meanwhile, more attacks abusing Okta could be likely. This article has been indexed from Dark Reading Read the original article: Okta Flaw…

Armis Launches Armis Centrix™, the AI-powered Cyber Exposure Management Platform

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Armis Launches Armis Centrix™, the AI-powered Cyber Exposure Management Platform

Greater Manchester Police Hack Follows Third-Party Supplier Fumble

This incident bears notable resemblance to an attack that occurred just last month affecting London’s Metropolitan Police, raising concerns over UK cybersecurity safeguards for public safety. This article has been indexed from Dark Reading Read the original article: Greater Manchester…

Microsoft: ‘Peach Sandstorm’ Cyberattacks Target Defense, Pharmaceutical Orgs

For months, the Iran-backed APT has carried out waves of password spray attacks attempting to authenticate to thousands of environments across multiple targets worldwide. This article has been indexed from Dark Reading Read the original article: Microsoft: ‘Peach Sandstorm’ Cyberattacks…

NCSC: Why Cyber Extortion Attacks No Longer Require Ransomware

Ransomware becoming less of a factor as threat actors extort businesses with payment options that are less than regulatory fines. This article has been indexed from Dark Reading Read the original article: NCSC: Why Cyber Extortion Attacks No Longer Require…

How to Mitigate Cybersecurity Risks From Misguided Trust

Trust is the crucial bridge between security and people, but excessive or misguided trust can pose serious security risks. This article has been indexed from Dark Reading Read the original article: How to Mitigate Cybersecurity Risks From Misguided Trust

Why Identity Management Is the Key to Stopping APT Cyberattacks

Dark Reading News Desk: CrowdStrike’s Adam Meyers talks China, Iran, Russia, and more in this expert dive into the current APT threat actor landscape. This article has been indexed from Dark Reading Read the original article: Why Identity Management Is…

Zero-Click iPhone Exploit Drops Pegasus Spyware on Exiled Russian Journalist

The exploit is one of many that government and intelligence agencies have to infect target devices with the notorious surveillance tool. This article has been indexed from Dark Reading Read the original article: Zero-Click iPhone Exploit Drops Pegasus Spyware on…

Microsoft Teams Hacks Are Back, As Storm-0324 Embraces TeamsPhisher

Collaboration apps are a boost to business productivity, but also a uniquely attractive target for cyberattackers. This article has been indexed from Dark Reading Read the original article: Microsoft Teams Hacks Are Back, As Storm-0324 Embraces TeamsPhisher

Stealer Thugs Behind RedLine & Vidar Pivot to Ransomware

In a notable shift in strategy, the threat actors are abusing code-signing certificates to spread a double whammy of infostealers and ransomware payloads. This article has been indexed from Dark Reading Read the original article: Stealer Thugs Behind RedLine &…

Cuba Ransomware Gang Continues to Evolve With Dangerous Backdoor

The Russian-speaking ransomware gang continues to update its tactics while managing to steal highly sensitive information from its victims. This article has been indexed from Dark Reading Read the original article: Cuba Ransomware Gang Continues to Evolve With Dangerous Backdoor

Mideast Retailers Dogged by Scam Facebook Pages Offering ‘Investment’ Opportunities

Around 900 pages were identified as using Arabic language and familiar brand names to snare users and steal their money and personal details — presenting big brand protection issues for retailers. This article has been indexed from Dark Reading Read…

Professional Sports: The Next Frontier of Cybersecurity?

Sports teams, major leagues, global sporting associations, and entertainment venues are all home to valuable personal and business data. Here’s how to keep them safe. This article has been indexed from Dark Reading Read the original article: Professional Sports: The…

‘Scattered Spider’ Behind MGM Cyberattack, Targets Casinos

The ransomware group is a collection of young adults, and also recently breached Caesars Entertainment and made a ransom score in the tens of millions range. This article has been indexed from Dark Reading Read the original article: ‘Scattered Spider’…

Claroty Unveils Vulnerability & Risk Management Capabilities to Elevate Risk Reduction for Cyber-Physical Systems

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Claroty Unveils Vulnerability & Risk Management Capabilities to Elevate Risk Reduction…

Kubernetes Admins Warned to Patch Clusters Against New RCE Vulns

All Windows endpoints within a vulnerable Kubernetes cluster are open to command injection attacks, new research finds. This article has been indexed from Dark Reading Read the original article: Kubernetes Admins Warned to Patch Clusters Against New RCE Vulns

Microsoft Azure HDInsight Plagued With XSS Vulnerabilities

To boot, the technology could be riddled with other flaws via its Apache services components, a security vendor says. This article has been indexed from Dark Reading Read the original article: Microsoft Azure HDInsight Plagued With XSS Vulnerabilities

Federal Mandates on Medical-Device Cybersecurity Get Serious

In October, the US Food and Drug Administration will start rejecting medical devices that lack a secure design or a post-market cybersecurity plan. This article has been indexed from Dark Reading Read the original article: Federal Mandates on Medical-Device Cybersecurity…

When LockBit Ransomware Fails, Attackers Deploy Brand-New ‘3AM’

Nothing good happens after 2 a.m., they say, especially when hackers have two kinds of ransomware at their disposal. This article has been indexed from Dark Reading Read the original article: When LockBit Ransomware Fails, Attackers Deploy Brand-New ‘3AM’

A 2-Week Prescription for Eliminating Supply Chain Threats

Giving users time to detect and then update hijacked packages can help developers avoid using malicious code in software development. This article has been indexed from Dark Reading Read the original article: A 2-Week Prescription for Eliminating Supply Chain Threats

Cybersecurity Skills Gap: Roadies & Gamers Are Untapped Talent

Gamers and former sound engineers and roadies can help boost the cybersecurity talent pool. Their flexible mindset and attention to detail make them valuable resources. This article has been indexed from Dark Reading Read the original article: Cybersecurity Skills Gap:…

Recent Rhysida Attacks Show Focus on Healthcare By Ransomware Actors

The operators of the Rhysida ransomware-as-a-service have claimed credit for a crippling attack on Mississippi’s Singing River health system. This article has been indexed from Dark Reading Read the original article: Recent Rhysida Attacks Show Focus on Healthcare By Ransomware…

Microsoft Patches a Pair of Actively Exploited Zero-Days

Five critical bugs, zero-days exploited in the wild, Exchange Server, and more headline Microsoft’s September 2023 Patch Tuesday release. Here’s what to patch now. This article has been indexed from Dark Reading Read the original article: Microsoft Patches a Pair…

China’s Winnti APT Compromises National Grid in Asia for 6 Months

Attacks against critical infrastructure are becoming more commonplace and, if a recent PRC-sponsored attack is anything to go by, easier to pull off. This article has been indexed from Dark Reading Read the original article: China’s Winnti APT Compromises National…

IBM Adds Data Security Broker to Encrypt Data in Multiclouds

The data security broker from Baffle brings field and file level encryption of sensitive data to new IBM Cloud Security Compliance Center. This article has been indexed from Dark Reading Read the original article: IBM Adds Data Security Broker to…

ChatGPT Jailbreaking Forums Proliferate in Dark Web Communities

By code or by command, cybercriminals are circumventing ethical and safety restrictions to use generative AI chatbots in the way that they want. This article has been indexed from Dark Reading Read the original article: ChatGPT Jailbreaking Forums Proliferate in…

Millions of Facebook Business Accounts Bitten by Python Malware

The “MrTonyScam” has a surprisingly high success rate, spreading a Python-based stealer to some 100,000 business accounts per week. This article has been indexed from Dark Reading Read the original article: Millions of Facebook Business Accounts Bitten by Python Malware

Google and Acalvio Partner to Deliver Active Defense to Protect Customers From Advanced Threats

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Google and Acalvio Partner to Deliver Active Defense to Protect Customers…

World Security Report Finds Physical Security Incidents Cost Companies USD $1T in 2022

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: World Security Report Finds Physical Security Incidents Cost Companies USD $1T…