Category: Dark Reading

Russian APT ‘BlueCharlie’ Swaps Infrastructure to Evade Detection

Despite being outed earlier this year, the advanced persistent threat group is trying to sneak past researchers again. This article has been indexed from Dark Reading Read the original article: Russian APT ‘BlueCharlie’ Swaps Infrastructure to Evade Detection

Menlo Security Establishes Browser Security With AI-Powered Phishing and Ransomware Protection

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Menlo Security Establishes Browser Security With AI-Powered Phishing and Ransomware Protection

Tanium Selected by DHS CISA to Join the Joint Cyber Defense Collaborative

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Tanium Selected by DHS CISA to Join the Joint Cyber Defense…

Guardio Uncovers Zero-Day Vulnerability in Salesforce’s Email Services

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Guardio Uncovers Zero-Day Vulnerability in Salesforce’s Email Services

BeyondTrust’s Identity Security Insights Provides Unprecedented Visibility into Identity Threats

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: BeyondTrust’s Identity Security Insights Provides Unprecedented Visibility into Identity Threats

Global Optical Sensor Market to Reach $45.56B by 2030, Rising Demand in Consumer Electronics and IoT Applications

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Global Optical Sensor Market to Reach $45.56B by 2030, Rising Demand…

SynSaber and ICS Advisory Project Identify Vulnerability Trends Within The Critical Infrastructure Sector

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: SynSaber and ICS Advisory Project Identify Vulnerability Trends Within The Critical…

Solvo Unveils SecurityGenie: A Revolutionary ChatGPT-Like Solution for Cloud Security Teams

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Solvo Unveils SecurityGenie: A Revolutionary ChatGPT-Like Solution for Cloud Security Teams

VALIC Retirement Services Company Experiences PBI Data Breach Exposing Approximately 798,000 Social Security Numbers

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: VALIC Retirement Services Company Experiences PBI Data Breach Exposing Approximately 798,000…

Iranian Company Plays Host to Reams of Ransomware, APT Groups

Cloudzy is a command-and-control provider (C2P) to APT groups in Iran, North Korea, and Russia, according to Halcyon. This article has been indexed from Dark Reading Read the original article: Iranian Company Plays Host to Reams of Ransomware, APT Groups

Cyber-Insurance Underwriting Is Still Stuck in the Dark Ages

Innovations in continuous controls monitoring may be the only way underwriters can offer cyber-insurance policies that make sense in the market. This article has been indexed from Dark Reading Read the original article: Cyber-Insurance Underwriting Is Still Stuck in the…

Tesla Jailbreak Unlocks Theft of In-Car Paid Features

Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs. This article has been indexed from Dark Reading Read the original article: Tesla Jailbreak Unlocks…

Utilities Face Security Challenges as They Embrace Data in New Ways

A culture of cybersecurity and implementing industry best practices can go a long way toward protecting a utility. This article has been indexed from Dark Reading Read the original article: Utilities Face Security Challenges as They Embrace Data in New…

Unified XDR and SIEM Alleviate Security Alert Fatigue

By integrating detection response with information and event management, organizations can move beyond protective controls and harden their defenses. This article has been indexed from Dark Reading Read the original article: Unified XDR and SIEM Alleviate Security Alert Fatigue

Devo and Cybermindz Partner to Address the Mental Health of Front-Line Cybersecurity Workers in the US

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Devo and Cybermindz Partner to Address the Mental Health of Front-Line…

White House Cyber Workforce Strategy: No Quick Fix for Skills Shortage

A lot of what the strategy proposes is well-intentioned but somewhat aspirational at the moment, industry experts say. This article has been indexed from Dark Reading Read the original article: White House Cyber Workforce Strategy: No Quick Fix for Skills…

Forescout’s Risk and Exposure Management Solution Delivers Streamlined, Quantitative Approach to Cyber Asset Risk Management

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Forescout’s Risk and Exposure Management Solution Delivers Streamlined, Quantitative Approach to…

Canon Inkjet Printers at Risk for Third-Party Compromise via Wi-Fi

Nearly 200 models are affected by vulnerability that may give wireless access to unauthorized third parties. This article has been indexed from Dark Reading Read the original article: Canon Inkjet Printers at Risk for Third-Party Compromise via Wi-Fi

Space Pirates Train Cyber Sabers on Russian, Serbian Organizations

The attackers have expanded beyond backdoors and recently started using Deed RAT to step up their attacks. This article has been indexed from Dark Reading Read the original article: Space Pirates Train Cyber Sabers on Russian, Serbian Organizations

‘DarkBERT’ GPT-Based Malware Trains Up on the Entire Dark Web

The DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the whole of the cyber-underground knowledge base. This article has been indexed…

Apple Users Open to Remote Control via Tricky macOS Malware

The Hidden Virtual Network Computing (hVNC) malware infests Macs and silently executes complete takeovers, with no user permission needed. It also sports persistence through reboots. This article has been indexed from Dark Reading Read the original article: Apple Users Open…

CISA: ‘Submarine’ Backdoor Torpedoes Barracuda Email Security

A China-nexus cyber espionage campaign rages on with the fourth backdoor to surface in the wild that takes advantage of the CVE-2023-2868 zero-day security bug — with severe threat of lateral movement, CISA warns. This article has been indexed from…

Lessons Not Learned From Software Supply Chain Attacks

Businesses that develop business-, mission-, or safety-critical software must learn from previous victims of software supply chain attacks. This article has been indexed from Dark Reading Read the original article: Lessons Not Learned From Software Supply Chain Attacks

What Implementing Biometrics for Authentication Looks Like

CISOs are incorporating biometrics as part of their multifactor authentication strategies. This is what they should be thinking about during implementation. This article has been indexed from Dark Reading Read the original article: What Implementing Biometrics for Authentication Looks Like

China’s Volt Typhoon APT Burrows Deeper into US Critical Infrastructure

US officials are concerned that the Beijing-directed cyberattacks could be a precursor to military disruption and broader destructive attacks on citizens and businesses. This article has been indexed from Dark Reading Read the original article: China’s Volt Typhoon APT Burrows…

Protecting Intellectual Property When It Needs to Be Shared

Companies should use a variety of tools and strategies, both technical and policy, to protect their IP from third-party risk. This article has been indexed from Dark Reading Read the original article: Protecting Intellectual Property When It Needs to Be…

Air-Gapped ICS Systems Targeted by Sophisticated Malware

Researchers uncovered new worming second-stage tools used to locally exfiltrate data from air gapped ICS environments, putting threat actors one step away from transmission of the info to a C2. This article has been indexed from Dark Reading Read the…

Abyss Locker Ransomware Looks to Drown VMware’s ESXi Servers

The 4-month-old ransomware gang is now actively targeting VMware’s virtual environments with a second variant of its custom malware. This article has been indexed from Dark Reading Read the original article: Abyss Locker Ransomware Looks to Drown VMware’s ESXi Servers

Call of Duty Self-Spreading Worm Takes Aim at Player Lobbies

The revival of the beloved online multiplayer video game was short-lived once players detected unusual activity and behavior that portended malware. This article has been indexed from Dark Reading Read the original article: Call of Duty Self-Spreading Worm Takes Aim…

Israeli Oil Refinery Taken Offline by Pro-Iranian Attackers

The apparent pro-Iranian Cyber Avengers posted images of BAZAN Groups’s SCADA systems, diagrams, and programmable logic controller (PLC) code. This article has been indexed from Dark Reading Read the original article: Israeli Oil Refinery Taken Offline by Pro-Iranian Attackers

Best Practices for Enterprise Private 5G Security

Omdia’s latest research with Trend Micro and CTOne sheds light on 5G security challenges and ways to effectively extend enterprise-grade security to 5G networks This article has been indexed from Dark Reading Read the original article: Best Practices for Enterprise…

Stark#Mule Malware Campaign Targets Koreans, Uses US Army Documents

Techniques are similar to those in previous North Korean attacks and could be linked to well-known cyber-espionage organizations. This article has been indexed from Dark Reading Read the original article: Stark#Mule Malware Campaign Targets Koreans, Uses US Army Documents

CherryBlos Malware Uses OCR to Pluck Android Users’ Cryptocurrency

The malware, along with a sister strain dubbed “FakeTrade,” was found lurking in Google Play. This article has been indexed from Dark Reading Read the original article: CherryBlos Malware Uses OCR to Pluck Android Users’ Cryptocurrency

Hack Crew Responsible for Stolen Data, NATO Investigates Claims

NATO asserts that their cyber experts continue to look into the claims and that its classified networks remain secure. This article has been indexed from Dark Reading Read the original article: Hack Crew Responsible for Stolen Data, NATO Investigates Claims

Another AI Pitfall: Digital Mirroring Opens New Cyberattack Vector

The more artificial intelligence builds out our digital personas, the easier it will become for bad actors to target us with more convincing attacks. This article has been indexed from Dark Reading Read the original article: Another AI Pitfall: Digital…

IT Ops and Security Teams Need Automation, Not Couples Therapy

When their roles intersect, IT ops and security teams often find themselves at odds. Here are some ways to foster collaboration. This article has been indexed from Dark Reading Read the original article: IT Ops and Security Teams Need Automation,…

Cyclops Launches From Stealth With Generative AI-Based Search Tool

The contextual cybersecurity search platform helps security teams gather information about the organization’s environment and security posture. This article has been indexed from Dark Reading Read the original article: Cyclops Launches From Stealth With Generative AI-Based Search Tool

Why CISOs Should Get Involved With Cyber Insurance Negotiation

Everyone benefits — the CISO, the company, and the insurer — when CISOs are included in arranging cyber insurance. This article has been indexed from Dark Reading Read the original article: Why CISOs Should Get Involved With Cyber Insurance Negotiation

Despite Post-Log4J Security Gains, Developers Can Still Improve

Developers need more software security safeguards earlier in the process, especially as AI becomes more common. This article has been indexed from Dark Reading Read the original article: Despite Post-Log4J Security Gains, Developers Can Still Improve

CompTIA ChannelCon Technology Vendor Fair Highlights Tech Solutions

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: CompTIA ChannelCon Technology Vendor Fair Highlights Tech Solutions

7 in 10 MSPs Name Data Security and Network Security As Their Top IT Priorities for 2023

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: 7 in 10 MSPs Name Data Security and Network Security As…

Millions of People Affected in MOVEit Attack on US Gov’t Vendor

Living up to its name, Maximus sees a whale of a breach that affects millions of people’s sensitive government records, including health data. This article has been indexed from Dark Reading Read the original article: Millions of People Affected in…

Ryanair Hit With Lawsuit Over Use of Facial Recognition Technology

Airline violates privacy protections of the EU’s General Data Protection Regulation, plaintiff says, seeking a $210 million fine. This article has been indexed from Dark Reading Read the original article: Ryanair Hit With Lawsuit Over Use of Facial Recognition Technology

Group-IB Co-Founder Sentenced to 14 Years in Russian Penal Colony

Ilya Sachkov, convicted of treason by the Kremlin, will serve time in one of Russia’s prison camps, which feature rigid schedules and isolation from the outside world, critics say. This article has been indexed from Dark Reading Read the original…

Israeli-Trained Azerbaijan Cyber Students Mark Inaugural Graduation

Azerbaijan minister pledges to train many more cyber specialists in the coming years to improve regional cyber-readiness. This article has been indexed from Dark Reading Read the original article: Israeli-Trained Azerbaijan Cyber Students Mark Inaugural Graduation

Companies Must Have Corporate Cybersecurity Experts, SEC Says

Enterprises now must describe their management’s expertise in cybersecurity. But what exactly does that entail? This article has been indexed from Dark Reading Read the original article: Companies Must Have Corporate Cybersecurity Experts, SEC Says

SE Labs Unveils Latest Comparative Analysis of Endpoint Detection and Response Products

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: SE Labs Unveils Latest Comparative Analysis of Endpoint Detection and Response…

Rezilion Uncovers High-Risk Vulnerabilities Missing From CISA KEV Catalog

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Rezilion Uncovers High-Risk Vulnerabilities Missing From CISA KEV Catalog

SEC Adopts New Rule on Cybersecurity Incident Disclosure Requirements

Boards must now file notice of a “material incident” within four business days, although questions remain. This article has been indexed from Dark Reading Read the original article: SEC Adopts New Rule on Cybersecurity Incident Disclosure Requirements

‘Nitrogen’ Ransomware Effort Lures IT Pros via Google, Bing Ads

Forget temps and new employees. A new malicious campaign compromises organizations through a high risk, high reward vector: IT professionals. This article has been indexed from Dark Reading Read the original article: ‘Nitrogen’ Ransomware Effort Lures IT Pros via Google,…

ETSI Dismisses Claims of ‘Backdoor’ Vulnerabilities in TETRA Standard

Nonetheless, European standards body revised the wireless standard and insists its integrity remains sound. This article has been indexed from Dark Reading Read the original article: ETSI Dismisses Claims of ‘Backdoor’ Vulnerabilities in TETRA Standard

Threat Intelligence Is Growing — Here’s How SOCs Can Keep Up

By integrating XDR and SIEM, security professionals can automate correlation and prioritization of alerts across a broad swath of security infrastructure. This article has been indexed from Dark Reading Read the original article: Threat Intelligence Is Growing — Here’s How…

KnowBe4 Phishing Test Results Reveal Half of Top Malicious Email Subjects Are HR Related

KnowBe4 releases Q2 2023 global phishing report and finds HR related email subjects utilized as a phishing strategy and make up 50% of top email subjects. This article has been indexed from Dark Reading Read the original article: KnowBe4 Phishing…

50% of Zero Trust Programs Risk Failure According to PlainID Survey

CISOs consider zero trust a hot security ticket, but organizations run the risk of leaving gaps in their security infrastructure. This article has been indexed from Dark Reading Read the original article: 50% of Zero Trust Programs Risk Failure According…

Zero-Day Vulnerabilities Discovered in Global Emergency Services Communications Protocol

Weak encryption algorithms leave radio communications open to attack and abuse. This article has been indexed from Dark Reading Read the original article: Zero-Day Vulnerabilities Discovered in Global Emergency Services Communications Protocol

Beyond ChatGPT: Organizations Must Protect Themselves Against the Power of AI

Artificial intelligence-powered threats are already affecting businesses, schools, hospitals, and individuals, and it will only get worse as AI advances. This article has been indexed from Dark Reading Read the original article: Beyond ChatGPT: Organizations Must Protect Themselves Against the…

Managing Human Risk: Discoveries From SANS 2023 Security Awareness Report

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Managing Human Risk: Discoveries From SANS 2023 Security Awareness Report

TARA Partners With Plante Moran to Deliver Risk-Based Vulnerability Management

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: TARA Partners With Plante Moran to Deliver Risk-Based Vulnerability Management

OneTrust Secures $150M Investment Led by Generation Investment Management

Funding will accelerate platform innovation as organizations scale trust across privacy, security, ethics, and ESG. This article has been indexed from Dark Reading Read the original article: OneTrust Secures $150M Investment Led by Generation Investment Management

China Propaganda Spreads via US News Sites, Freelancers, Times Square

A widespread disinformation campaign aimed at Americans wasn’t that effective, but it was certainly creative, even slipping in influence articles to legitimate news outlets like AZCentral.com. This article has been indexed from Dark Reading Read the original article: China Propaganda…

KillNet’s Kremlin Connection Unclear as the Cybercrime Collective Grows

KillNet is amassing members, capabilities, and know-how, as it looks to consolidate cybercrime power under its own umbrella. This article has been indexed from Dark Reading Read the original article: KillNet’s Kremlin Connection Unclear as the Cybercrime Collective Grows

What C-Suite Leaders Need to Know About XDR

Considering adopting extended detection and response (XDR) in your cybersecurity defense program? Here’s what you need to know about the technology platform. This article has been indexed from Dark Reading Read the original article: What C-Suite Leaders Need to Know…

BGP Software Vulnerabilities Under the Microscope in Black Hat Session

In a nod to its centrality in IP networking, a Forescout researcher will parse overlooked vulnerabilities in the Border Gateway Protocol at Black Hat USA. This article has been indexed from Dark Reading Read the original article: BGP Software Vulnerabilities…

Banks In Attackers’ Crosshairs, Via Open Source Software Supply Chain

In separate targeted incidents, threat actors tried to upload malware into the Node Package Manager registry to gain access and steal credentials. This article has been indexed from Dark Reading Read the original article: Banks In Attackers’ Crosshairs, Via Open…

CVSS 4.0 Is Here, But Prioritizing Patches Still a Hard Problem

CVSS Version 4 arguably performs better, but companies also need to tailor any measure of threat to their own environment to quickly evaluate new software bugs for patching order. This article has been indexed from Dark Reading Read the original…