Category: Dark Reading

Financial Firms Breached in MOVEit Cyberattacks Now Face Lawsuits

TD Ameritrade, Charles Schwab named in new class action data breach lawsuit, following last week’s filing against Prudential. This article has been indexed from Dark Reading Read the original article: Financial Firms Breached in MOVEit Cyberattacks Now Face Lawsuits

London Police Warned to Stay Vigilant Amid Major Data Breach

Hackers hit a third-party contractor’s IT systems, but they didn’t steal any addresses or financial details, officials say. This article has been indexed from Dark Reading Read the original article: London Police Warned to Stay Vigilant Amid Major Data Breach

5 Ways to Prepare for Google’s 90-Day TLS Certificate Expiration

With bad guys frequently upping their game, security can’t leave these protections to a once-a-year upgrade. This article has been indexed from Dark Reading Read the original article: 5 Ways to Prepare for Google’s 90-Day TLS Certificate Expiration

Authentication Outage Underscores Why ‘Fail Safe’ Is Key

Duo’s service outage last week, impacting schools and businesses, highlights how companies should build in resiliency and business continuity into their authentication schemes. This article has been indexed from Dark Reading Read the original article: Authentication Outage Underscores Why ‘Fail…

Legal Liability for Insecure Software Might Work, but It’s Dangerous

Imposing government-regulated security requirements on software companies may go too far and create unintended consequences. This article has been indexed from Dark Reading Read the original article: Legal Liability for Insecure Software Might Work, but It’s Dangerous

Malware Unleashed: Public Sector Hit in Sudden Surge, Reveals New Research

Report unmasks recent cybersecurity challenges for governments, healthcare, financial services, and vital infrastructure. This article has been indexed from Dark Reading Read the original article: Malware Unleashed: Public Sector Hit in Sudden Surge, Reveals New Research

China Unleashes Flax Typhoon APT to Live Off the Land, Microsoft Warns

The cyber espionage group has created a stealthy, hard-to-mitigate network of persistent access across a range of organizations, but the endgame is unclear. This article has been indexed from Dark Reading Read the original article: China Unleashes Flax Typhoon APT…

‘Whiffy Recon’ Malware Transmits Device Location Every 60 Seconds

Deployed by the infamous SmokeLoader botnet, the location-tracking malware could be used for a host of follow-on cyberattacks or even physical targeting. This article has been indexed from Dark Reading Read the original article: ‘Whiffy Recon’ Malware Transmits Device Location…

Cerby Announces $17M in Series A Funding to Secure Nonstandard Applications

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Cerby Announces $17M in Series A Funding to Secure Nonstandard Applications

US Space Industry More Prone to Foreign Espionage, US Agencies Warn

Foreign intelligence entities have the US space industry in their sights, posing serious threats to US national security, multiple federal agencies say. This article has been indexed from Dark Reading Read the original article: US Space Industry More Prone to…

Cypago Raises $13M and Unveils its Cyber GRC Automation (CGA) Platform to Simplify GRC Processes

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Cypago Raises $13M and Unveils its Cyber GRC Automation (CGA) Platform…

Ransomware With an Identity Crisis Targets Small Businesses, Individuals

TZW is the latest version of Adhubllka, which has been active since 2019 but has gone largely unreported due to its lower ransom demands. This article has been indexed from Dark Reading Read the original article: Ransomware With an Identity…

eBay Users Beware Russian ‘Telekopye’ Telegram Phishing Bot

Thanks to a simple Telegram bot that democratizes phishing, ordinary Russians can conduct full-fledged phishing attacks with zero technical knowhow. This article has been indexed from Dark Reading Read the original article: eBay Users Beware Russian ‘Telekopye’ Telegram Phishing Bot

5 Best Practices for Implementing Risk-First Cybersecurity

Embracing a risk-first mindset empowers organizations to make informed decisions, strengthen security, safeguard valuable assets, and reduce financial impact. This article has been indexed from Dark Reading Read the original article: 5 Best Practices for Implementing Risk-First Cybersecurity

North Korea’s Lazarus Group Used GUI Framework to Build Stealthy RAT

The world’s most notorious threat actor is using an unprecedented tactic for sneaking spyware into the IT networks of important companies. This article has been indexed from Dark Reading Read the original article: North Korea’s Lazarus Group Used GUI Framework…

eSentire Labs Open Sources Project to Monitor LLMs

The eSentire LLM Gateway provides monitoring and governance of ChatGPT and other Large Language Models being used in the organization. This article has been indexed from Dark Reading Read the original article: eSentire Labs Open Sources Project to Monitor LLMs

Threat Actor Exploits Zero-Day in WinRAR to Target Crypto Accounts

Attacks targeting the now-patched bug have been going on since at least April 2023, security vendor says. This article has been indexed from Dark Reading Read the original article: Threat Actor Exploits Zero-Day in WinRAR to Target Crypto Accounts

FBI Warns of Cryptocurrency Heists by North Korea’s Lazarus Group

The most recent stolen bitcoin comes just after three major operations occurred in June, with millions stolen in each heist. This article has been indexed from Dark Reading Read the original article: FBI Warns of Cryptocurrency Heists by North Korea’s…

Attackers Dangle AI-Based Facebook Ad Lures to Hijack Business Accounts

The offending ads and pages leveraged interest in AI to spread a malicious credential-stealing browser extension. This article has been indexed from Dark Reading Read the original article: Attackers Dangle AI-Based Facebook Ad Lures to Hijack Business Accounts

5 Early Warning Indicators That Are Key to Protecting National Secrets

The Defense Department must modernize user activity monitoring by prioritizing data that can be used early to proactively mitigate insider risk. This article has been indexed from Dark Reading Read the original article: 5 Early Warning Indicators That Are Key…

More Than Half of Browser Extensions Pose Security Risks

Spin.AI’s risk assessment of some 300,000 browser extensions had overly permissive access and could execute potentially malicious behaviors. This article has been indexed from Dark Reading Read the original article: More Than Half of Browser Extensions Pose Security Risks

Study: More Than Half of Browser Extensions Pose Security Risks

Spin.AI’s risk assessment of some 300,000 browser extensions had overly permissive access and could execute potentially malicious behaviors. This article has been indexed from Dark Reading Read the original article: Study: More Than Half of Browser Extensions Pose Security Risks

Adobe Patches Critical Deserialization Vulnerability, but Exploits Persist

The vulnerability was being exploited in the wild, targeting two versions of Adobe ColdFusion. This article has been indexed from Dark Reading Read the original article: Adobe Patches Critical Deserialization Vulnerability, but Exploits Persist

Absolute Dental Services Notifies Patients of Data Security Incident

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Absolute Dental Services Notifies Patients of Data Security Incident

Forescout Joins MISA and Announces Integration With Microsoft Sentinel

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Forescout Joins MISA and Announces Integration With Microsoft Sentinel

Controversial Cybercrime Law Passes in Jordan

The increase in cyberattacks against the Middle East in the last few years has pressured Jordan and other nations to better secure their infrastructures. This article has been indexed from Dark Reading Read the original article: Controversial Cybercrime Law Passes…

Software Makers May Face Greater Liability in Wake of MOVEit Lawsuit

Makers of vulnerable apps that are exploited in wide-scale supply chain attacks need to improve software security or face steep fines and settlement fees. This article has been indexed from Dark Reading Read the original article: Software Makers May Face…

‘Cuba’ Ransomware Group Uses Every Trick in the Book

How a Russian cybercrime group using Cuban Revolution references and iconography has emerged as one of the most profitable ransomware operations. This article has been indexed from Dark Reading Read the original article: ‘Cuba’ Ransomware Group Uses Every Trick in…

Chinese APT Targets Hong Kong in Supply Chain Attack

Dubbed Carderbee, the group used legitimate software and Microsoft-signed malware to spread the Korplug/PlugX backdoor to various Asian targets. This article has been indexed from Dark Reading Read the original article: Chinese APT Targets Hong Kong in Supply Chain Attack

Ivanti Issues Fix for Critical Vuln In Its Sentry Gateway Technology

Security vendor will not say if attackers are already actively exploiting the flaw, as some reports have claimed. This article has been indexed from Dark Reading Read the original article: Ivanti Issues Fix for Critical Vuln In Its Sentry Gateway…

Tesla Data Breach Investigation Reveals Inside Job

The carmaker also reported it’s taken legal action against the former employees involved in the data breach, which involved more than 75,000 names. This article has been indexed from Dark Reading Read the original article: Tesla Data Breach Investigation Reveals…

Fed Warning: US Space Industry Subject To Foreign Spying, Disruptions

The space industry must improve security as foreign intelligence entities seek to steal trade secrets and disrupt space-based infrastructure, US agencies caution. This article has been indexed from Dark Reading Read the original article: Fed Warning: US Space Industry Subject…

Visibility Is Just Not Enough to Secure Operational Technology Systems

Visibility is just the first step to secure your operational technology environment against today’s threats. You need a proactive, defense-in-depth approach. This article has been indexed from Dark Reading Read the original article: Visibility Is Just Not Enough to Secure…

CISA Committee Tackles Remote Monitoring and Management Protections

CISA’s public-private partnership produces RMM strategies to shore up critical infrastructure and to educate the MSPs that provide remote access to them. This article has been indexed from Dark Reading Read the original article: CISA Committee Tackles Remote Monitoring and…

ProjectDiscovery Announces $25M Series A Financing and Launch of Cloud Platform

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: ProjectDiscovery Announces $25M Series A Financing and Launch of Cloud Platform

CyCognito Finds Large Volume of Personal Identifiable Information in Vulnerable Cloud and Web Applications

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: CyCognito Finds Large Volume of Personal Identifiable Information in Vulnerable Cloud…

Phishing Attack Targets Hundreds of Zimbra Customers in Four Continents

A good chunk of the entire user base of a particular email service is being targeted for sensitive credentials. This article has been indexed from Dark Reading Read the original article: Phishing Attack Targets Hundreds of Zimbra Customers in Four…

Expand Your Definition of ‘Endpoint,’ Get a Better Handle On Cloud Threats

In this Dark Reading News Desk segment, Sysdig’s Anna Belak discusses how the boom in cloud services and applications expanded the definition of what constitutes an endpoint. This article has been indexed from Dark Reading Read the original article: Expand…

Tel Aviv Stock Exchange CISO: Making Better Use Of Your SIEM

If rule writing for SIEMs isn’t managed properly, it can lead to false positives and misconfigurations, which create extra work for the SOC team. This article has been indexed from Dark Reading Read the original article: Tel Aviv Stock Exchange…

African Cybercrime Operations Shut Down in Law Enforcement Operation

Interpol- and Afripol-led crackdown disrupts cybercrime ecosystem responsible for some $40 million in losses to victims. This article has been indexed from Dark Reading Read the original article: African Cybercrime Operations Shut Down in Law Enforcement Operation

Unveiling the Hidden Risks of Routing Protocols

Neglecting security of Border Gateway Protocol (BGP) and other routing protocols has created multiple vulnerabilities that must be addressed. This article has been indexed from Dark Reading Read the original article: Unveiling the Hidden Risks of Routing Protocols

Sophos: ‘Royal’ Is Trying to Make Itself the King of Ransomware

In this Dark Reading News Desk segment, John Shier, Field CTO Commercial, Sophos, discusses the “Royal” ransomware. This article has been indexed from Dark Reading Read the original article: Sophos: ‘Royal’ Is Trying to Make Itself the King of Ransomware

Normalyze: How Focusing On Data Can Improve Cloud Security

In this Dark Reading News Desk segment, Normalyze’s Ravi Ithal discusses cloud security and data security posture management (DPSM). This article has been indexed from Dark Reading Read the original article: Normalyze: How Focusing On Data Can Improve Cloud Security

TXOne: How to Improve Your Operational Technology Security Posture

In this Dark Reading News Desk segment, Terence Liu of TXOne Networks discusses operational technology and industrial cybersecurity. This article has been indexed from Dark Reading Read the original article: TXOne: How to Improve Your Operational Technology Security Posture

Foretrace Announces Launch of “Tim,” Generative AI Analyst for Assessing and Responding to Data Leaks

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Foretrace Announces Launch of “Tim,” Generative AI Analyst for Assessing and…

Israel-US Binational Industrial R&D Foundation to Invest $3.85M in Critical Infrastructure Cybersecurity Projects

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Israel-US Binational Industrial R&D Foundation to Invest $3.85M in Critical Infrastructure…

White House Orders Federal Agencies to Bolster Cyber Safeguards

A Biden administration adviser puts federal departments and agencies on notice to come into full compliance with presidential guidelines by the end of the year. This article has been indexed from Dark Reading Read the original article: White House Orders…

LinkedIn Suffers ‘Significant’ Wave of Account Hacks

Users report losing access to their accounts, with some being pressured into paying a ransom to get back in or else face permanent account deletion. This article has been indexed from Dark Reading Read the original article: LinkedIn Suffers ‘Significant’…

An Overview of Dubai’s First and Second Cybersecurity Strategy

Security demands a strong fortress in cyberspace, and Dubai has rolled out two cybersecurity strategies to protect the data of the government and citizens. This article has been indexed from Dark Reading Read the original article: An Overview of Dubai’s…

‘Play’ Ransomware Group Targeting MSPs Worldwide in New Campaign

Attackers use remote monitoring and management tools at MSPs to gain unfettered access to target networks. This article has been indexed from Dark Reading Read the original article: ‘Play’ Ransomware Group Targeting MSPs Worldwide in New Campaign

PowerShell Gallery Prone to Typosquatting, Other Supply Chain Attacks

Microsoft is aware of the issue, but so far its attempts to address it don’t appear to have worked, the vendor says. This article has been indexed from Dark Reading Read the original article: PowerShell Gallery Prone to Typosquatting, Other…

Researchers Harvest, Analyze 100K Cybercrime Forum Credentials

Researchers found that many Dark Web forums have stronger password rules than most government and military entities. This article has been indexed from Dark Reading Read the original article: Researchers Harvest, Analyze 100K Cybercrime Forum Credentials

Beyond Identity Launches Passkey Adoption Tool, The Passkey Journey

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Beyond Identity Launches Passkey Adoption Tool, The Passkey Journey

Insurance Data Breach Victims File Class-Action Suit Against Law Firm

This time, it’s the law firm that got breached, then sued for what victims claim was inadequate protection and compensation for theft of personal data. This article has been indexed from Dark Reading Read the original article: Insurance Data Breach…

67% of Federal Government Agencies Are Confident in Meeting Zero Trust Executive Order Deadline

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: 67% of Federal Government Agencies Are Confident in Meeting Zero Trust…

Dig Security State of Cloud Data Security 2023 Report Finds Exposed Sensitive Data in More Than 30% of Cloud Assets

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Dig Security State of Cloud Data Security 2023 Report Finds Exposed…

The Gulf’s Dizzying Tech Ambitions Present Risk & Opportunity

Threats and opportunities are abound for the UAE and Gulf states, so can they deal with being a cybersecurity stronghold? This article has been indexed from Dark Reading Read the original article: The Gulf’s Dizzying Tech Ambitions Present Risk &…

Boards Don’t Want Security Promises — They Want Action

CISOs must demonstrate that security processes and updates reduce risk in measurable ways. Put emphasis on action, get the basics right, and improve processes. This article has been indexed from Dark Reading Read the original article: Boards Don’t Want Security…

Iran and the Rise of Cyber-Enabled Influence Operations

Iranian threat actors are combining offensive network ops with messaging and amplification to manipulate targets’ perceptions and behavior. Here are three examples. This article has been indexed from Dark Reading Read the original article: Iran and the Rise of Cyber-Enabled…

Mandiant Releases Scanner to Identify Compromised NetScaler ADC, Gateway

Mandiant’s IoC Scanner will help enterprises collect indicators of compromise on affected Citrix NetScaler products. This article has been indexed from Dark Reading Read the original article: Mandiant Releases Scanner to Identify Compromised NetScaler ADC, Gateway

QR Code Phishing Campaign Targets Top US Energy Company

Attackers sent more than 1,000 emails with 2FA, MFA, and other security-related lures aimed at stealing Microsoft credentials. This article has been indexed from Dark Reading Read the original article: QR Code Phishing Campaign Targets Top US Energy Company

Kaspersky Password Manager Adds 2FA One-Time Password Storage and New Browser Support

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Kaspersky Password Manager Adds 2FA One-Time Password Storage and New Browser…

edX and Drake State Technical and Community College Launch Free Training Program

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: edX and Drake State Technical and Community College Launch Free Training…

Patch Now: OpenNMS Bug Steals Data, Triggers Denial of Service

Monitoring platform is trusted by Cisco, Savannah River Nuclear Solutions, and others in CISA’s critical infrastructure Sectors, say Synopsys researchers. This article has been indexed from Dark Reading Read the original article: Patch Now: OpenNMS Bug Steals Data, Triggers Denial…

AI Steals Passwords by Listening to Keystrokes With Scary Accuracy

The AI model trained on typing recorded over a smartphone was able to steal passwords with 95% accuracy. This article has been indexed from Dark Reading Read the original article: AI Steals Passwords by Listening to Keystrokes With Scary Accuracy

Phishing Operators Make Ready Use of Abandoned Websites for Bait

Abandoned sites — like WordPress — are easy to break into, offer a legitimate looking cover, and can remain active for longer than average. This article has been indexed from Dark Reading Read the original article: Phishing Operators Make Ready…