Category: Dark Reading

Cloudflare Announces Unified Data Protection Suite to Address Risks of Modern Coding and Increased AI Use

Rich security suite enables seamless and secure path to transition corporate networks to the cloud, and accelerate innovation. This article has been indexed from Dark Reading Read the original article: Cloudflare Announces Unified Data Protection Suite to Address Risks of…

Being Flexible Can Improve Your Security Posture

Changing your approach when you realize you could be more efficient pays dividends, especially in six areas of your cybersecurity program. This article has been indexed from Dark Reading Read the original article: Being Flexible Can Improve Your Security Posture

Iranian APT Hits US Aviation Org via ManageEngine, Fortinet Bugs

Known security vulnerabilities in the enterprise products allowed unauthorized access through a public-facing application, US Cyber Command said. This article has been indexed from Dark Reading Read the original article: Iranian APT Hits US Aviation Org via ManageEngine, Fortinet Bugs

Attackers Abuse Google Looker Studio to Evade DMARC, Email Security

Cyberattackers are tapping the legitimacy of the Web-based data-visualization tool in a campaign aimed at stealing credentials and defrauding hundreds of business users. This article has been indexed from Dark Reading Read the original article: Attackers Abuse Google Looker Studio…

Navigating Rwanda’s New Data Protection Law

As the law’s October 2023 transition deadline approaches, it’s critical for organizations doing business in Rwanda to understand its requirements and implications. This article has been indexed from Dark Reading Read the original article: Navigating Rwanda’s New Data Protection Law

Overcoming the Rising Threat of Session Hijacking

Passkeys and multifactor authentication aren’t enough for combating infostealer malware, which can exfiltrate corporate data before anyone knows an attack happened. This article has been indexed from Dark Reading Read the original article: Overcoming the Rising Threat of Session Hijacking

3 Ways to Expand the Cyber Talent Pool From Splash Pad to Watering Hole

Why — and how — “unqualified” candidates will fill the reservoir with the security workers America is thirsty for. This article has been indexed from Dark Reading Read the original article: 3 Ways to Expand the Cyber Talent Pool From…

Critical Security Bug Opens Cisco BroadWorks to Complete Takeover

Cyberattackers could exploit CVE-2023-20238 to carry out a variety of nefarious deeds, from data theft and code execution to phishing, fraud, and DoS. This article has been indexed from Dark Reading Read the original article: Critical Security Bug Opens Cisco…

‘Evil Telegram’ Spyware Campaign Infects 60K+ Mobile Users

Legitimate-seeming Telegram “mods” available in the official Google Play store for the encrypted messaging app signal the rise of a new enterprise threat. This article has been indexed from Dark Reading Read the original article: ‘Evil Telegram’ Spyware Campaign Infects…

Kenya Initiates Public Sector Digital Skills Training, No Mention of Cybersecurity

Training will cover cloud skills and working in a paperless environment, but any mention of a cybersecurity element is conspicuously lacking. This article has been indexed from Dark Reading Read the original article: Kenya Initiates Public Sector Digital Skills Training,…

3 Strategies to Defend Against Resurging Infostealers

Infostealer incidents have more than doubled recently, making it critical to bolster your defenses to mitigate this growing threat. This article has been indexed from Dark Reading Read the original article: 3 Strategies to Defend Against Resurging Infostealers

Software Supply Chain Strategies to Parry Dependency Confusion Attacks

Bad actors practice to deceive package managers with a tangled web of methods. Here’s how to hoist them by their own petard. This article has been indexed from Dark Reading Read the original article: Software Supply Chain Strategies to Parry…

Microsoft ID Security Gaps That Let Threat Actor Steal Signing Key

China’s Storm-0558 accessed user emails at some 25 enterprise organizations earlier this year using forged tokens. This article has been indexed from Dark Reading Read the original article: Microsoft ID Security Gaps That Let Threat Actor Steal Signing Key

North Korean Hackers Target Security Researchers — Again

This time, they’re creating elaborate impostor profiles and using a fresh zero-day and a fake Windows tool to lure in the suspecting. This article has been indexed from Dark Reading Read the original article: North Korean Hackers Target Security Researchers…

NFL Security Chief: Generative AI Threats a Concern as New Season Kicks Off

Deepfake videos and audio of NFL players and phishing communications via ChatGPT-like tools are a worry, the NFL’s CISO says. This article has been indexed from Dark Reading Read the original article: NFL Security Chief: Generative AI Threats a Concern…

Weaponized Windows Installers Target Graphic Designers in Crypto Heist

Attackers use legitimate Windows installer to hide malicious scripts that install a backdoor and miners that leverage victims’ graphics processing power. This article has been indexed from Dark Reading Read the original article: Weaponized Windows Installers Target Graphic Designers in…

How New SEC Rules Can Benefit Cybersecurity Teams

Securities and Exchange Commission rules elevate cybersecurity to a critical strategic concern and compel businesses to prioritize cyber resilience. This article has been indexed from Dark Reading Read the original article: How New SEC Rules Can Benefit Cybersecurity Teams

Peril vs. Promise: Companies, Developers Worry Over Generative AI Risk

Executives and developers believe AI can help businesses thrive, but worry that reliance on generative AI brings significant risks. This article has been indexed from Dark Reading Read the original article: Peril vs. Promise: Companies, Developers Worry Over Generative AI…

Does Generative AI Comply With Asimov’s 3 Laws of Robotics?

Putting the top 10 generative AI tools to the ethical test reveals more about humanity than artificial intelligence. This article has been indexed from Dark Reading Read the original article: Does Generative AI Comply With Asimov’s 3 Laws of Robotics?

CybeReady Provides Cybersecurity Awareness Month Kits As CISOs Defend Against AI Driven Attacks

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: CybeReady Provides Cybersecurity Awareness Month Kits As CISOs Defend Against AI…

Cybersecurity Builds Trust in Critical Infrastructure

Improving an energy company’s resistance to cyberattack does more than protect vital resources — it enhances trust from customers and investors. This article has been indexed from Dark Reading Read the original article: Cybersecurity Builds Trust in Critical Infrastructure

W3LL Gang Compromises Thousands of Microsoft 365 Accounts

A secretive phishing cabal boasts a sophisticated affiliate network and a modular, custom toolset that’s claiming victims on three continents. This article has been indexed from Dark Reading Read the original article: W3LL Gang Compromises Thousands of Microsoft 365 Accounts

MinIO Attack Showcases Fresh Corporate Cloud Attack Vector

The open source object storage service was the target of a never-before-seen attack on corporate cloud services, which researchers said should put DevOps in particular on notice. This article has been indexed from Dark Reading Read the original article: MinIO…

Russia’s ‘Fancy Bear’ APT Targets Ukrainian Energy Facility

The group, best known for 2016 US election interference and other attacks on Ukraine, used phishing emails offering pictures of women to lure its victim into opening a malicious attachment. This article has been indexed from Dark Reading Read the…

Google’s Souped-up Chrome Store Review Process Foiled by Data-Stealer

Researchers have discovered that despite Google’s adoption of the Manifest V3 security standard to protect against malicious plug-ins, attackers can still get bad extensions past its review process. This article has been indexed from Dark Reading Read the original article:…

Overcoming Open Source Vulnerabilities in the Software Supply Chain

By securing access to code and running scans against all code changes, developers can better prevent — and detect — potential risks and vulnerabilities. This article has been indexed from Dark Reading Read the original article: Overcoming Open Source Vulnerabilities…

LockBit Leaks Documents Filched From UK Defense Contractor

A company that builds physical perimeter defenses failed to keep the LockBit group from penetrating its cyber defenses. This article has been indexed from Dark Reading Read the original article: LockBit Leaks Documents Filched From UK Defense Contractor

Hornetsecurity Releases 365 Total Protection Plan 4 for Microsoft 365

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Hornetsecurity Releases 365 Total Protection Plan 4 for Microsoft 365

Tuya Smart and Amazon Web Services Collaborate to Establish an IoT Security Lab

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Tuya Smart and Amazon Web Services Collaborate to Establish an IoT…

GhostSec Leaks Source Code of Alleged Iranian Surveillance Tool

GhostSec has made the source code for what it calls a powerful surveillance tool openly available in a 26GB file, but FANAP denies its legitimacy. This article has been indexed from Dark Reading Read the original article: GhostSec Leaks Source…

Peiter ‘Mudge’ Zatko Lands Role as CISA Senior Technical Adviser

The former hacker and Twitter security executive will use his role to help fulfill the Biden administration’s plans for the National Cybersecurity Strategy. This article has been indexed from Dark Reading Read the original article: Peiter ‘Mudge’ Zatko Lands Role…

Data Initiatives Force Closer Partnership Between CISOs, CDOs

Though security leaders and chief data officers both care about data management, their different missions have created a tension that needs addressing. This article has been indexed from Dark Reading Read the original article: Data Initiatives Force Closer Partnership Between…

Hackers Target High-Privileged Okta Accounts via Help Desk

Threat actors convince employees to reset MFA for Super Admin accounts in the IAM service to leverage compromised accounts, impersonating users and moving laterally within an organization. This article has been indexed from Dark Reading Read the original article: Hackers…

How Companies Can Cope With the Risks of Generative AI Tools

To benefit from AI yet minimize risk, companies should be cautious about information they share, be aware of AI’s limitations, and stay vigilant about business implications. This article has been indexed from Dark Reading Read the original article: How Companies…

Facing Third-Party Threats With Non-Employee Risk Management

As businesses continue to grapple with third-party threats, a revamped approach to non-employee risk management can help limit their potential exposure. This article has been indexed from Dark Reading Read the original article: Facing Third-Party Threats With Non-Employee Risk Management

ReasonLabs Summer 2023 Trends Report Reveals Top Consumer Security Threats

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: ReasonLabs Summer 2023 Trends Report Reveals Top Consumer Security Threats

Lacework Expands Partnership With Google Cloud to Deliver Enterprise Flexibility in the Cloud

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Lacework Expands Partnership With Google Cloud to Deliver Enterprise Flexibility in…

AI for Good: Voxel AI Tech Increases Funding to $30M With Strategic Funding Round

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: AI for Good: Voxel AI Tech Increases Funding to $30M With…

Inaugural Pwn2Own Automotive Contest Dangles $1M for Car Hackers

The competition encourages automotive research and allows for contestants to take part in person or remotely. This article has been indexed from Dark Reading Read the original article: Inaugural Pwn2Own Automotive Contest Dangles $1M for Car Hackers

MSSQL Databases Under Fire From FreeWorld Ransomware

The sophisticated attacks, tracked as DB#JAMMER, run shell commands to impair defenses and deploy tools to establish persistence on the host. This article has been indexed from Dark Reading Read the original article: MSSQL Databases Under Fire From FreeWorld Ransomware

Will the AI Arms Race Lead to the Pollution of the Internet?

Content creators want to protect their intellectual property from AI by poisoning data. Could this destroy the machine learning ecosystem? This article has been indexed from Dark Reading Read the original article: Will the AI Arms Race Lead to the…

NYC Subway Disables Trip-History Feature Over Tap-and-Go Privacy Concerns

The move by New York’s Metropolitan Transit Authority (MTA) follows a report that showed how easy it is for someone to pull up another individual’s seven-day ride history through the One Metro New York (OMNY) website. This article has been…

Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs

The Security and Exchange Commission’s Proposed Rule for Public Companies (PPRC) is ambiguous. This article has been indexed from Dark Reading Read the original article: Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs

National Cybersecurity Alliance Receives 200K Grant From Craig Newmark Philanthropies for HBCU Cybersecurity Program

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: National Cybersecurity Alliance Receives 200K Grant From Craig Newmark Philanthropies for…

UN: Southeast Asia Gangs Are Trafficking Cybercrime Workers

Cybercrime syndicates are forcing people into working for them, and it’s a difficult issue to solve, involving digital platforms, political powers, and organized crime on a global scale. This article has been indexed from Dark Reading Read the original article:…

3 out of 4 Cyberattacks in the Education Sector Are Associated With a Compromised On‑Premises User or Admin Account

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: 3 out of 4 Cyberattacks in the Education Sector Are Associated…

Insurance Costs Rise, Coverage Shrinks, But Policies Remain Essential

The number of companies that have used their cyber insurance policies multiple times rises, but policy coverage grows more expensive and less comprehensive. This article has been indexed from Dark Reading Read the original article: Insurance Costs Rise, Coverage Shrinks,…

UK Agrees to Support Kuwait’s Cybersecurity Center

The UK has agreed to help the Kuwaitis meet their stated goal of information-sharing and achieving globally coordinated incident response going forward. This article has been indexed from Dark Reading Read the original article: UK Agrees to Support Kuwait’s Cybersecurity…

Apple iPhone 14 Pro Offered Up to the Hacking Masses

Since launching in 2019, the Security Device Research Program has discovered 130 critical vulnerabilities; applications are now open for Apple’s 2024 iteration. This article has been indexed from Dark Reading Read the original article: Apple iPhone 14 Pro Offered Up…

Paramount, Forever 21 Data Breaches Set Stage for Follow-On Attacks

The Forever 21 breach alone affects a half-million people, who could be a mix of consumers and employees; Paramount is staying mum on who exactly is impacted. This article has been indexed from Dark Reading Read the original article: Paramount,…

Cyberattackers Swarm OpenFire Cloud Servers With Takeover Barrage

The Kinsing threat group has launched more than 1,000 cyberattacks in less than two months, exploiting a security vulnerability in the internal corporate messaging app in order to upload the malware and a cryptominer. This article has been indexed from…

Chinese Group Spreads Android Spyware via Trojan Signal, Telegram Apps

Thousands of devices have become infected with “BadBazaar,” malware previously used to spy on Uyghur and Turkic ethnic minorities in China. This article has been indexed from Dark Reading Read the original article: Chinese Group Spreads Android Spyware via Trojan…

Chinese Group Spreads Android Spyware Via Trojan Signal, Telegram Apps

Thousands of devices have become infected with “BadBazaar,” malware previously used to spy on Uyghur and Turkic ethnic minorities in China. This article has been indexed from Dark Reading Read the original article: Chinese Group Spreads Android Spyware Via Trojan…

APT Attacks From ‘Earth Estries’ Hit Gov’t, Tech With Custom Malware

A sophisticated threat actor managed to fly under the radar for three years, despite flexing serious muscle. This article has been indexed from Dark Reading Read the original article: APT Attacks From ‘Earth Estries’ Hit Gov’t, Tech With Custom Malware

New York Times Spoofed to Hide Russian Disinformation Campaign

“Operation Doppelganger” has convincingly masqueraded as multiple news sites with elaborate fake stories containing real bylines of journalists, blasting them out on social media platforms. This article has been indexed from Dark Reading Read the original article: New York Times…

4 Strategies to Safeguard the Finance Industry Against Deepfake Onslaught

Through strategic measures and a united front, the finance industry can overcome the looming threat of deepfakes. This article has been indexed from Dark Reading Read the original article: 4 Strategies to Safeguard the Finance Industry Against Deepfake Onslaught

Performance-Enhanced Android MMRat Scurries onto Devices Via Fake App Stores

The stealthy Trojan targets users in Southeast Asia, allowing attackers to remotely control devices to commit bank fraud. This article has been indexed from Dark Reading Read the original article: Performance-Enhanced Android MMRat Scurries onto Devices Via Fake App Stores

Should Senior IT Professionals Be Accountable for Professional Decisions?

Everyone makes mistakes — but what if your mistakes risk the security of millions of people? This article has been indexed from Dark Reading Read the original article: Should Senior IT Professionals Be Accountable for Professional Decisions?

Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and Cyber Resilience

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and…

Unpatched Citrix NetScaler Devices Targeted by Ransomware Group FIN8

Citrix issued a patch for the critical remote code execution bug in July for its NetScaler devices. This article has been indexed from Dark Reading Read the original article: Unpatched Citrix NetScaler Devices Targeted by Ransomware Group FIN8

SPHERE Appoints Former Johnson & Johnson CISO Marene Allison to Board of Directors

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: SPHERE Appoints Former Johnson & Johnson CISO Marene Allison to Board…

PurFoods Mom’s Meals Reports Data Breach Exposing Social Security Numbers of Over 1.2 Million Consumers

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: PurFoods Mom’s Meals Reports Data Breach Exposing Social Security Numbers of…

Meta Cripples China’s Massive ‘Spamouflage’ Influence Op

The social media giant is taking on Dragonbridge, the “largest known cross-platform covert influence operation in the world.” This article has been indexed from Dark Reading Read the original article: Meta Cripples China’s Massive ‘Spamouflage’ Influence Op

Sprawling Qakbot Malware Takedown Spans 700,000 Infected Machines

“Operation Duck Hunt” is not likely to eliminate the initial access botnet forever, but the proactive removal of the malware from victim machines by law enforcement is one of the largest and most significant efforts of its kind. This article…

Rackspace Faces Massive Cleanup Costs After Ransomware Attack

Eight months after the cyberattack, the cloud hosting services company’s remediation costs top $10 million as it tries to repair the damage caused by the Play ransomware gang. This article has been indexed from Dark Reading Read the original article:…

Addressing Cybersecurity’s Talent Shortage & Its Impact on CISOs

CISOs need to educate all arms of the business on security best practices so it becomes part of the business culture, thus expanding who’s keeping watch. Automating routine tasks will help scale security. This article has been indexed from Dark…

BreachLock Intelligence Report Reveals Critical Insights From Thousands of Penetration Tests

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: BreachLock Intelligence Report Reveals Critical Insights From Thousands of Penetration Tests

Honeywell to Acquire SCADAfence, Strengthening Its Cybersecurity Software Portfolio

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Honeywell to Acquire SCADAfence, Strengthening Its Cybersecurity Software Portfolio

Motherboard Mishaps Undermine Trust, Security

MSI and Microsoft warn about new Windows Preview blue screens on some motherboards, the latest mishap to raise questions over the reliability of hardware and firmware. This article has been indexed from Dark Reading Read the original article: Motherboard Mishaps…