This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: World Security Report Finds Physical Security Incidents Cost Companies USD $1T…
Tag: Dark Reading
Cloudflare Announces Unified Data Protection Suite to Address Risks of Modern Coding and Increased AI Use
Rich security suite enables seamless and secure path to transition corporate networks to the cloud, and accelerate innovation. This article has been indexed from Dark Reading Read the original article: Cloudflare Announces Unified Data Protection Suite to Address Risks of…
Iran’s Charming Kitten Pounces on Israeli Exchange Servers
Archrivals face off in the cyber plane, as opportunistic hackers prey on the unpatched and generally negligent. This article has been indexed from Dark Reading Read the original article: Iran’s Charming Kitten Pounces on Israeli Exchange Servers
‘Steal-It’ Campaign Uses OnlyFans Models As Lures
Custom PowerShell scripts are being deployed against geofenced targets in Australia, Belgium, and Poland to exfiltrate data. This article has been indexed from Dark Reading Read the original article: ‘Steal-It’ Campaign Uses OnlyFans Models As Lures
Being Flexible Can Improve Your Security Posture
Changing your approach when you realize you could be more efficient pays dividends, especially in six areas of your cybersecurity program. This article has been indexed from Dark Reading Read the original article: Being Flexible Can Improve Your Security Posture
Iranian APT Hits US Aviation Org via ManageEngine, Fortinet Bugs
Known security vulnerabilities in the enterprise products allowed unauthorized access through a public-facing application, US Cyber Command said. This article has been indexed from Dark Reading Read the original article: Iranian APT Hits US Aviation Org via ManageEngine, Fortinet Bugs
Attackers Abuse Google Looker Studio to Evade DMARC, Email Security
Cyberattackers are tapping the legitimacy of the Web-based data-visualization tool in a campaign aimed at stealing credentials and defrauding hundreds of business users. This article has been indexed from Dark Reading Read the original article: Attackers Abuse Google Looker Studio…
Navigating Rwanda’s New Data Protection Law
As the law’s October 2023 transition deadline approaches, it’s critical for organizations doing business in Rwanda to understand its requirements and implications. This article has been indexed from Dark Reading Read the original article: Navigating Rwanda’s New Data Protection Law
Overcoming the Rising Threat of Session Hijacking
Passkeys and multifactor authentication aren’t enough for combating infostealer malware, which can exfiltrate corporate data before anyone knows an attack happened. This article has been indexed from Dark Reading Read the original article: Overcoming the Rising Threat of Session Hijacking
3 Ways to Expand the Cyber Talent Pool From Splash Pad to Watering Hole
Why — and how — “unqualified” candidates will fill the reservoir with the security workers America is thirsty for. This article has been indexed from Dark Reading Read the original article: 3 Ways to Expand the Cyber Talent Pool From…
Critical Security Bug Opens Cisco BroadWorks to Complete Takeover
Cyberattackers could exploit CVE-2023-20238 to carry out a variety of nefarious deeds, from data theft and code execution to phishing, fraud, and DoS. This article has been indexed from Dark Reading Read the original article: Critical Security Bug Opens Cisco…
‘Evil Telegram’ Spyware Campaign Infects 60K+ Mobile Users
Legitimate-seeming Telegram “mods” available in the official Google Play store for the encrypted messaging app signal the rise of a new enterprise threat. This article has been indexed from Dark Reading Read the original article: ‘Evil Telegram’ Spyware Campaign Infects…
Trickbot, Conti Sanctions Affect Top Cybercrime Brass
US Treasury officials said the sanctions move is part of its effort to combat Russian state-sponsored cybercrime. This article has been indexed from Dark Reading Read the original article: Trickbot, Conti Sanctions Affect Top Cybercrime Brass
Kenya Initiates Public Sector Digital Skills Training, No Mention of Cybersecurity
Training will cover cloud skills and working in a paperless environment, but any mention of a cybersecurity element is conspicuously lacking. This article has been indexed from Dark Reading Read the original article: Kenya Initiates Public Sector Digital Skills Training,…
3 Strategies to Defend Against Resurging Infostealers
Infostealer incidents have more than doubled recently, making it critical to bolster your defenses to mitigate this growing threat. This article has been indexed from Dark Reading Read the original article: 3 Strategies to Defend Against Resurging Infostealers
Software Supply Chain Strategies to Parry Dependency Confusion Attacks
Bad actors practice to deceive package managers with a tangled web of methods. Here’s how to hoist them by their own petard. This article has been indexed from Dark Reading Read the original article: Software Supply Chain Strategies to Parry…
Microsoft ID Security Gaps That Let Threat Actor Steal Signing Key
China’s Storm-0558 accessed user emails at some 25 enterprise organizations earlier this year using forged tokens. This article has been indexed from Dark Reading Read the original article: Microsoft ID Security Gaps That Let Threat Actor Steal Signing Key
Apple Hit By 2 No-Click Zero-Days in Blastpass Exploit Chain
Researchers at Citizen Lab recommend immediately updating any iPhones and iPads to the latest OSes. This article has been indexed from Dark Reading Read the original article: Apple Hit By 2 No-Click Zero-Days in Blastpass Exploit Chain
North Korean Hackers Target Security Researchers — Again
This time, they’re creating elaborate impostor profiles and using a fresh zero-day and a fake Windows tool to lure in the suspecting. This article has been indexed from Dark Reading Read the original article: North Korean Hackers Target Security Researchers…
Rwanda Launches Smart-City Investment Program
The ambitious move by the nation also comes with cybersecurity risks. This article has been indexed from Dark Reading Read the original article: Rwanda Launches Smart-City Investment Program
Rwanda Launches Smart City Investment Program
The ambitious move by the nation also comes with cybersecurity risks. This article has been indexed from Dark Reading Read the original article: Rwanda Launches Smart City Investment Program
NFL Security Chief: Generative AI Threats a Concern as New Season Kicks Off
Deepfake videos and audio of NFL players and phishing communications via ChatGPT-like tools are a worry, the NFL’s CISO says. This article has been indexed from Dark Reading Read the original article: NFL Security Chief: Generative AI Threats a Concern…
Weaponized Windows Installers Target Graphic Designers in Crypto Heist
Attackers use legitimate Windows installer to hide malicious scripts that install a backdoor and miners that leverage victims’ graphics processing power. This article has been indexed from Dark Reading Read the original article: Weaponized Windows Installers Target Graphic Designers in…
How New SEC Rules Can Benefit Cybersecurity Teams
Securities and Exchange Commission rules elevate cybersecurity to a critical strategic concern and compel businesses to prioritize cyber resilience. This article has been indexed from Dark Reading Read the original article: How New SEC Rules Can Benefit Cybersecurity Teams
Peril vs. Promise: Companies, Developers Worry Over Generative AI Risk
Executives and developers believe AI can help businesses thrive, but worry that reliance on generative AI brings significant risks. This article has been indexed from Dark Reading Read the original article: Peril vs. Promise: Companies, Developers Worry Over Generative AI…
Does Generative AI Comply With Asimov’s 3 Laws of Robotics?
Putting the top 10 generative AI tools to the ethical test reveals more about humanity than artificial intelligence. This article has been indexed from Dark Reading Read the original article: Does Generative AI Comply With Asimov’s 3 Laws of Robotics?
CybeReady Provides Cybersecurity Awareness Month Kits As CISOs Defend Against AI Driven Attacks
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: CybeReady Provides Cybersecurity Awareness Month Kits As CISOs Defend Against AI…
Coding Tips to Sidestep JavaScript Vulnerabilities
This Tech Tip focuses on best security practices to write secure JavaScript code. This article has been indexed from Dark Reading Read the original article: Coding Tips to Sidestep JavaScript Vulnerabilities
Cybersecurity Builds Trust in Critical Infrastructure
Improving an energy company’s resistance to cyberattack does more than protect vital resources — it enhances trust from customers and investors. This article has been indexed from Dark Reading Read the original article: Cybersecurity Builds Trust in Critical Infrastructure
IBM Expands Cloud Security and Compliance Center
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: IBM Expands Cloud Security and Compliance Center
IBM Addresses Data Incident for Janssen CarePath Database
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: IBM Addresses Data Incident for Janssen CarePath Database
W3LL Gang Compromises Thousands of Microsoft 365 Accounts
A secretive phishing cabal boasts a sophisticated affiliate network and a modular, custom toolset that’s claiming victims on three continents. This article has been indexed from Dark Reading Read the original article: W3LL Gang Compromises Thousands of Microsoft 365 Accounts
AtlasVPN Linux Zero-Day Disconnects Users, Reveals IP Addresses
All it takes is a simple copy-paste to undo a VPN service used by millions worldwide. This article has been indexed from Dark Reading Read the original article: AtlasVPN Linux Zero-Day Disconnects Users, Reveals IP Addresses
MinIO Attack Showcases Fresh Corporate Cloud Attack Vector
The open source object storage service was the target of a never-before-seen attack on corporate cloud services, which researchers said should put DevOps in particular on notice. This article has been indexed from Dark Reading Read the original article: MinIO…
Russia’s ‘Fancy Bear’ APT Targets Ukrainian Energy Facility
The group, best known for 2016 US election interference and other attacks on Ukraine, used phishing emails offering pictures of women to lure its victim into opening a malicious attachment. This article has been indexed from Dark Reading Read the…
Google’s Souped-up Chrome Store Review Process Foiled by Data-Stealer
Researchers have discovered that despite Google’s adoption of the Manifest V3 security standard to protect against malicious plug-ins, attackers can still get bad extensions past its review process. This article has been indexed from Dark Reading Read the original article:…
Securing Your Legacy: Identities, Data, and Processes
Legacy systems of all kinds pose significant cybersecurity risks. Here’s how to mitigate them. This article has been indexed from Dark Reading Read the original article: Securing Your Legacy: Identities, Data, and Processes
Overcoming Open Source Vulnerabilities in the Software Supply Chain
By securing access to code and running scans against all code changes, developers can better prevent — and detect — potential risks and vulnerabilities. This article has been indexed from Dark Reading Read the original article: Overcoming Open Source Vulnerabilities…
LockBit Leaks Documents Filched From UK Defense Contractor
A company that builds physical perimeter defenses failed to keep the LockBit group from penetrating its cyber defenses. This article has been indexed from Dark Reading Read the original article: LockBit Leaks Documents Filched From UK Defense Contractor
Researchers Discover Critical Vulnerability in PHPFusion CMS
No patch is available yet for the bug, which can enable remote code execution under the correct circumstances. This article has been indexed from Dark Reading Read the original article: Researchers Discover Critical Vulnerability in PHPFusion CMS
Hornetsecurity Releases 365 Total Protection Plan 4 for Microsoft 365
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Hornetsecurity Releases 365 Total Protection Plan 4 for Microsoft 365
Global Cloud Security Market to Reach $62.9B by 2028
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Global Cloud Security Market to Reach $62.9B by 2028
Tuya Smart and Amazon Web Services Collaborate to Establish an IoT Security Lab
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Tuya Smart and Amazon Web Services Collaborate to Establish an IoT…
GhostSec Leaks Source Code of Alleged Iranian Surveillance Tool
GhostSec has made the source code for what it calls a powerful surveillance tool openly available in a 26GB file, but FANAP denies its legitimacy. This article has been indexed from Dark Reading Read the original article: GhostSec Leaks Source…
Peiter ‘Mudge’ Zatko Lands Role as CISA Senior Technical Adviser
The former hacker and Twitter security executive will use his role to help fulfill the Biden administration’s plans for the National Cybersecurity Strategy. This article has been indexed from Dark Reading Read the original article: Peiter ‘Mudge’ Zatko Lands Role…
Data Initiatives Force Closer Partnership Between CISOs, CDOs
Though security leaders and chief data officers both care about data management, their different missions have created a tension that needs addressing. This article has been indexed from Dark Reading Read the original article: Data Initiatives Force Closer Partnership Between…
Hackers Target High-Privileged Okta Accounts via Help Desk
Threat actors convince employees to reset MFA for Super Admin accounts in the IAM service to leverage compromised accounts, impersonating users and moving laterally within an organization. This article has been indexed from Dark Reading Read the original article: Hackers…
Russia Undertakes Disinformation Campaign Across Africa
Following coups in some African nations, Russia is exploiting instability with manipulation of media channels. This article has been indexed from Dark Reading Read the original article: Russia Undertakes Disinformation Campaign Across Africa
How Companies Can Cope With the Risks of Generative AI Tools
To benefit from AI yet minimize risk, companies should be cautious about information they share, be aware of AI’s limitations, and stay vigilant about business implications. This article has been indexed from Dark Reading Read the original article: How Companies…
As LotL Attacks Evolve, So Must Defenses
Because living-off-the-land (LotL) attacks masquerade as frequently used, legitimate companies, they are very difficult to block and detect. This article has been indexed from Dark Reading Read the original article: As LotL Attacks Evolve, So Must Defenses
Realism Reigns on AI at Black Hat and DEF CON
Realistic expectations and caution began to replace wonder and confusion for generative AI at the recent security industry gatherings. This article has been indexed from Dark Reading Read the original article: Realism Reigns on AI at Black Hat and DEF…
Facing Third-Party Threats With Non-Employee Risk Management
As businesses continue to grapple with third-party threats, a revamped approach to non-employee risk management can help limit their potential exposure. This article has been indexed from Dark Reading Read the original article: Facing Third-Party Threats With Non-Employee Risk Management
ReasonLabs Summer 2023 Trends Report Reveals Top Consumer Security Threats
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: ReasonLabs Summer 2023 Trends Report Reveals Top Consumer Security Threats
Lacework Expands Partnership With Google Cloud to Deliver Enterprise Flexibility in the Cloud
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Lacework Expands Partnership With Google Cloud to Deliver Enterprise Flexibility in…
AI for Good: Voxel AI Tech Increases Funding to $30M With Strategic Funding Round
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: AI for Good: Voxel AI Tech Increases Funding to $30M With…
Inaugural Pwn2Own Automotive Contest Dangles $1M for Car Hackers
The competition encourages automotive research and allows for contestants to take part in person or remotely. This article has been indexed from Dark Reading Read the original article: Inaugural Pwn2Own Automotive Contest Dangles $1M for Car Hackers
MSSQL Databases Under Fire From FreeWorld Ransomware
The sophisticated attacks, tracked as DB#JAMMER, run shell commands to impair defenses and deploy tools to establish persistence on the host. This article has been indexed from Dark Reading Read the original article: MSSQL Databases Under Fire From FreeWorld Ransomware
US Government Denies Blocking Sales of AI Chips to Middle East
Nvidia and AMD do face expanded export rules for their A100 and H100 artificial intelligence (AI) chips in the Middle East, but it’s not yet clear why. This article has been indexed from Dark Reading Read the original article: US…
Key Group Ransomware Foiled by New Decryptor
Researchers crack Key Group’s ransomware encryption and release free tool for victim organizations to recover their data. This article has been indexed from Dark Reading Read the original article: Key Group Ransomware Foiled by New Decryptor
Will the AI Arms Race Lead to the Pollution of the Internet?
Content creators want to protect their intellectual property from AI by poisoning data. Could this destroy the machine learning ecosystem? This article has been indexed from Dark Reading Read the original article: Will the AI Arms Race Lead to the…
NYC Subway Disables Trip-History Feature Over Tap-and-Go Privacy Concerns
The move by New York’s Metropolitan Transit Authority (MTA) follows a report that showed how easy it is for someone to pull up another individual’s seven-day ride history through the One Metro New York (OMNY) website. This article has been…
Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs
The Security and Exchange Commission’s Proposed Rule for Public Companies (PPRC) is ambiguous. This article has been indexed from Dark Reading Read the original article: Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs