A Swiss hacker poking around in an unprotected Jenkins development server belonging to CommuteAir accessed the names and birthdates of some 1.5 million people on a TSA no-fly list from 2019. This article has been indexed from Dark Reading Read…
Tag: Dark Reading
‘DragonSpark’ Malware: East Asian Cyberattackers Create an OSS Frankenstein
Hackers cleverly cobbled together a suite of open source software — including a novel RAT — and hijacked servers owned by ordinary businesses. This article has been indexed from Dark Reading Read the original article: ‘DragonSpark’ Malware: East Asian Cyberattackers…
The 2022-2023 Cloud Awards Announces Its Finalists
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: The 2022-2023 Cloud Awards Announces Its Finalists
Armis State of Cyberwarfare and Trends Report: 2022-2023 Highlights Global IT and Security Professionals’ Sentiment on Cyberwarfare
Respondents indicate organizations are unprepared to handle cyberwarfare, there’s no one-size-fits-all response to ransomware, and cybersecurity spending is on the rise. This article has been indexed from Dark Reading Read the original article: Armis State of Cyberwarfare and Trends Report:…
Microsoft to Block Excel Add-ins to Stop Office Exploits
The company will block the configuration files, which interact with Web applications — since threat actors increasingly use the capability to install malicious code. This article has been indexed from Dark Reading Read the original article: Microsoft to Block Excel…
Security and the Electric Vehicle Charging Infrastructure
When EVs and smart chargers plug in to critical infrastructure, what can go wrong? Plenty. This article has been indexed from Dark Reading Read the original article: Security and the Electric Vehicle Charging Infrastructure
Wallarm Aims to Reduce the Harm From Compromised APIs
API Leak Management software discovers exposed API keys and other secrets, blocks their use, and monitors for abuse, the company says. This article has been indexed from Dark Reading Read the original article: Wallarm Aims to Reduce the Harm From…
Pair of Galaxy App Store Bugs Offer Cyberattackers Mobile Device Access
Devices running Android 12 and below are at risk of attackers downloading apps that direct users to a malicious domain. This article has been indexed from Dark Reading Read the original article: Pair of Galaxy App Store Bugs Offer Cyberattackers…
Organizations Likely to Experience Ransomware Threat in the Next 24 Months, According to Info-Tech Research Group
Security leaders must build resiliency against these complex attacks immediately. This article has been indexed from Dark Reading Read the original article: Organizations Likely to Experience Ransomware Threat in the Next 24 Months, According to Info-Tech Research Group
Magnet Forensics Inc. Enters Into Definitive Agreement to be Acquired by Thoma Bravo
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Magnet Forensics Inc. Enters Into Definitive Agreement to be Acquired by…
SOCs to Face Greater Challenges From Cybercriminals Targeting Governments and Media in 2023
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: SOCs to Face Greater Challenges From Cybercriminals Targeting Governments and Media…
FanDuel Sportsbook Bettors Exposed in Mailchimp Breach
Amid all the NFL playoff action, FanDuel has sent an email warning to gamblers that their data was exposed in its third-party breach, putting them at risk for phishing attacks. This article has been indexed from Dark Reading Read the…
No One Wants to Be Governed, Everyone Wants to Be Helped
Here’s how a security team can present itself to citizen developers as a valuable resource rather than a bureaucratic roadblock. This article has been indexed from Dark Reading Read the original article: No One Wants to Be Governed, Everyone Wants…
Gartner Predicts 10% of Large Enterprises Will Have a Mature and Measurable Zero-Trust Program in Place by 2026
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Gartner Predicts 10% of Large Enterprises Will Have a Mature and…
Cybersecurity Worries Around Hybrid Working Drop, but Many IT Leaders Still Concerned Over Cyber-Skills Gap
S-RM reports show that cybersecurity concerns surrounding hybrid work prevail for 37% of organizations. This article has been indexed from Dark Reading Read the original article: Cybersecurity Worries Around Hybrid Working Drop, but Many IT Leaders Still Concerned Over Cyber-Skills…
Hunting Insider Threats on the Dark Web
Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats. This article has been indexed from Dark Reading Read the original article: Hunting Insider Threats on the Dark Web
Supply Chain Security Global Market Report 2022: Sector to Reach $3.5 Billion by 2027 at an 11% CAGR
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Supply Chain Security Global Market Report 2022: Sector to Reach $3.5…
Ransomware Profits Decline as Victims Dig In, Refuse to Pay
Two new reports show ransomware revenues for threat actors dropped sharply in 2022 as more victims ignored ransom demands. This article has been indexed from Dark Reading Read the original article: Ransomware Profits Decline as Victims Dig In, Refuse to…
T-Mobile Breached Again, This Time Exposing 37M Customers’ Data
This time around, weak API security allowed a threat actor to access account information, the mobile phone giant reported. This article has been indexed from Dark Reading Read the original article: T-Mobile Breached Again, This Time Exposing 37M Customers’ Data
GPT Emerges as Key AI Tech for Security Vendors
Orca Security is one of the companies integrating conversational AI technology into its products. This article has been indexed from Dark Reading Read the original article: GPT Emerges as Key AI Tech for Security Vendors
Compromised Zendesk Employee Credentials Lead to Breach
Zendesk has alerted customers to a successful SMS phishing campaign that has exposed “service data,” but details remain scarce. This article has been indexed from Dark Reading Read the original article: Compromised Zendesk Employee Credentials Lead to Breach
Critical Manufacturing Sector in the Bull’s-eye
Serious security flaws go unpatched, and ransomware attacks increase against manufacturers. This article has been indexed from Dark Reading Read the original article: Critical Manufacturing Sector in the Bull’s-eye
The Evolution of Account Takeover Attacks: Initial Access Brokers for IoT
Head off account takeover attacks by being proactive about IoT security. Start with designing and building better security protocols into IoT devices, always change weak default configurations, and regularly apply patches to ensure that IoT devices are secure. This article…
New Survey Sheds Light on Why Enterprises Struggle to Thwart API Attacks
Corsha’s Annual State of API Secrets Management Report finds over 50% of respondents suffered a data breach due to compromised API secrets. This article has been indexed from Dark Reading Read the original article: New Survey Sheds Light on Why…
PayPal Breach Exposed PII of Nearly 35K Accounts
The credential-stuffing attack, likely fueled by password reuse, yielded personal identifiable information that can be used to verify the authenticity of previously stolen data. This article has been indexed from Dark Reading Read the original article: PayPal Breach Exposed PII…
EmojiDeploy Attack Chain Targets Misconfigured Azure Service
Multiple misconfigurations in a service that underpins many Azure features could have allowed an attacker to remotely compromise a cloud user’s system. This article has been indexed from Dark Reading Read the original article: EmojiDeploy Attack Chain Targets Misconfigured Azure…
Attackers Crafted Custom Malware for Fortinet Zero-Day
The “BoldMove” backdoor demonstrates a high level of knowledge of FortiOS, according to Mandiant researchers, who said the attacker appears to be based out of China. This article has been indexed from Dark Reading Read the original article: Attackers Crafted…
Massive Adware Campaign Shuttered
Mainly Apple iOS in-app ads were targeted, injecting malicious JavaScript code to rack up phony views. This article has been indexed from Dark Reading Read the original article: Massive Adware Campaign Shuttered
Shift Identity Left: Preventing Identity-Based Breaches
Traditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches. This article has been indexed from Dark Reading Read the original article: Shift Identity Left: Preventing…
Roaming Mantis Uses DNS Changers to Target Users via Compromised Public Routers
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Roaming Mantis Uses DNS Changers to Target Users via Compromised Public…
Name That Toon: Poker Hand
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Toon: Poker Hand
As Social Engineering Tactics Change, So Must Your Security Training
Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization. This article has been indexed from Dark Reading Read the original article: As Social Engineering Tactics Change, So Must Your Security Training
The Media Industry Is the Most Vulnerable to Cyber Attacks, Report Shows
The report highlights concerning security stats following two years of extreme tech growth. This article has been indexed from Dark Reading Read the original article: The Media Industry Is the Most Vulnerable to Cyber Attacks, Report Shows
SynSaber Releases ICS Vulnerabilities & CVEs Report Covering Second Half of 2022
ICS/OT cybersecurity firm finds 35% of CVEs in second half of 2022 unpatchable. This article has been indexed from Dark Reading Read the original article: SynSaber Releases ICS Vulnerabilities & CVEs Report Covering Second Half of 2022
International Council of E-Commerce Consultants Launches Cybersecurity Essentials Professional Certificate Program on edX
New program enables students and early career professionals to learn critical skills required in today’s entry-level cybersecurity field, helping address urgent cyber workforce jobs gap. This article has been indexed from Dark Reading Read the original article: International Council of…
KnowBe4 to Offer $10,000 Women in Cybersecurity Scholarship and (ISC) 2 Certification Education Package
KnowBe4 partners with the Center for Cyber Safety and Education to bolster women in cybersecurity for the fourth consecutive year. This article has been indexed from Dark Reading Read the original article: KnowBe4 to Offer $10,000 Women in Cybersecurity Scholarship…
SecurityGen Identifies the Cybersecurity Priorities for Mobile Operators in 2023
Open architecture, non-standalone roaming, nation-state attacks, ransomware, and the need for more industry collaboration are among the major 5G security challenges that operators must address in the year ahead. This article has been indexed from Dark Reading Read the original…
New Research From EMA Reveals How Organizations Are Struggling to Develop Secure Software Applications
Research shows that over 50% of organizations performing software development struggle with fully integrating security into their software development lifecycle. This article has been indexed from Dark Reading Read the original article: New Research From EMA Reveals How Organizations Are…
Mendix and Software Improvement Group Launch a New Software Application Quality and Security Scanning Solution
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Mendix and Software Improvement Group Launch a New Software Application Quality…
Ethically Exploiting Vulnerabilities: A Play-by-Play
There’s a fine line between a hacker and an attacker, but it pays to be proactive. Consider tests by ethical hackers, a red team, or pen testers, and then bolster your company’s defenses against malicious attacks. This article has been…
Cybercriminals Target Telecom Provider Networks
The growing use of mobile devices for MFA and the proliferation of 5G and VoIP in general could result in more attacks in future, experts say. This article has been indexed from Dark Reading Read the original article: Cybercriminals Target…
Data Security in Multicloud: Limit Access, Increase Visibility
Ensuring that data can be easily discovered, classified, and secured is a crucial cornerstone of a data security strategy. This article has been indexed from Dark Reading Read the original article: Data Security in Multicloud: Limit Access, Increase Visibility
How Would the FTC Rule on Noncompetes Affect Data Security?
Without noncompetes, how do organizations make sure employees aren’t taking intellectual property when they go work to work for a competitor? This article has been indexed from Dark Reading Read the original article: How Would the FTC Rule on Noncompetes…
Vulnerable Historian Servers Imperil OT Networks
These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks. This article has been indexed from Dark Reading Read the original article: Vulnerable Historian Servers Imperil OT Networks
ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
The powerful AI bot can produce malware without malicious code, making it tough to mitigate. This article has been indexed from Dark Reading Read the original article: ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
Sophos Cuts Jobs to Focus on Cybersecurity Services
Layoffs intended to cut costs, help company shift its focus on cybersecurity services, Sophos says. This article has been indexed from Dark Reading Read the original article: Sophos Cuts Jobs to Focus on Cybersecurity Services
Founder and Majority Owner of Cryptocurrency Exchange Charged With Processing Over $700 Million of Illicit Funds
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Founder and Majority Owner of Cryptocurrency Exchange Charged With Processing Over…
KnowBe4 2022 Phishing Test Report Confirms Business-Related Emails Trend
KnowBe4 releases overall 2022 and Q4 2022 global phishing test reports and finds business-related emails continue to be utilized as a phishing strategy and reveal top holiday email phishing subjects. This article has been indexed from Dark Reading Read the…
DoControl Announces SaaS Security Platform Expansion With Shadow Apps Module Launch
New module introduces shadow SaaS application discovery, monitoring, and remediation to protect businesses from supply chain attacks. This article has been indexed from Dark Reading Read the original article: DoControl Announces SaaS Security Platform Expansion With Shadow Apps Module Launch
ChatGPT Opens New Opportunities for Cybercriminals: 5 Ways for Organizations to Get Ready
From updating employee education and implementing stronger authentication protocols to monitoring corporate accounts and adopting a zero-trust model, companies can better prepare defenses against chatbot-augmented attacks. This article has been indexed from Dark Reading Read the original article: ChatGPT Opens…
ICS Confronted by Attackers Armed With New Motives, Tactics, and Malware
Threat actors are diversifying across all aspects to attack critical infrastructure, muddying the threat landscape, and forcing industrial organizations to rethink their security. This article has been indexed from Dark Reading Read the original article: ICS Confronted by Attackers Armed…
Unpatched Zoho ManageEngine Products Open to Possible Attack
The latest critical bug is exploitable in dozens of ManageEngine products and exposes systems to catastrophic risks, researchers warn. This article has been indexed from Dark Reading Read the original article: Unpatched Zoho ManageEngine Products Open to Possible Attack
Lares Research Highlights Top 5 Penetration Test Findings From 2022
Range of Addressable Concerns Includes “Brute Forcing Accounts with Weak Passwords” and “Excessive File System Permissions.” This article has been indexed from Dark Reading Read the original article: Lares Research Highlights Top 5 Penetration Test Findings From 2022
Governance in the Cloud Shifts Left
CISOs’ top cloud challenge is harmonizing standards, policies, and procedures across blended environments. This article has been indexed from Dark Reading Read the original article: Governance in the Cloud Shifts Left
Cybersecurity and the Myth of Quiet Quitting
People are working harder than ever, but they’re not happy about it — and the insider threat is all too real. This article has been indexed from Dark Reading Read the original article: Cybersecurity and the Myth of Quiet Quitting
New Coalfire Report Reveals CISOs Rising Influence
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: New Coalfire Report Reveals CISOs Rising Influence
Abacus Group Acquires Gotham Security and GoVanguard to Expand Cybersecurity Service Offerings
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Abacus Group Acquires Gotham Security and GoVanguard to Expand Cybersecurity Service…
Okta Expands No-Code Offerings for Identity Cloud
With Actions Integrations, Okta is expanding its no-code offerings to help administrators manage and customize their identity workflow. This article has been indexed from Dark Reading Read the original article: Okta Expands No-Code Offerings for Identity Cloud
Secrets Rotation Recommended After CircleCI Security Incident
Companies are being urged to update 0Auth, runner, and project API tokens, along with other secrets stashed with CircleCI. This article has been indexed from Dark Reading Read the original article: Secrets Rotation Recommended After CircleCI Security Incident
Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
A rapid increase in the number of operators in the space — the “locksmiths” of the cyber underground — has made it substantially cheaper for cybercriminals to buy access to target networks. This article has been indexed from Dark Reading…
Unpatched Zoho MangeEngine Products Under Active Cyberattack
The latest critical bug is exploitable in dozens of ManageEngine products and exposes systems to catastrophic risks, researchers warn. This article has been indexed from Dark Reading Read the original article: Unpatched Zoho MangeEngine Products Under Active Cyberattack
VIPRE Security Group Launches New Endpoint Detection and Response (EDR) Technology Built for SMEs
VIPRE Endpoint Detection & Response (EDR) delivers streamlined, sophisticated, high-performing cloud-based EDR management in a single, easy-to-navigate console. This article has been indexed from Dark Reading Read the original article: VIPRE Security Group Launches New Endpoint Detection and Response (EDR)…
Why Businesses Need to Think Like Hackers This Year
Security professionals must update their skill sets and be proactive to stay ahead of cybercriminals. It’s time to learn to think and act like an attacker to cope with the cyber “new normal.” This article has been indexed from Dark…
A New Era Is Dawning in Cybersecurity, but Only the Best Algorithms Will Win
Open source AI is lowering the barrier of entry for cybercriminals. Security teams must consider the right way to apply defensive AI to counter this threat. This article has been indexed from Dark Reading Read the original article: A New…
Cygna Labs Introduces Entitlement and Security for Active Directory
Standalone product provides permission insights for Active Directory security and compliance. This article has been indexed from Dark Reading Read the original article: Cygna Labs Introduces Entitlement and Security for Active Directory
3 Lessons Learned in Vulnerability Management
In 2022, multiple high-profile vulnerabilities like Log4j and OpenSSL provided important takeaways for future public reporting. This article has been indexed from Dark Reading Read the original article: 3 Lessons Learned in Vulnerability Management
5 Cybersecurity Tips for Higher Education Institutions
Following these basic cybersecurity hygiene policies can help make data more secure and protect colleges and universities from becoming the next ransomware headline. The steps aren’t complicated, and they won’t break the bank. This article has been indexed from Dark…
Microsoft Patches 4 SSRF Flaws in Separate Azure Cloud Services
Two of the vulnerabilities — in Azure Functions and Azure Digital Twins — required no account authentication for an attacker to exploit them. This article has been indexed from Dark Reading Read the original article: Microsoft Patches 4 SSRF Flaws in…
The Dangers of Default Cloud Configurations
Default settings can leave blind spots but avoiding this issue can be done. This article has been indexed from Dark Reading Read the original article: The Dangers of Default Cloud Configurations
Java, .NET Developers Prone to More Frequent Vulnerabilities
About three-quarters of Java and .NET applications have vulnerabilities from the OWASP Top 10 list, while only 55% of JavaScript codebases have such flaws, according to testing data. This article has been indexed from Dark Reading Read the original article:…
Norton LifeLock Warns on Password Manager Account Compromises
Password manager accounts may have, ironically, been compromised via simple credential stuffing, thanks to password reuse. This article has been indexed from Dark Reading Read the original article: Norton LifeLock Warns on Password Manager Account Compromises
Why Mean Time to Repair Is Not Always A Useful Security Metric
Analyzing and learning from incidents is the ideal path to finding more insightful data and metrics, according to the VOID report. This article has been indexed from Dark Reading Read the original article: Why Mean Time to Repair Is Not…
Malware Comes Standard With This Android TV Box on Amazon
The bargain T95 Android TV device was delivered with preinstalled malware, adding to a trend of Droid devices coming out-of-the-box tainted. This article has been indexed from Dark Reading Read the original article: Malware Comes Standard With This Android TV…
Sneaky New Stealer Woos Corporate Workers Through Fake Zoom Downloads
Rhadamanthys spreads through Google Ads that redirect to bogus download sites for popular workforce software — as well as through more typical malicious emails. This article has been indexed from Dark Reading Read the original article: Sneaky New Stealer Woos…
CircleCI, LastPass, Okta, and Slack: Cyberattackers Pivot to Target Core Enterprise Tools
High-profile software provider compromises in the past few months show that threat actors are actively targeting the services underpinning corporate infrastructure. Here’s what to do about it. This article has been indexed from Dark Reading Read the original article: CircleCI,…
Fast-Track Secure Development Using Lite Threat Modeling
Establish clear and consistent processes and standards to scale lite threat modeling’s streamlined approach across your organization. This article has been indexed from Dark Reading Read the original article: Fast-Track Secure Development Using Lite Threat Modeling
SailPoint Acquires SecZetta to Provide Identity Security for Non-Employee Identities
This move accelerates the company’s vision of becoming the de facto identity security platform of choice for the modern enterprise. This article has been indexed from Dark Reading Read the original article: SailPoint Acquires SecZetta to Provide Identity Security for…
WEF’s Global Risks Report 2023 Keeps Cybersecurity on the Agenda
Critical national infrastructure, widespread cybercrime, and cyber insecurity are major risks in the report This article has been indexed from Dark Reading Read the original article: WEF’s Global Risks Report 2023 Keeps Cybersecurity on the Agenda
Software Supply Chain Security Needs a Bigger Picture
SBOMs aren’t enough. OpenSSF’s Alpha-Omega brings in new blood to help secure the open source projects most impactful to the software supply chain. This article has been indexed from Dark Reading Read the original article: Software Supply Chain Security Needs…
$20K Buys Insider Access to Telegram Servers, Dark Web Ad Claims
In the ad, cybercriminals are offering to sell employee-level access to Telegram, researchers warn. This article has been indexed from Dark Reading Read the original article: $20K Buys Insider Access to Telegram Servers, Dark Web Ad Claims
Researchers Find ‘Digital Crime Haven’ While Investigating Magecart Activity
A security vendor’s investigation of infrastructure associated with a new, crypto-focused Magecart skimmer leads to discovery of cryptoscam sites, malware distribution marketplace, Bitcoin mixers, and more. This article has been indexed from Dark Reading Read the original article: Researchers Find…
Darktrace Publishes 2022 Cyberattack Trend Data For Energy, Healthcare & Retail Sectors Globally
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Darktrace Publishes 2022 Cyberattack Trend Data For Energy, Healthcare & Retail…
Cloudflare Expands Relationship With Microsoft
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Cloudflare Expands Relationship With Microsoft
New Survey Sheds Light on Why Enterprises Struggle to Thwart API Attacks
Corsha’s Annual State of API Secrets Management Report finds over 50% of respondents suffered a data breach due to compromised API secrets. This article has been indexed from Dark Reading Read the original article: New Survey Sheds Light on Why…
Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available
Unpatched Cisco bugs, tracked as CVE-2023-20025 and CVE-2023-20026, allow lateral movement, data theft, and malware infestations. This article has been indexed from Dark Reading Read the original article: Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available
SailPoint Acquires SecZetta to Provide Comprehensive Identity Security for Non-Employee Identities
This move accelerates the company’s vision of becoming the de facto identity security platform of choice for the modern enterprise. This article has been indexed from Dark Reading Read the original article: SailPoint Acquires SecZetta to Provide Comprehensive Identity Security…
Securing the World’s Energy Systems: Where Physical Security and Cybersecurity Must Meet
Energy has become the new battleground for both physical and cyber security warfare, driven by nation state actors, increasing financial rewards for ransomware gangs and decentralized devices. Chris Price reports. This article has been indexed from Dark Reading Read the…
Big Prizes, Cash on Offer for Joining ‘DDosia’ Anti-Ukraine Cyberattack Project
Russia’s NoName057(16) group offers incentives and prizes via Telegram channel for “heroes” to mount attacks against targets within Ukraine and pro-Ukrainian countries. This article has been indexed from Dark Reading Read the original article: Big Prizes, Cash on Offer for…
Man Sentenced for Role in International Telemarketing Scheme
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Man Sentenced for Role in International Telemarketing Scheme
Hack the Box Secures $55 Million in Series B Funding Led by Carlyle
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Hack the Box Secures $55 Million in Series B Funding Led…
1 in 3 Organizations Do Not Provide Any Cybersecurity Training to Remote Workers Despite a Majority of Employees Having Access to Critical Data
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: 1 in 3 Organizations Do Not Provide Any Cybersecurity Training to…
Kubernetes-Related Security Projects to Watch in 2023
Organizations must be vigilant about balancing performance gains with security, governance, and compliance as they expand their use of Kubernetes. This article has been indexed from Dark Reading Read the original article: Kubernetes-Related Security Projects to Watch in 2023
Use CircleCI? Here Are 3 Steps You Need to Take
This Tech Tip outlines the steps enterprise defenders should take as they protect their data in cloud environments in response to the security incident with the CI/CD platform. This article has been indexed from Dark Reading Read the original article:…
Hacker Space Rogue to Release Book on Hacking Group L0pht Heavy Industries in February
Space Rogue gives a behind the scenes look at the famous hacking group, their senate testimony, and how their legacy continues to shape the security of the online world today. This article has been indexed from Dark Reading Read the…
5 Ways Cybersecurity for Cloud Workloads Will Evolve in 2023
Organizations are looking for new methods to safeguard the virtual machines, containers, and workload services they use in the cloud. This article has been indexed from Dark Reading Read the original article: 5 Ways Cybersecurity for Cloud Workloads Will Evolve…
Why Analyzing Past Incidents Helps Teams More Than Usual Security Metrics
Traditional metrics don’t reflect real-world severity. Instead, analyzing previously reported incidents can help teams decide how to react, a new report says. This article has been indexed from Dark Reading Read the original article: Why Analyzing Past Incidents Helps Teams…
Better Phishing, Easy Malicious Implants: How AI Could Change Cyberattacks
Current defenses are able to protect against today’s AI-enhanced cybersecurity threats, but that won’t be the case for long as these attacks become more effective and sophisticated. This article has been indexed from Dark Reading Read the original article: Better…
Catchpoint Announces Solution to Monitor and Protect Companies From BGP Incidents
Catchpoint’s Internet Performance Monitoring Platform helps IT teams identify and mitigate BGP incidents, including hijack attempts and routing issues, with the industry’s broadest network of vantage points in the world drawing on real-time BGP monitoring. This article has been indexed…
Cyberattack Cancels Classes for Des Moines Public Schools
School to resume Thursday, Jan. 12, after Iowa school district detected unusual network activity and pulled the plug. This article has been indexed from Dark Reading Read the original article: Cyberattack Cancels Classes for Des Moines Public Schools
Governance in the Cloud Shifts Left
CISOs’ top cloud challenge is harmonizing standards, policies, and procedures across blended environments. This article has been indexed from Dark Reading Read the original article: Governance in the Cloud Shifts Left