Tag: Dark Reading

Microsoft to Block Excel Add-ins to Stop Office Exploits

The company will block the configuration files, which interact with Web applications — since threat actors increasingly use the capability to install malicious code. This article has been indexed from Dark Reading Read the original article: Microsoft to Block Excel…

Wallarm Aims to Reduce the Harm From Compromised APIs

API Leak Management software discovers exposed API keys and other secrets, blocks their use, and monitors for abuse, the company says. This article has been indexed from Dark Reading Read the original article: Wallarm Aims to Reduce the Harm From…

Hunting Insider Threats on the Dark Web

Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats. This article has been indexed from Dark Reading Read the original article: Hunting Insider Threats on the Dark Web

GPT Emerges as Key AI Tech for Security Vendors

Orca Security is one of the companies integrating conversational AI technology into its products. This article has been indexed from Dark Reading Read the original article: GPT Emerges as Key AI Tech for Security Vendors

Compromised Zendesk Employee Credentials Lead to Breach

Zendesk has alerted customers to a successful SMS phishing campaign that has exposed “service data,” but details remain scarce. This article has been indexed from Dark Reading Read the original article: Compromised Zendesk Employee Credentials Lead to Breach

PayPal Breach Exposed PII of Nearly 35K Accounts

The credential-stuffing attack, likely fueled by password reuse, yielded personal identifiable information that can be used to verify the authenticity of previously stolen data. This article has been indexed from Dark Reading Read the original article: PayPal Breach Exposed PII…

EmojiDeploy Attack Chain Targets Misconfigured Azure Service

Multiple misconfigurations in a service that underpins many Azure features could have allowed an attacker to remotely compromise a cloud user’s system. This article has been indexed from Dark Reading Read the original article: EmojiDeploy Attack Chain Targets Misconfigured Azure…

Attackers Crafted Custom Malware for Fortinet Zero-Day

The “BoldMove” backdoor demonstrates a high level of knowledge of FortiOS, according to Mandiant researchers, who said the attacker appears to be based out of China. This article has been indexed from Dark Reading Read the original article: Attackers Crafted…

Massive Adware Campaign Shuttered

Mainly Apple iOS in-app ads were targeted, injecting malicious JavaScript code to rack up phony views. This article has been indexed from Dark Reading Read the original article: Massive Adware Campaign Shuttered

Shift Identity Left: Preventing Identity-Based Breaches

Traditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches. This article has been indexed from Dark Reading Read the original article: Shift Identity Left: Preventing…

Name That Toon: Poker Hand

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Toon: Poker Hand

Ethically Exploiting Vulnerabilities: A Play-by-Play

There’s a fine line between a hacker and an attacker, but it pays to be proactive. Consider tests by ethical hackers, a red team, or pen testers, and then bolster your company’s defenses against malicious attacks. This article has been…

Cybercriminals Target Telecom Provider Networks

The growing use of mobile devices for MFA and the proliferation of 5G and VoIP in general could result in more attacks in future, experts say. This article has been indexed from Dark Reading Read the original article: Cybercriminals Target…

Vulnerable Historian Servers Imperil OT Networks

These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks. This article has been indexed from Dark Reading Read the original article: Vulnerable Historian Servers Imperil OT Networks

Governance in the Cloud Shifts Left

CISOs’ top cloud challenge is harmonizing standards, policies, and procedures across blended environments. This article has been indexed from Dark Reading Read the original article: Governance in the Cloud Shifts Left

Cybersecurity and the Myth of Quiet Quitting

People are working harder than ever, but they’re not happy about it — and the insider threat is all too real. This article has been indexed from Dark Reading Read the original article: Cybersecurity and the Myth of Quiet Quitting

Okta Expands No-Code Offerings for Identity Cloud

With Actions Integrations, Okta is expanding its no-code offerings to help administrators manage and customize their identity workflow. This article has been indexed from Dark Reading Read the original article: Okta Expands No-Code Offerings for Identity Cloud

Why Businesses Need to Think Like Hackers This Year

Security professionals must update their skill sets and be proactive to stay ahead of cybercriminals. It’s time to learn to think and act like an attacker to cope with the cyber “new normal.” This article has been indexed from Dark…

3 Lessons Learned in Vulnerability Management

In 2022, multiple high-profile vulnerabilities like Log4j and OpenSSL provided important takeaways for future public reporting. This article has been indexed from Dark Reading Read the original article: 3 Lessons Learned in Vulnerability Management

5 Cybersecurity Tips for Higher Education Institutions

Following these basic cybersecurity hygiene policies can help make data more secure and protect colleges and universities from becoming the next ransomware headline. The steps aren’t complicated, and they won’t break the bank. This article has been indexed from Dark…

Malware Comes Standard With This Android TV Box on Amazon

The bargain T95 Android TV device was delivered with preinstalled malware, adding to a trend of Droid devices coming out-of-the-box tainted. This article has been indexed from Dark Reading Read the original article: Malware Comes Standard With This Android TV…

Fast-Track Secure Development Using Lite Threat Modeling

Establish clear and consistent processes and standards to scale lite threat modeling’s streamlined approach across your organization. This article has been indexed from Dark Reading Read the original article: Fast-Track Secure Development Using Lite Threat Modeling

Software Supply Chain Security Needs a Bigger Picture

SBOMs aren’t enough. OpenSSF’s Alpha-Omega brings in new blood to help secure the open source projects most impactful to the software supply chain. This article has been indexed from Dark Reading Read the original article: Software Supply Chain Security Needs…

Cloudflare Expands Relationship With Microsoft

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Cloudflare Expands Relationship With Microsoft

Kubernetes-Related Security Projects to Watch in 2023

Organizations must be vigilant about balancing performance gains with security, governance, and compliance as they expand their use of Kubernetes. This article has been indexed from Dark Reading Read the original article: Kubernetes-Related Security Projects to Watch in 2023

Use CircleCI? Here Are 3 Steps You Need to Take

This Tech Tip outlines the steps enterprise defenders should take as they protect their data in cloud environments in response to the security incident with the CI/CD platform. This article has been indexed from Dark Reading Read the original article:…

Governance in the Cloud Shifts Left

CISOs’ top cloud challenge is harmonizing standards, policies, and procedures across blended environments. This article has been indexed from Dark Reading Read the original article: Governance in the Cloud Shifts Left