Category: Dark Reading

Women in CyberSecurity (WiCyS) Hosting Fifth Annual Virtual Career Fair

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Women in CyberSecurity (WiCyS) Hosting Fifth Annual Virtual Career Fair

Russian-African Security Gathering Exposes Kremlin’s Reduced Influence

Messaging from joint summit in Saint Petersburg amounts to little more than “diplomatic subterfuge,” observers note. This article has been indexed from Dark Reading Read the original article: Russian-African Security Gathering Exposes Kremlin’s Reduced Influence

Health Data of 4M Stolen in Cl0p MOVEit Breach of Colorado Department

State’s Department of Health Care Policy & Financing is the latest to acknowledge an attack by the Russian group’s ongoing exploitation of third-party systems. This article has been indexed from Dark Reading Read the original article: Health Data of 4M…

Following Pushback, Zoom Says It Won’t Use Customer Data to Train AI Models

Company’s experience highlights the tightrope tech organizations walk when integrating AI into their products and services. This article has been indexed from Dark Reading Read the original article: Following Pushback, Zoom Says It Won’t Use Customer Data to Train AI…

5 Ways CISA Can Help Cyber-Poor Small Businesses & Local Governments

Adopting these recommendations will help SMBs and public-sector agencies that must deal with the same questions of network security and data safety as their larger cousins, but without the same resources. This article has been indexed from Dark Reading Read…

3 Mobile or Client-Side Security Myths Debunked

The industry’s understanding of mobile or client-side security is too limited, leaving many mobile apps vulnerable. Don’t let these three myths lead you astray. This article has been indexed from Dark Reading Read the original article: 3 Mobile or Client-Side…

How to Choose a Managed Detection and Response (MDR) Solution

MDR empowers organizations with enhanced security. Look for these four capabilities when selecting an MDR product. This article has been indexed from Dark Reading Read the original article: How to Choose a Managed Detection and Response (MDR) Solution

Security Pressures Mount Around AI’s Promises & Peril

Both threats to enterprises and career opportunities are being created by the escalation of generative AI and ChatGPT, warns Maria ‘Azeria’ Markstedter. This article has been indexed from Dark Reading Read the original article: Security Pressures Mount Around AI’s Promises…

Fortinet Announces Free Security Awareness Curriculum for K-12 Students Tied to White House’s Cyber Initiatives

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Fortinet Announces Free Security Awareness Curriculum for K-12 Students Tied to…

As Phishing Gets Even Sneakier, Browser Security Needs to Step Up

Perception Point’s Din Serussi says browser extensions can help mitigate more sophisticated phishing techniques. This article has been indexed from Dark Reading Read the original article: As Phishing Gets Even Sneakier, Browser Security Needs to Step Up

XWorm, Remcos RAT Evade EDRs to Infect Critical Infrastructure

Disguised as harmless PDF documents, LNK files trigger a PowerShell script, initiating a Rust-based injector called Freeze[.]rs and a host of malware infections. This article has been indexed from Dark Reading Read the original article: XWorm, Remcos RAT Evade EDRs…

What CISA and NSA Guidance Means for Critical Infrastructure Security

Strategically investing in solutions that meet you where you are makes all the difference in staying secure from cyber threats. This article has been indexed from Dark Reading Read the original article: What CISA and NSA Guidance Means for Critical…

Mobb Wins Black Hat Startup Spotlight Competition

The four finalists in the startup competition tackled problems in firmware security, cloud infrastructure, open source software, and vulnerability remediation. This article has been indexed from Dark Reading Read the original article: Mobb Wins Black Hat Startup Spotlight Competition

Microsoft Expands Cloud Security Posture Management to Google Cloud

Microsoft Defender for Cloud CSPM, which provides risk and compliance monitoring of AWS, Azure, and on-premises cloud, is finally adding GCP to the mix. This article has been indexed from Dark Reading Read the original article: Microsoft Expands Cloud Security…

What’s in New York’s ‘First Ever’ Cyber Strategy?

Governor Kathy Hochul has made cybersecurity a key priority, with New York’s first chief cyber officer, Colin Ahern, leading the effort. This article has been indexed from Dark Reading Read the original article: What’s in New York’s ‘First Ever’ Cyber…

NSA: Codebreaker Challenge Helps Drive Cybersecurity Education

The US National Security Agency aims to attract students to cybersecurity in general and its own open positions in particular: 3,000 new jobs this year. This article has been indexed from Dark Reading Read the original article: NSA: Codebreaker Challenge…

CISA: ‘Whirlpool’ Backdoor Sends Barracuda ESG Security Down the Drain

Researchers have observed China’s UNC4841 dropping the backdoor on Barracuda’s email security appliances, in a spiraling cyber-espionage campaign. This article has been indexed from Dark Reading Read the original article: CISA: ‘Whirlpool’ Backdoor Sends Barracuda ESG Security Down the Drain

Rhysida Ransomware Trains Its Sights on Healthcare Operations

The new group has already made an impact in multiple countries and industries, including a multistate hospital chain in the US. This article has been indexed from Dark Reading Read the original article: Rhysida Ransomware Trains Its Sights on Healthcare…

Dell Credentials Bug Opens VMWare Environments to Takeover

Decoding private keys from even one Dell customer could give attackers control over VMWare environments across all organizations running the same programs. This article has been indexed from Dark Reading Read the original article: Dell Credentials Bug Opens VMWare Environments…

Cyber Insurance Experts Make a Case for Coverage, Protection

At Black Hat “mini summit,” providers and customers get clearer about premium costs and coverage — and the risk of doing without. This article has been indexed from Dark Reading Read the original article: Cyber Insurance Experts Make a Case…

EvilProxy Cyberattack Flood Targets Execs via Microsoft 365

A campaign sent 120,000 phishing emails in three months, circumventing MFA to compromise cloud accounts of high-level executives at global organizations This article has been indexed from Dark Reading Read the original article: EvilProxy Cyberattack Flood Targets Execs via Microsoft…

SecurityGen Study Highlights Hidden Threat to 5G Mobile Networks From GTP-Based Cyberattacks

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: SecurityGen Study Highlights Hidden Threat to 5G Mobile Networks From GTP-Based…

Rootly Raises $12M to Help Enterprise IT Teams Resolve Incidents 80 Percent Faster

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Rootly Raises $12M to Help Enterprise IT Teams Resolve Incidents 80…

Navigating Cybersecurity’s Seas: Environmental Regulations, OT & the Maritime Industry’s New Challenges

Stringent efficiency measures in new environmental regulations create an unintended consequence for the shipping industry: increased cybersecurity risks in operational technology systems. This article has been indexed from Dark Reading Read the original article: Navigating Cybersecurity’s Seas: Environmental Regulations, OT…

‘MoustachedBouncer’ APT Spies on Embassies, Likely via ISPs

Diplomats who didn’t use VPNs may have lost sensitive state information to a Belarusian threat actor that wields the “Disco” and “Nightclub” malware. This article has been indexed from Dark Reading Read the original article: ‘MoustachedBouncer’ APT Spies on Embassies,…

DARPA Launches 2-Year Contest to Build AI Tools to Fix Vulnerabilities

A challenge will be offered to teams to build tools using AI in order to solve open source’s vulnerability challenges. This article has been indexed from Dark Reading Read the original article: DARPA Launches 2-Year Contest to Build AI Tools…

Symmetry Systems Closes $17.7M To Scale its AI-Powered Data Security Platform

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Symmetry Systems Closes $17.7M To Scale its AI-Powered Data Security Platform

Sweet Security Lands $12M in Seed Funding to Shift Cloud Security Right

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Sweet Security Lands $12M in Seed Funding to Shift Cloud Security…

LastPass Announces Availability of FIDO2 Authenticators for Passwordless Login

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: LastPass Announces Availability of FIDO2 Authenticators for Passwordless Login

DARPA Launches Two-Year Contest to Build AI Tools to Fix Vulnerabilities

A challenge will be offered to teams to build tools using AI in order to solve open source’s vulnerability challenges. This article has been indexed from Dark Reading Read the original article: DARPA Launches Two-Year Contest to Build AI Tools…

Windows Defender-Pretender Attack Dismantles Flagship Microsoft EDR

A newly patched flaw in Windows Defender allows attackers to hijack the signature-update process to sneak in malware, delete benign files, and inflict mayhem on target systems. This article has been indexed from Dark Reading Read the original article: Windows…

Blockchain Signing Bug Cracks Open Crypto Investors’ Wallets Worldwide

Bugs in popular digital signature schemes designed to protect crypto investors allow attackers to steal private keys gain full access to digital wallets. This article has been indexed from Dark Reading Read the original article: Blockchain Signing Bug Cracks Open…

Checkmarx CISO Study Finds 96% of CISOs Say Their Business Prospects Consider Their Organizations’ AppSec Maturity When Making Deal Decisions

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Checkmarx CISO Study Finds 96% of CISOs Say Their Business Prospects…

It’s Time for Cybersecurity to Talk About Climate Change

From e-waste to conference swag to addressing data center energy consumption, cybersecurity stakeholders need a whole-industry approach to being part of the solution and reducing the risk of climate change. This article has been indexed from Dark Reading Read the…

Disposed-of Gadgets Can Lead to Wi-Fi Network Hacks, Kaspersky Says

Wi-Fi settings are easily stolen when old gadgets are gotten rid of, which puts end users in the crosshairs for network attacks. This article has been indexed from Dark Reading Read the original article: Disposed-of Gadgets Can Lead to Wi-Fi…

Researchers Detail Vuln That Allowed for Windows Defender Update Process Hijack

Newly patched flaw allowed attackers to sneak malware past Defender, delete benign files, and inflict mayhem on target systems. This article has been indexed from Dark Reading Read the original article: Researchers Detail Vuln That Allowed for Windows Defender Update…

Safety of Officers & Civilians of PSNI Compromised in Major Data Breach

A mistake snowballs into a serious political issue as the safety of police officers in Northern Ireland is compromised in an accidental data leak. This article has been indexed from Dark Reading Read the original article: Safety of Officers &…

Top 3 Insights I Learned at Recent Cybersecurity Events

Events like RSA Conference and Infosecurity Europe provide industry collaboration opportunities required to address the evolving cybersecurity threat landscape. This article has been indexed from Dark Reading Read the original article: Top 3 Insights I Learned at Recent Cybersecurity Events

C-Suite Cybersecurity Sign-off Hinges on Customer Trust, Digital Opps

Omdia’s Maxine Holt says cybersecurity practitioners need to emphasize their role in growing the business, not just preventing breaches. This article has been indexed from Dark Reading Read the original article: C-Suite Cybersecurity Sign-off Hinges on Customer Trust, Digital Opps

OWASP Lead Flags Gaping Hole in Software Supply Chain Security

SBOMs aren’t enough: Developers need to dig deeper into how software is built by using a process called binary source validation. This article has been indexed from Dark Reading Read the original article: OWASP Lead Flags Gaping Hole in Software…

RedHotel Checks in As Dominant China-Backed Cyberspy Group

The APT has been rampaging across three continents on behalf of China’s Ministry of State Security, and now claims the throne as kings of intelligence gathering and economic espionage. This article has been indexed from Dark Reading Read the original…

AI Risk Database Tackles AI Supply Chain Risks

The open source tool — a collaboration between Robust Intelligence, MITRE, and Indiana University — assesses heavily shared, public machine learning models for risk. This article has been indexed from Dark Reading Read the original article: AI Risk Database Tackles…

Why Shellshock Remains a Cybersecurity Threat After 9 Years

Nearly a decade after it was disclosed, the Shellshock vulnerability still plagues organizations. Learn how to protect yourself. This article has been indexed from Dark Reading Read the original article: Why Shellshock Remains a Cybersecurity Threat After 9 Years

Closing Coverage Gaps Where Customer Resources Meet Cloud Environments

Protecting the spaces where private, public, and hybrid clouds meet users’ technologies requires a cloud-centric approach. This article has been indexed from Dark Reading Read the original article: Closing Coverage Gaps Where Customer Resources Meet Cloud Environments

Attacker Breakout Time Shrinks Again, Underscoring Need for Automation

Just 79 minutes — that’s how long it takes attackers to move from an initial compromise to extending their infiltration of a firm’s network. This article has been indexed from Dark Reading Read the original article: Attacker Breakout Time Shrinks…

Analyzing Network Chaos Leads to Better DDoS Detection

Suspicious changes in entropy allow researchers to more accurately spot distributed denial-of-service attacks, but false positives remain a problem. This article has been indexed from Dark Reading Read the original article: Analyzing Network Chaos Leads to Better DDoS Detection

Brillio Partners With Google Cloud to Build Generative AI Solutions for the Financial Services and Healthcare Industries

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Brillio Partners With Google Cloud to Build Generative AI Solutions for…

zkPass Secures $2.5M in Seed Funding to Safeguard User Privacy and Data

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: zkPass Secures $2.5M in Seed Funding to Safeguard User Privacy and…

Russian Rocket Bureau Faces Cyber-Espionage Breach, North Korea Responsible

Whether or not North Korea used information gathered from its cyber-espionage teams in this breach to build up its own military technology is unknown. This article has been indexed from Dark Reading Read the original article: Russian Rocket Bureau Faces…

75% of Organizations Worldwide Set to Ban ChatGPT and Generative AI Apps on Work Devices

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: 75% of Organizations Worldwide Set to Ban ChatGPT and Generative AI…

India Data Protection Bill Approved, Despite Privacy Concerns

Opponents claim the new bill hinders right to information, while there are concerns on data transfers outside the country. This article has been indexed from Dark Reading Read the original article: India Data Protection Bill Approved, Despite Privacy Concerns

Raft of TETRA Zero-Day Vulnerabilities Endanger Industrial Communications

Further TETRA-related vulnerabilities have been disclosed in base stations that run and decrypt the worldwide communications protocol for industrial systems. This article has been indexed from Dark Reading Read the original article: Raft of TETRA Zero-Day Vulnerabilities Endanger Industrial Communications

Citrix Zero-Day: 7K Instances Remain Exposed, 460 Compromised

Many organizations have failed to patch a critical zero-day vulnerability, allowing hackers to install Web shells on hundreds of endpoints. This article has been indexed from Dark Reading Read the original article: Citrix Zero-Day: 7K Instances Remain Exposed, 460 Compromised

10 Key Controls to Show Your Organization Is Worthy of Cyber Insurance

More-effective cyber-risk management controls can help bolster a company’s policy worthiness. Start with these 10 tips to manage risk as underwriter requirements get more sophisticated. This article has been indexed from Dark Reading Read the original article: 10 Key Controls…

Ransomware Victims Surge as Threat Actors Pivot to Zero-Day Exploits

Threat actors such as the operators of the Cl0p ransomware family increasingly exploit unknown and day-one vulnerabilities in their attacks. This article has been indexed from Dark Reading Read the original article: Ransomware Victims Surge as Threat Actors Pivot to…

Akamai Research: Rampant Abuse of Zero-Day and One-Day Vulnerabilities Leads to 143% Increase in Victims of Ransomware

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Akamai Research: Rampant Abuse of Zero-Day and One-Day Vulnerabilities Leads to…

SecurityScorecard Launches Managed Cyber Risk Services to Mitigate Zero-Day and Critical Supply Chain Vulnerabilities

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: SecurityScorecard Launches Managed Cyber Risk Services to Mitigate Zero-Day and Critical…

Mallox Ransomware Group Revamps Malware Variants, Evasion Tactics

The group continues to target SQL servers, adding the Remcos RAT, BatCloak, and Metasploit in an attack that shows advance obfuscation methods. This article has been indexed from Dark Reading Read the original article: Mallox Ransomware Group Revamps Malware Variants,…

Colorado Dept. of Higher Education Hit With Massive Data Breach

Last week, the department uncovered a data breach that occurred back in June stemming from what it deems to be a cybersecurity ransomware incident. This article has been indexed from Dark Reading Read the original article: Colorado Dept. of Higher…

Selling Software to the US Government? Know Security Attestation First

Challenging new safety requirements are needed to improve security and work toward a more secure future. This article has been indexed from Dark Reading Read the original article: Selling Software to the US Government? Know Security Attestation First

Salesforce Zero-Day Exploited to Phish Facebook Credentials

The cyberattacks used the legitimate Salesforce.com domain by chaining the vulnerability to an abuse of Facebook’s Web games platform, slipping past email protections. This article has been indexed from Dark Reading Read the original article: Salesforce Zero-Day Exploited to Phish…

Endor Labs Raises $70M to Reform Application Security and Eliminate Developer Productivity Tax

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Endor Labs Raises $70M to Reform Application Security and Eliminate Developer…

Google, Microsoft Take Refuge in Rust Language’s Better Security

More tech giants turn to the Rust programming language for its built-in memory safety and other security features. This article has been indexed from Dark Reading Read the original article: Google, Microsoft Take Refuge in Rust Language’s Better Security

Center for Cyber Safety and Education Awards $174K in Cybersecurity Scholarships

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Center for Cyber Safety and Education Awards $174K in Cybersecurity Scholarships

Vulcan Cyber Attack Path Graph Targets Cloud-Scale Risk Prioritization and Mitigation

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Vulcan Cyber Attack Path Graph Targets Cloud-Scale Risk Prioritization and Mitigation

Mission Secure, Idaho National Laboratory Announce Partnership to Protect Critical Infrastructure

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Mission Secure, Idaho National Laboratory Announce Partnership to Protect Critical Infrastructure

Hacktivist Group ‘Mysterious Team Bangladesh’ Goes on DDoS Rampage

The emerging threat has carried out 750 DDoS attacks and 78 website defacements in just one year to support its religious and political motives. This article has been indexed from Dark Reading Read the original article: Hacktivist Group ‘Mysterious Team…

Cult of the Dead Cow Hacktivists Give Life to ‘Privacy-First’ App Framework

The well-known collective is taking on targeted advertising with the Veilid framework and says it wants to make the Internet accessible to everyone who fears being monetized. This article has been indexed from Dark Reading Read the original article: Cult…

As Artificial Intelligence Accelerates, Cybercrime Innovates

Rare government, industry alignment on AI threats means we have an opportunity to make rapid strides to improve cybersecurity and slip the hold cybercriminals have on us. This article has been indexed from Dark Reading Read the original article: As…

Russia’s ‘Midnight Blizzard’ Hackers Launch Flurry of Microsoft Teams Attacks

The Nobelium APT is launching highly targeted Teams-based phishing attacks on government and industrial targets using compromised Microsoft 365 tenants, with the aim of data theft and cyber espionage. This article has been indexed from Dark Reading Read the original…