0

How Can Disrupting DNS Communications Thwart a Malware Attack?

Thứ Ba, 31 tháng 1, 2023
Malware eventually has to exfiltrate the data it accessed. By watching DNS traffic for suspicious activity, organizations can halt the damage.
0

Firmware Flaws Could Spell 'Lights Out' for Servers

Five vulnerabilities in the baseboard management controller (BMC) software used by 15 major vendors could allow remote code execution if attackers gain network access.
0

Critical VMware RCE Vulnerabilities Targeted by Public Exploit Code

Security vulnerabilities in VMware's vRealize Log Insight platform can be chained together to offer a cybercriminals a gaping hole to access corporate crown jewels.
0

Poser Hackers Impersonate LockBit in SMB Cyberattacks

Recent cyberattacks against SMBs across Europe have been traced back to copycat groups using leaked LockBit locker malware.
0

Will Cybersecurity Remain Recession-Proof in 2023?

Demand for skilled professionals will remain high, but cyber budgets will be eaten away.
0

Are Your Employees Thinking Critically About Their Online Behaviors?

Three mindset shifts will help employees build a habit of vigilance and make better security decisions. Move past security theater to reframe thinking so employees understand data's value, act with intention, and follow data best practices.
0

10M JD Sports Customers' Info Exposed in Data Breach

Thứ Hai, 30 tháng 1, 2023
UK sportswear retailer asks exposed customers to stay "vigilant" against phishing attempts following cyberattack.
0

How $6 Can Buy Hacked Social Media & Streaming Accounts From the Dark Web, Whizcase Study Reveals

0

Facebook Bug Allows 2FA Bypass Via Instagram

The Instagram rate-limiting bug, found by a rookie hunter, could be exploited to bypass Facebook 2FA in vulnerable apps, researcher reports.
0

Long Con Impersonates Financial Advisers to Target Victims

Cybercriminals are co-opting the identities of legitimate US financial advisers to use them as fodder for relationship scams (aka "pig butchering"), which end with the theft of investments.
0

The Journal, Artificial Intelligence in the Life Sciences, Highlights the Contributions of Women in Artificial Intelligence in the Life Sciences

The launch of a new article collection and webinar by the journal AILSCI recognises prominent female scientists in the field of AI.
0

Spotlight on 2023 DevSecOps Trends

Solutions that provide more actionable results — remediation that frees up engineers, processes which integrate security into software development from its design, along with automation, IAC, and tool consolidation — are among the DevSecOps strategies that will prevail this year.
0

Enterprises Don't Know What to Buy for Responsible AI

Thứ Sáu, 27 tháng 1, 2023
Organizations are struggling to procure appropriate technical tools to address responsible AI, such as consistent bias detection in AI applications.
0

Enterprises Need to Do More to Assure Consumers About Privacy

Organizations care about data privacy, but their priorities appear to be different from what their customers think are important.
0

Why Most Companies Still Don’t Know What’s on Their Network

Chris Kirsch, CEO of runZero, sits down with Dark Reading’sTerry Sweeney for a Fast Chat on the importance of asset discovery.
0

On Data Privacy Day, Organizations Fail Data Privacy Expectations

Data Privacy Day rolls around year after year, and data privacy breaches likewise. Two-thirds of data breaches result in data exposure.
0

Critical RCE Lexmark Printer Bug Has Public Exploit

A nasty SSRF bug in Web Services plagues a laundry list of enterprise printers.
0

3 Ways ChatGPT Will Change Infosec in 2023

OpenAI's chatbot has the promise to revolutionize how security practitioners work.
0

SaaS RootKit Exploits Hidden Rules in Microsoft 365

Thứ Năm, 26 tháng 1, 2023
A vulnerability within Microsoft's OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.
0

Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems

Hackers don't need a key to get past your defenses, if they can essentially teleport using RMMs, warns CISA and the NSA.
0

Dutchman Detained for Dealing Details of Tens of Millions of People

The accused sold an enormous data set stolen from the Austrian radio and television licensing authority — to an undercover cop.
0

German Government, Airports, Banks Hit With Killnet DDoS Attacks

After Berlin pledged tanks for Ukraine, some German websites were knocked offline temporarily by Killnet DDoS attacks.
0

Companies Struggle With Zero Trust as Attackers Adapt to Get Around It

Only one in 10 enterprises will create a robust zero-trust foundation in the next three years, while more than half of attacks won't even be prevented by it, according to Gartner.
0

Davos Debrief: Critical Shortage of Cybersecurity Talent Requires Action on Several Fronts, CompTIA Executive Says

Thứ Tư, 25 tháng 1, 2023
0

Researchers Pioneer PoC Exploit for NSA-Reported Bug in Windows CryptoAPI

The security vulnerability allows attackers to spoof a target certificate and masquerade as any website, among other things.
0

GoTo Encrypted Backups Stolen in LastPass Breach

Encrypted backups for several GoTo remote work tools were exfiltrated from LastPass, along with encryption keys.
0

North Korea's Top APT Swindled $1B From Crypto Investors in 2022

The DPRK has turned crypto scams into big business to replenish its depleted state coffers.
0

Multicloud Security Challenges Will Persist in 2023

Some predictions about impending security challenges, with a few tips for proactively addressing them.
0

Can't Fill Open Positions? Rewrite Your Minimum Requirements

If you or your company can't find good infosec candidates, consider changing up the qualifications to find more nontraditional talent.
0

View from Davos: The Changing Economics of Cybercrime

Thứ Ba, 24 tháng 1, 2023
Participants in a working session on ransomware at the World Economic Forum discussed how planning ahead can reduce cyber risk.
0

Ticketmaster Blames Bots in Taylor Swift 'Eras' Tour Debacle

Ticketmaster testified in the Senate that a cyberattack was to blame for the high-profile Taylor Swift concert sales collapse, but some senators aren't so sure.
0

Chat Cybersecurity: AI Promises a Lot, But Can It Deliver?

Machine learning offers great opportunities, but it still can't replace human experts.
0

TSA No-Fly List Snafu Highlights Risk of Keeping Sensitive Data in Dev Environments

A Swiss hacker poking around in an unprotected Jenkins development server belonging to CommuteAir accessed the names and birthdates of some 1.5 million people on a TSA no-fly list from 2019.
0

Microsoft to Block Excel Add-ins to Stop Office Exploits

The company will block the configuration files, which interact with Web applications — since threat actors increasingly use the capability to install malicious code.
0

Security and the Electric Vehicle Charging Infrastructure

When EVs and smart chargers plug in to critical infrastructure, what can go wrong? Plenty.
0

SOCs to Face Greater Challenges From Cybercriminals Targeting Governments and Media in 2023

Thứ Hai, 23 tháng 1, 2023
0

FanDuel Sportsbook Bettors Exposed in Mailchimp Breach

Amid all the NFL playoff action, FanDuel has sent an email warning to gamblers that their data was exposed in its third-party breach, putting them at risk for phishing attacks.
0

No One Wants to Be Governed, Everyone Wants to Be Helped

Here's how a security team can present itself to citizen developers as a valuable resource rather than a bureaucratic roadblock.
0

Hunting Insider Threats on the Dark Web

Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.
0

Gartner Predicts 10% of Large Enterprises Will Have a Mature and Measurable Zero-Trust Program in Place by 2026

0

Supply Chain Security Global Market Report 2022: Sector to Reach $3.5 Billion by 2027 at an 11% CAGR

0

Ransomware Profits Decline as Victims Dig In, Refuse to Pay

Thứ Sáu, 20 tháng 1, 2023
Two new reports show ransomware revenues for threat actors dropped sharply in 2022 as more victims ignored ransom demands.
0

GPT Emerges as Key AI Tech for Security Vendors

Orca Security is one of the companies integrating conversational AI technology into its products.
0

Attackers Crafted Custom Malware for Fortinet Zero-Day

Thứ Năm, 19 tháng 1, 2023
The "BoldMove" backdoor demonstrates a high level of knowledge of FortiOS, according to Mandiant researchers, who said the attacker appears to be based out of China.
0

Roaming Mantis Uses DNS Changers to Target Users via Compromised Public Routers

0

Shift Identity Left: Preventing Identity-Based Breaches

Traditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches.
0

Name That Toon: Poker Hand

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
0

As Social Engineering Tactics Change, So Must Your Security Training

Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization.
0

Cybercriminals Target Telecom Provider Networks

The growing use of mobile devices for MFA and the proliferation of 5G and VoIP in general could result in more attacks in future, experts say.
0

How Would the FTC Rule on Noncompetes Affect Data Security?

Thứ Tư, 18 tháng 1, 2023
Without noncompetes, how do organizations make sure employees aren't taking intellectual property when they go work to work for a competitor?
0

Vulnerable Historian Servers Imperil OT Networks

These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks.
0

ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn

The powerful AI bot can produce malware without malicious code, making it tough to mitigate.
0

ChatGPT Opens New Opportunities for Cybercriminals: 5 Ways for Organizations to Get Ready

From updating employee education and implementing stronger authentication protocols to monitoring corporate accounts and adopting a zero-trust model, companies can better prepare defenses against chatbot-augmented attacks.
0

ICS Confronted by Attackers Armed With New Motives, Tactics, and Malware

Threat actors are diversifying across all aspects to attack critical infrastructure, muddying the threat landscape, and forcing industrial organizations to rethink their security.
0

Lares Research Highlights Top 5 Penetration Test Findings From 2022

Range of Addressable Concerns Includes "Brute Forcing Accounts with Weak Passwords" and "Excessive File System Permissions."
0

Initial Access Broker Market Booms, Posing Growing Threat to Enterprises

Thứ Ba, 17 tháng 1, 2023
A rapid increase in the number of operators in the space — the "locksmiths" of the cyber underground — has made it substantially cheaper for cybercriminals to buy access to target networks.
0

Secrets Rotation Recommended After CircleCI Security Incident

Companies are being urged to update 0Auth, runner, and project API tokens, along with other secrets stashed with CircleCI.
0

Unpatched Zoho MangeEngine Products Under Active Cyberattack

The latest critical bug is exploitable in dozens of ManageEngine products and exposes systems to catastrophic risks, researchers warn.
0

Why Businesses Need to Think Like Hackers This Year

Security professionals must update their skill sets and be proactive to stay ahead of cybercriminals. It's time to learn to think and act like an attacker to cope with the cyber "new normal."
0

A New Era Is Dawning in Cybersecurity, but Only the Best Algorithms Will Win

Open source AI is lowering the barrier of entry for cybercriminals. Security teams must consider the right way to apply defensive AI to counter this threat.
0

3 Lessons Learned in Vulnerability Management

In 2022, multiple high-profile vulnerabilities like Log4j and OpenSSL provided important takeaways for future public reporting.
0

The Dangers of Default Cloud Configurations

Thứ Hai, 16 tháng 1, 2023
Default settings can leave blind spots but avoiding this issue can be done.
0

Java, .NET Developers Prone to More Frequent Vulnerabilities

About three-quarters of Java and .NET applications have vulnerabilities from the OWASP Top 10 list, while only 55% of JavaScript codebases have such flaws, according to testing data.
0

Norton LifeLock Warns on Password Manager Account Compromises

Thứ Sáu, 13 tháng 1, 2023
Password manager accounts may have, ironically, been compromised via simple credential stuffing, thanks to password reuse.
0

Malware Comes Standard With This Android TV Box on Amazon

The bargain T95 Android TV device was delivered with preinstalled malware, adding to a trend of Droid devices coming out-of-the-box tainted.
0

SailPoint Acquires SecZetta to Provide Identity Security for Non-Employee Identities

This move accelerates the company’s vision of becoming the de facto identity security platform of choice for the modern enterprise.
0

$20K Buys Insider Access to Telegram Servers, Dark Web Ad Claims

Thứ Năm, 12 tháng 1, 2023
In the ad, cybercriminals are offering to sell employee-level access to Telegram, researchers warn.
0

Darktrace Publishes 2022 Cyberattack Trend Data For Energy, Healthcare & Retail Sectors Globally

0

New Survey Sheds Light on Why Enterprises Struggle to Thwart API Attacks

Corsha’s Annual State of API Secrets Management Report finds over 50% of respondents suffered a data breach due to compromised API secrets.
0

Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available

Unpatched Cisco bugs, tracked as CVE-2023-20025 and CVE-2023-20026, allow lateral movement, data theft, and malware infestations.
0

Securing the World's Energy Systems: Where Physical Security and Cybersecurity Must Meet

Energy has become the new battleground for both physical and cyber security warfare, driven by nation state actors, increasing financial rewards for ransomware gangs and decentralized devices. Chris Price reports.
0

Better Phishing, Easy Malicious Implants: How AI Could Change Cyberattacks

Thứ Tư, 11 tháng 1, 2023
Current defenses are able to protect against today's AI-enhanced cybersecurity threats, but that won't be the case for long as these attacks become more effective and sophisticated.
0

Catchpoint Announces Solution to Monitor and Protect Companies From BGP Incidents

Catchpoint’s Internet Performance Monitoring Platform helps IT teams identify and mitigate BGP incidents, including hijack attempts and routing issues, with the industry’s broadest network of vantage points in the world drawing on real-time BGP monitoring.
0

Cyberattack Cancels Classes for Des Moines Public Schools

School to resume Thursday, Jan. 12, after Iowa school district detected unusual network activity and pulled the plug.
0

Governance in the Cloud Shifts Left

CISOs' top cloud challenge is harmonizing standards, policies, and procedures across blended environments.
0

Cyber Jobs of the Future: Sleuth, Bodyguard, 'Immunity' Developer

With artificial intelligence poised to displace many SOC professionals, it's important to think ahead to potential niches for cybersmart humans — even to outer space.
0

Cloudflare Announces Email Security & Data Protection Tools

0

San Fran's BART Investigates Vice Society Data Breach Claims

Thứ Ba, 10 tháng 1, 2023
Vice Society is boasting that it compromised the San Francisco transportation system, while BART maintains operations and mounts an investigation.
0

Cerberus Sentinel to Acquire RAN Security

US cybersecurity services firm continues expansion into Latin America.
0

Quantum Decryption Breakthrough? Not So Fast

A paper by two dozen Chinese researchers maintains that near-future quantum computers could crack RSA-2048 encryption, but experts call the claims misleading.
0

Microsoft: Kinsing Targets Kubernetes via Containers, PostgreSQL

The cryptomining malware, which typically targets Linux, is exploiting weaknesses in an open source container tool for initial access to cloud environments.
0

Moving Analytics Launches Single Sign on to Strengthen Data Security and Improve User Experience

Moving Analytics, leading provider of virtual cardiac rehabilitation and prevention, announced that it is launching single sign on authentication for its entire software platform.
0

Black Hat Flashback: The Deadly Consequences of Weak Medical Device Security

Hacking to kill: Dark Reading's Fahmida Y. Rashid reflects on the monumental Black Hat 2011 moment when Jay Radcliffe showed how to hack his insulin pump.
0

Rackspace Ransomware Incident Highlights Risks of Relying on Mitigation Alone

Thứ Hai, 9 tháng 1, 2023
Organizations often defer patching because of business disruption fears — but that didn't work out very well for Rackspace's Hosted Exchange service.
0

'Copyright Infringement' Lure Used for Facebook Credential Harvesting

Business users receive a message from Facebook warning their accounts will be permanently suspended for using photos illegally if they don't appeal within 24 hours, leading victims to a credential-harvesting page instead.
0

JsonWebToken Security Bug Opens Servers to RCE

The JsonWebToken package plays a big role in the authentication and authorization functionality for many applications.
0

Schneider Electric and BitSight Announce Partnership to Improve Detection of Operational Technology (OT) Cybersecurity Exposure

0

Web 3.0 Shifts Attack Surface and Highlights Need for Continuous Security

A model of continuous authentication and identification is needed to keep consumers safe.
0

CISOs Are Focused on These 3 Trends. Are You?

Chủ Nhật, 8 tháng 1, 2023
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
0

In Memoriam: Remembering Those Who Passed

Thứ Sáu, 6 tháng 1, 2023
Security stands on the shoulders of giants. We take a moment to remember their contributions toward keeping people, data, and systems safe.
0

Russia-Linked Turla APT Sneakily Co-Opts Ancient Andromeda USB Infections

Using command-and-control servers from the decade-old Andromeda malware, the group is installing reconnaissance tools and a backdoor on previously infected systems to target Ukrainian victims.
0

Vice Society Releases Info Stolen From 14 UK Schools, Including Passport Scans

In what's become a pattern, the cybercriminal ring stole data, demanded payment, and posted personal information when ransom was denied.
0

PurpleUrchin Gang Embraces DevOps In Massive Cloud Malware Campaign

The Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger.
0

Don't Be Blindsided by Software Bills of Materials

It's imperative we collaborate and partner to improve software security. This may require developing tools and standards that can enrich SBOMs and provide deeper analysis.
0

ChatGPT Artificial Intelligence: An Upcoming Cybersecurity Threat?

The role of artificial intelligence in cybersecurity is growing. A new AI model highlights the opportunities and challenges.
0

Check Point Research Reports a 38% Increase In 2022 Global Cyberattacks

Thứ Năm, 5 tháng 1, 2023
0

CircleCI: Rotate Stored Secrets ASAP

DevOps platform warns customers of a "security incident" under investigation.
0

Space Race: Defenses Emerge as Satellite-Focused Cyberattacks Ramp Up

Amid escalating cyber activity, two separate cybersecurity frameworks are targeting the satellite arena, highlighting the ease in attacking the infrastructure and the difficulty in defending it.
0

Threat Actors Evade Detection Through Geofencing & Fingerprinting

Security teams may be missing targeted attacks and advanced exploits if attackers are using evasive techniques to avoid detection. Defenders need to up their game.
0

How to Ensure Cybersecurity Investments Remain a Priority Across Your Organization

Collaboration across all business units is key to building a robust cybersecurity program.
0

Trend Micro Announces New Subsidiary for 5G Cybersecurity

0

Rackspace: Ransomware Attack Bypassed ProxyNotShell Mitigations

Thứ Tư, 4 tháng 1, 2023
The hosting provider had not applied Microsoft's new patch due to publicly reported issues with the update.
0

Five Guys Data Breach Puts HR Data Under a Heat Lamp

Job applicants could face a raft of follow-on attacks after cyber intruders accessed their data in an opportunistic attack.
0

Effective and Efficient Automation for Security Teams

Even very short tasks may be worth automating if you do them frequently. Here's how to decide what to tackle first.
0

Understanding Infrastructure-as-Code Risks in the Cloud

Improve overall IT administration and establish a framework to identify misconfigurations and automate the process of checking IaC before it makes it into the production environment.
0

Insights On the Mobile Biometrics Global Market To 2028 - Increase In Platforms Using Biometric Authentication Drives Growth

0

C2A Security To Showcase Automotive Cybersecurity DevOps Platform at CES In Las Vegas, January 5-8

Thứ Ba, 3 tháng 1, 2023
0

Holiday Spirit? LockBit Gives Children's Hospital Free Decryptor

The Russian-speaking cybercrime gang said an affiliate violated its rules against attacks that could lead to bodily harm for medical patients.
0

Raspberry Robin Worm Hatches a Highly Complex Upgrade

The Evil Corp-linked malware family has undergone an evolution, becoming more obfuscated and "several times more complex," as the group behind it tests how far the worm can be spread.
0

Chinese 'RedZei' Group Batters Victims With Incessant Vishing Effort

The cybercriminals switch up carriers and SIM cards regularly, making it difficult for either mobile users or telecom companies to block the barrage of malicious calls and voicemails.
0

Name That Edge Toon: The Upside Down

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
0

Are Meta and Twitter Ushering in a New Age of Insider Threats?

The era of digital trust is broken, and constant vigilance is needed to get things back on track.
0

Black Hat Flashback: The Day That Dan Kaminsky Saved the Internet

Dark Reading's Kelly Jackson Higgins explains the enormous legacy left behind by Dan Kaminsky and his seminal "Great DNS Vulnerability" talk at Black Hat 2008.