This article has been indexed from Dark Reading With the easing of pandemic-related restrictions, enterprise defenders report they are investigating security operations technology to manage new risks that emerged over the past year. Read the original article: Enterprises Planning SecOps…
Tag: Dark Reading
More Than 90% of Q2 Malware Was Hidden in Encrypted Traffic
This article has been indexed from Dark Reading Analysis of threat trends from last quarter reveals attackers ramped up their use of fileless malware, and zero-day malware accounted for almost two-thirds of all detections. Read the original article: More Than…
Akamai Acquires Guardicore in $600M Deal
This article has been indexed from Dark Reading In other acquisition news today, Arctic Wolf announced it will acquire Habitu8, a managed security awareness platform, for an undisclosed amount. Read the original article: Akamai Acquires Guardicore in $600M Deal
10 Recent Examples of How Insider Threats Can Cause Big Breaches and Damage
This article has been indexed from Dark Reading Theft of intellectual property, sabotage, exposure of sensitive data and more were caused by malicious behavior and negligence at these organizations Read the original article: 10 Recent Examples of How Insider Threats…
FireEye Products & McAfee Enterprise Merge to Create $2B Entity
This article has been indexed from Dark Reading The combined company will have 5,000 employees, more than 40,000 customers, and nearly $2 billion in revenue, officials report. Read the original article: FireEye Products & McAfee Enterprise Merge to Create $2B…
You’re Going to Be the Victim of a Ransomware Attack
This article has been indexed from Dark Reading That’s not admitting defeat. It’s preparing for success. Read the original article: You’re Going to Be the Victim of a Ransomware Attack
The New Security Basics: 10 Most Common Defensive Actions
This article has been indexed from Dark Reading Companies now commonly collect security metrics from their software development life cycle, implement basic security measures, and define their obligations to protect user data as part of a basic security strategy. Read…
5 Ways to Become a Better Cyber-Threat Exterminator
This article has been indexed from Dark Reading Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and improve incident response times. Read the original article: 5 Ways to Become a Better Cyber-Threat Exterminator
50% of Servers Have Weak Security Long After Patches Are Released
This article has been indexed from Dark Reading Many servers remain vulnerable to high-severity flaws in Microsoft Exchange Server, VMware vCenter, Oracle WebLogic, and other popular products and services. Read the original article: 50% of Servers Have Weak Security Long…
Startup Beyond Identity Now Offers Passwordless Multifactor Authentication for Consumers
This article has been indexed from Dark Reading The announcement comes two weeks after Microsoft gave users the option to fully remove passwords from their accounts. Read the original article: Startup Beyond Identity Now Offers Passwordless Multifactor Authentication for Consumers
Shades of SolarWinds Attack Malware Found in New ‘Tomiris’ Backdoor
This article has been indexed from Dark Reading Malware contains similarities that suggest a possible link to malware that Russia’s DarkHalo group used in its massive supply chain attack, researchers say. Read the original article: Shades of SolarWinds Attack Malware…
1Password and Fastmail Partner to Boost Online Privacy
This article has been indexed from Dark Reading Allows users to securely generate unique email aliases, adding an extra layer of online privacy. Read the original article: 1Password and Fastmail Partner to Boost Online Privacy
Dell Technologies Addresses Modern Support and Security
This article has been indexed from Dark Reading Services and security updates deliver customized IT support and secure PC experiences for work-from-anywhere employees. Read the original article: Dell Technologies Addresses Modern Support and Security
Salt Security Finds Widespread Elastic Stack API Security Vulnerability that Exposes Customer and System Data
This article has been indexed from Dark Reading New threat research from the Salt Labs Security research team details Elastic Stack injection exploit that can result in DoS attacks and cascading API threats Read the original article: Salt Security Finds…
Russian Officials Arrest Group-IB CEO, Accuse Him of Treason
This article has been indexed from Dark Reading Ilya Sachkov, founder and CEO of the massive cybersecurity firm, was arrested on treason charges and will be in custody for two months. Read the original article: Russian Officials Arrest Group-IB CEO,…
Cyberspace, Cybergames, and Cyberspies
This article has been indexed from Dark Reading How cyberspace has become a global cybergames stage, where all of us are actors. Read the original article: Cyberspace, Cybergames, and Cyberspies
DAST to the Future: Shifting the Modern AppSec Paradigm
This article has been indexed from Dark Reading NTT Application Security’s Modern AppSec Framework takes a DAST-first approach to defend applications where breaches happen — in production. Read the original article: DAST to the Future: Shifting the Modern AppSec Paradigm
Why Should I Care About HTTP Request Smuggling?
This article has been indexed from Dark Reading HTTP request smuggling is a growing vulnerability, but you can manage the risk with proper server configuration. Read the original article: Why Should I Care About HTTP Request Smuggling?
3 Security Initiatives AWS’s New CEO Should Prioritize
This article has been indexed from Dark Reading As Adam Selipsky takes the helm at Amazon Web Services, security must be one of the first things he addresses. Here are three initiatives that should take priority. Read the original article:…
75K Email Inboxes Hit in New Credential Phishing Campaign
This article has been indexed from Dark Reading Attacker used a legitimate — but likely deprecated — domain to sneak malicious emails past security filters, vendor says. Read the original article: 75K Email Inboxes Hit in New Credential Phishing Campaign
Outsourced Software Pose Greater Risks to Enterprise Application Security
This article has been indexed from Dark Reading In the wake of SolarWinds and other third-party attacks, security teams worry that outsourced applications pose risks to the organization’s application security, according to Dark Reading’s recent “How Enterprises Are Developing Secure…
NSA, CISA Issue Guidelines for Selecting and Securing VPNs
This article has been indexed from Dark Reading Joint document includes configuration recommendations for hardening VPNs, and recommendations on how to select the most secure ones. Read the original article: NSA, CISA Issue Guidelines for Selecting and Securing VPNs
US Extradites CardPlanet Operator Back to Russia
This article has been indexed from Dark Reading Russian national Aleksi Burkov was sentenced to nine years in prison for his operation of two websites facilitating payment card fraud. Read the original article: US Extradites CardPlanet Operator Back to Russia
Notorious Spyware Tool Found Hiding Beneath Four Layers of Obfuscation
This article has been indexed from Dark Reading FinFisher (aka FinSpy) surveillance software now goes to extreme lengths to duck analysis and discovery, researchers found in a months-long investigation. Read the original article: Notorious Spyware Tool Found Hiding Beneath Four…
Modern Security Breaches Demand Diligent Planning and Executive Support
This article has been indexed from Dark Reading Teams that remain reactive will always be on the back foot — take an active stance. Read the original article: Modern Security Breaches Demand Diligent Planning and Executive Support
CISA: Wide Exploitation of New VMware vCenter Server Flaw Likely
This article has been indexed from Dark Reading Attackers can use the vulnerability to remotely execute arbitrary code. Read the original article: CISA: Wide Exploitation of New VMware vCenter Server Flaw Likely
Microsoft Adds Emergency Threat Mitigation to Its Exchange Server Software
This article has been indexed from Dark Reading The built-in service automates mitigations to known Exchange Server threats. Read the original article: Microsoft Adds Emergency Threat Mitigation to Its Exchange Server Software
Microsoft Warns of ‘FoggyWeb’ Malware Targeting AD FS Servers
This article has been indexed from Dark Reading The group tracked as Nobelium uses multiple tactics to steal credentials with the goal of gaining admin access to Active Directory Federation Services. Read the original article: Microsoft Warns of ‘FoggyWeb’ Malware…
Thoma Bravo Completes Strategic Investment in Intel 471
This article has been indexed from Dark Reading Intel 471 is a provider of cyber threat intelligence for leading enterprises and governments. Read the original article: Thoma Bravo Completes Strategic Investment in Intel 471
7 Ways to Thwart Malicious Insiders
This article has been indexed from Dark Reading Malicious insider incidents may be less frequent than inadvertent user missteps, but they can cost organizations big time. Read the original article: 7 Ways to Thwart Malicious Insiders
Cloudflare Ventures into Simplifying Email Security
This article has been indexed from Dark Reading The company adds complex email security technologies — including the alphabet soup of SPF, DKIM, and DMARC — as part of its service. Read the original article: Cloudflare Ventures into Simplifying Email…
BloodyStealer: Advanced New Trojan Targets Accounts of Popular Online Gaming Platforms
This article has been indexed from Dark Reading Kaspersky researchers have discovered an advanced Trojan, dubbed BloodyStealer, sold on darknet forums and used to steal gamers’ accounts on popular gaming platforms, including Steam, Epic Games Store, and EA Origin. Read…
Telos, Splunk, stackArmor, AWS Announce FASTTR Initiative to Accelerate Compliance
This article has been indexed from Dark Reading FASTTR initiative enhances stackArmor’s ThreatAlert by building on market-leading Telos’ Xacta for security compliance documentation and Splunk for security information and event management. Read the original article: Telos, Splunk, stackArmor, AWS Announce…
Zero Trust Comes to Industry’s Broadest Cybersecurity Platform
This article has been indexed from Dark Reading Trend Micro Zero Trust Risk Insights continuously reveals and prioritizes risks for better decision making. Read the original article: Zero Trust Comes to Industry’s Broadest Cybersecurity Platform
How to Get Started With Zero Trust in a SaaS Environment
This article has been indexed from Dark Reading Given current business conditions and the prevalence of SaaS technologies, now is the time to take steps toward zero trust. Read the original article: How to Get Started With Zero Trust in…
Research Highlights Significant Evolution in Email Security
This article has been indexed from Dark Reading Email security is in transition, from on-premises to the cloud, from inline to API-based, and from stand-alone to integrated into XDR. New research from Omdia highlights where the market is today, and…
Consumers Share Security Fears as Risky Behaviors Persist
This article has been indexed from Dark Reading While most US adults know they aren’t sufficiently protecting their data online, many find security time-consuming or don’t know the steps they should take. Read the original article: Consumers Share Security Fears…
What Is the Difference Between Security and Resilience?
This article has been indexed from Dark Reading Resilience shifts the focus toward eliminating the probable impact of the full attack chain. Read the original article: What Is the Difference Between Security and Resilience?
TangleBot Campaign Underscores SMS Threat
This article has been indexed from Dark Reading The attack targets Android devices and starts with a malicious SMS message that aims to bring malware onto compromised devices. Read the original article: TangleBot Campaign Underscores SMS Threat
Endpoint Still a Prime Target for Attack
This article has been indexed from Dark Reading A vast majority of security professionals surveyed think any exploit will start with the endpoint. Read the original article: Endpoint Still a Prime Target for Attack
Our Eye Is on the SPARROW
This article has been indexed from Dark Reading How unauthorized users can exploit wireless infrastructures for covert communication. Read the original article: Our Eye Is on the SPARROW
Contrast Application Security Platform Scales to Support OWASP Risks
This article has been indexed from Dark Reading Contrast’s platform detects and prevents against OWASP Top Ten risks from development to production with out-of-the-box policy rules and automated compliance reporting. Read the original article: Contrast Application Security Platform Scales to…
Supply Chain and Ransomware Threats Drove 60% Increase in Global Cyber Intelligence Sharing Among Financial Firms
This article has been indexed from Dark Reading AMEX, Banco Falabella, IAG, and UBS win global award for annual cyber intelligence sharing efforts. Read the original article: Supply Chain and Ransomware Threats Drove 60% Increase in Global Cyber Intelligence Sharing…
SAIC Appoints Kevin Brown as Chief Information Security Officer
This article has been indexed from Dark Reading Industry leader with decades of information security experience manages SAIC’s security strategy and oversees critical cybersecurity operations. Read the original article: SAIC Appoints Kevin Brown as Chief Information Security Officer
FamousSparrow APT Group Flocks to Hotels, Governments, Businesses
This article has been indexed from Dark Reading The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit. Read the original article: FamousSparrow APT Group Flocks to Hotels, Governments, Businesses
Primer: Microsoft Active Directory Security for AD Admins
This article has been indexed from Dark Reading Nearly all AD environments are vulnerable to identity attack paths — a powerful, widespread, and difficult-to-detect attack technique. But we didn’t say impossible. Here’s how admins can stop them. Read the original…
Google Spots New Technique to Sneak Malware Past Detection Tools
This article has been indexed from Dark Reading The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools. Read the original article: Google Spots New Technique to Sneak Malware Past Detection Tools