Tag: Dark Reading

Cybercrime as a Public Health Crisis

The impact of fraud on a victim’s health and well-being can be more painful than the financial loss. This article has been indexed from Dark Reading Read the original article: Cybercrime as a Public Health Crisis

Are AI-Engineered Threats FUD or Reality?

The rise of generative AI is creating new ways to both attack and defend assets. Which threats are solid and which are vapor? This article has been indexed from Dark Reading Read the original article: Are AI-Engineered Threats FUD or…

Orgs Face Record $4.5M Per Data Breach Incident

Cl0p stands to make $100M on the MOVEit campaign, and according to a just-released survey, more than half of businesses are willing to pass data breach costs onto customers. This article has been indexed from Dark Reading Read the original…

Atlassian RCE Bugs Plague Confluence, Bamboo

The security vulnerabilities allow full takeover of Atlassian instances, so admins should patch now. This article has been indexed from Dark Reading Read the original article: Atlassian RCE Bugs Plague Confluence, Bamboo

North Korean Cyberspies Target GitHub Developers

The North Korean APT is setting up legitimate accounts on GitHub and social media platforms to pose as developers or recruiters — ultimately to fool targets into loading npm repositories with malicious code. This article has been indexed from Dark…

How to Put the Sec in DevSecOps

Learn the importance of adding security practices into DevOps life cycles and how to make security stronger. This article has been indexed from Dark Reading Read the original article: How to Put the Sec in DevSecOps

What C-Suite Leaders Need to Know About XDR

Considering adopting extended detection and response (XDR) in your cybersecurity defense program? Here’s what you need to know about the technology platform. This article has been indexed from Dark Reading Read the original article: What C-Suite Leaders Need to Know…

Rootkit Attack Detections Increase at UAE Businesses

Detections of rootkit attacks against businesses in the United Arab Emirates are up 167% in 2023, with an increased view of their use in the Middle East overall. This article has been indexed from Dark Reading Read the original article:…

Saudi Arabia’s Tuwaiq Academy Opens Cybersecurity Bootcamp

Registration has opened for the cybersecurity specialty track at Tuwaiq Academy, where students will learn a variety of related skills. This article has been indexed from Dark Reading Read the original article: Saudi Arabia’s Tuwaiq Academy Opens Cybersecurity Bootcamp

Meet the Finalists for the 2023 Pwnie Awards

Hosts Sophia d’Antoine and Ian Roos presented the list at Summercon in Brooklyn, where they also handed out a surprise Lifetime Achievement Award. This article has been indexed from Dark Reading Read the original article: Meet the Finalists for the…

White House, Big Tech Ink Commitments to Secure AI

With Big Tech companies pledging voluntary safeguards, industry-watchers assume that smaller AI purveyors will follow in their wake to make AI safer for all. This article has been indexed from Dark Reading Read the original article: White House, Big Tech…

The Dark Side of AI

Sophisticated fraudsters are exploiting ChatGPT and CAPTCHAs to evade enterprise security defenses. This article has been indexed from Dark Reading Read the original article: The Dark Side of AI

Critical Infrastructure Workers Better At Spotting Phishing

Critical-infrastructure employees are comparatively more engaged in organizational security — and compliance training — than those in other sectors. This article has been indexed from Dark Reading Read the original article: Critical Infrastructure Workers Better At Spotting Phishing

Kevin Mandia Brings the HammerCon

US Air Force veteran and Mandiant CEO discussed dwell time and state-sponsored attacks at the Military Cyber Professionals Association’s HammerCon conference. This article has been indexed from Dark Reading Read the original article: Kevin Mandia Brings the HammerCon

Should You Be Using a Cybersecurity Careers Framework?

Frameworks can help improve hiring practices and retention, and help guide education — which makes them an important asset worth exploiting. This article has been indexed from Dark Reading Read the original article: Should You Be Using a Cybersecurity Careers…

Enterprise Choices in Measuring Risk

Organizations have options when it comes to choosing the right tool to quantify risk This article has been indexed from Dark Reading Read the original article: Enterprise Choices in Measuring Risk

Netskope Launches Managed Service Provider Program

Updated Evolve Partner Program offerings expand support and solution options for MSPs driving security modernization and network transformation. This article has been indexed from Dark Reading Read the original article: Netskope Launches Managed Service Provider Program

SophosEncrypt Ransomware Fools Security Researchers

The ransomware-as-a-service offering was first assumed to be a red team exercise before being detected for true malicious activity. This article has been indexed from Dark Reading Read the original article: SophosEncrypt Ransomware Fools Security Researchers

China’s APT41 Linked to WyrmSpy, DragonEgg Mobile Spyware

Nation-states see the opportunity in targeting people directly through their mobile phones, in this case with sophisticated Android surveillanceware. This article has been indexed from Dark Reading Read the original article: China’s APT41 Linked to WyrmSpy, DragonEgg Mobile Spyware

P2P Self-Replicating Cloud Worm Targets Redis

Although not all Redis instances are vulnerable to the P2P worm variant, all of them can expect a compromise attempt, researchers warn. This article has been indexed from Dark Reading Read the original article: P2P Self-Replicating Cloud Worm Targets Redis

3 Ways AI Could Improve Authentication

As companies navigate how to protect themselves from the onslaught of increasingly sophisticated fraud threats, artificial intelligence will be a critical piece of next-gen authentication. This article has been indexed from Dark Reading Read the original article: 3 Ways AI…

Reducing Security Debt in the Cloud

Security debt exists in on-premises data centers as well as in cloud platforms — but preventing it from accumulating in the cloud requires different skills, processes, and tools. This article has been indexed from Dark Reading Read the original article:…

VirusTotal Data Leak Affects 5K+ Users

Some of the users who were impacted include the US Department of Justice, the NSA, and the FBI, alongside German intelligence agencies. This article has been indexed from Dark Reading Read the original article: VirusTotal Data Leak Affects 5K+ Users

Hacker Infected & Foiled by Own Infostealer

A prolific threat actor has been operating on Russian-language forums since 2020, but then he accidentally infected his own computer and sold off its contents to threat researchers. This article has been indexed from Dark Reading Read the original article:…

Name That Toon: Shark Sighting

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Toon: Shark Sighting

Sogu, SnowyDrive Malware Spreads, USB-Based Cyberattacks Surge

Two separate threat actors are using poisoned USB drives to distribute malware in cyber-espionage campaigns targeting organizations across different sectors and geographies. This article has been indexed from Dark Reading Read the original article: Sogu, SnowyDrive Malware Spreads, USB-Based Cyberattacks…

Startup Spotlight: Binarly Hardens Firmware Security

The company, one of four finalists in this year’s Black Hat USA Startup Spotlight competition, uses AI/ML to find firmware vulnerabilities. This article has been indexed from Dark Reading Read the original article: Startup Spotlight: Binarly Hardens Firmware Security

How AI-Augmented Threat Intelligence Solves Security Shortfalls

Researchers explore how overburdened cyber analysts can improve their threat intelligence jobs by using ChatGPT-like large language models (LLMs). This article has been indexed from Dark Reading Read the original article: How AI-Augmented Threat Intelligence Solves Security Shortfalls

5 Major Takeaways From Microsoft’s July Patch Tuesday

July’s updates contained 100+ patches and security policy notes, leaving vulnerability management teams stressed and scrambling to prioritize. We’re here to help find some zen. This article has been indexed from Dark Reading Read the original article: 5 Major Takeaways…

Insider Risk Management Starts With SaaS Security

SaaS security posture management helps mitigate common threats posed by malicious or negligent insiders. This article has been indexed from Dark Reading Read the original article: Insider Risk Management Starts With SaaS Security

Cisco Flags Critical SD-WAN Vulnerability

A flaw in the REST API of Cisco’s SD_WAN vManage software could allow remote, unauthenticated attackers to perform data exfiltration. This article has been indexed from Dark Reading Read the original article: Cisco Flags Critical SD-WAN Vulnerability

SBOMs Still More Mandate Than Security

A software bills of materials standard gets an update, but the driver is compliance rather than security. This article has been indexed from Dark Reading Read the original article: SBOMs Still More Mandate Than Security

How Hackers Can Hijack a Satellite

We rely on them for communications, military activity, and everyday tasks. How long before attackers really start to look up at the stars? This article has been indexed from Dark Reading Read the original article: How Hackers Can Hijack a…

Rogue Azure AD Guests Can Steal Data via Power Apps

A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections. This article has been indexed from Dark Reading Read the original article: Rogue Azure AD Guests Can Steal Data via Power…

Zimbra Zero-Day Demands Urgent Manual Update

A bug in Zimbra email servers is already being exploited in the wild, Google TAG researchers warn. This article has been indexed from Dark Reading Read the original article: Zimbra Zero-Day Demands Urgent Manual Update

Black Hat Announces Sustainability Pledge

Pledge stems from Black Hat’s commitment to become a net zero carbon business by 2030. This article has been indexed from Dark Reading Read the original article: Black Hat Announces Sustainability Pledge

Safe Security Acquires RiskLens

A combination of SAFE Platform’s industry defining AI capabilities coupled with the industry standard FAIR model for cyber risk quantification, that was pioneered by RiskLens. This article has been indexed from Dark Reading Read the original article: Safe Security Acquires…

SolarWinds Attackers Dangle BMWs to Spy on Diplomats

Cloaked Ursa/Nobelium gets creative by appealing to the more personal needs of government employees on foreign missions in Kyiv. This article has been indexed from Dark Reading Read the original article: SolarWinds Attackers Dangle BMWs to Spy on Diplomats

Creating a Patch Management Playbook: 6 Key Questions

The vulnerability gap continues to persist, and IT and security teams can play a major role in reducing their attack surface. This article has been indexed from Dark Reading Read the original article: Creating a Patch Management Playbook: 6 Key…

Hackers Target Chinese Gamers With Microsoft-Signed Rootkit

Kernel mode driver can download second-stage payload directly to memory, allowing threat actors to evade endpoint detection and response tools. This article has been indexed from Dark Reading Read the original article: Hackers Target Chinese Gamers With Microsoft-Signed Rootkit