0

Elastic Expands Cloud Security Capabilities With Improved App Security

Thứ Sáu, 28 tháng 4, 2023
Mike Nichols of Elastic Security joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss extended detection and response (XDR) and endpoint detection and response (EDR).
0

Slashnext: How Generative AI is Changing the Threat Landscape

Patrick Harr of SlashNext joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss generative AI.
0

Wiz: Breaking Up Silos With CNAPP And the Future Of Cloud Security

Yinon Costica of Wiz joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss CNAPP and cloud security.
0

Google Bans Thousands of Play Store Developer Accounts to Block Malware

Last year Google banned 173,000 developer accounts and prevented 1.5 million apps from reaching the Play Store as it fought policy violations and malware.
0

Firmware Looms as the Next Frontier for Cybersecurity

Software bugs are ubiquitous, and we're familiar with hardware threats. But what about the gap in the middle? Two researchers at Black Hat Asia will attempt to focus our attention there.
0

Cyber Certainty: Investing in Resilience During a Post Correction Market

In 2023, there is massive innovation being developed in all sectors, from cybersecurity to AI and quantum computing to IT management and information security, and in all the ways they intersect.
0

CISO Survival Guide for Cyberattacks

Thứ Năm, 27 tháng 4, 2023
CISOs who have survived major cyber incidents recommend letting company ethos guide incident response.
0

Uptycs Launches Cloud Security Early Warning System

0

'Anonymous Sudan' Claims Responsibility for DDoS Attacks Against Israel

The group has unleashed numerous attacks against the country during the week of Israel's Independence Day.
0

China's 'Evasive Panda' Hijacks Software Updates to Deliver Custom Backdoor

Researchers observed downloads of installers for the APT's flagship backdoor, MgBot, when users at a Chinese NGO were updating legitimate applications.
0

Combating Kubernetes — the Newest IAM Challenge

IT leaders need to ensure Kubernetes clusters don't become a gateway for cybercriminals.
0

Tenable Makes Generative AI Security Tools Available to the Research Community

0

Google 2FA Syncing Feature Could Put Your Privacy at Risk

Thứ Tư, 26 tháng 4, 2023
Researchers find that the encryption of a user's 2FA secrets are stripped after transportation to the cloud.
0

BigID and Thales Collaborate to Deliver Comprehensive Data Protection and Privacy Compliance

0

Linux Shift: Chinese APT Alloy Taurus Is Back With Retooling

An old threat actor is making its comeback, sending around their old malware with a new tint.
0

High-Severity SLP Flaw Can Amplify DDoS Attacks up to 2,200 Times

More than 2,000 global organizations — including Fortune 1,000 companies — are at risk to reflective DDoS attacks that exploit a vulnerability discovered in the legacy Internet protocol.
0

CyberGRX Announces Winners of the Inaugural Cyber Risk Nation Awards

Awarded individuals and companies are trailblazers in third-party risk management.
0

Malware-Free Cyberattacks Are On the Rise; Here's How to Detect Them

Last year, 71% of enterprise breaches were pulled off quietly, with legitimate tools, research shows.
0

HiddenLayer Nabs Most Innovative Startup Crown at RSAC

Thứ Ba, 25 tháng 4, 2023
The judges appreciated the scale of the problem the startup set out to solve: protecting the integrity of AI systems.
0

'Good' AI Is the Only Path to True Zero-Trust Architecture

Ultimately AI will protect the enterprise, but it's up to the cybersecurity community to protect 'good' AI in order to get there, RSA's Rohit Ghai says.
0

DDoS, Not Ransomware, Is Top Business Concern for Edge Networks

A study found that ransomware threats are viewed as having the lowest overall perceived likelihood of attack on the edge.
0

Attackers Abuse PaperCut RCE Flaws to Take Over Enterprise Print Servers

Customers should apply updates to the print management software used by more than 100 million organizations worldwide, with typical US customers found in the SLED sector.
0

The Decline in Ransomware: Does It Actually Increase Risks for Organizations?

Organizations need to remain vigilant and not take the decline as reason to cut back their cybersecurity strategies.
0

Building a Better SBOM

Generating an SBOM is easy. It's generating one that's comprehensive and accurate that's hard.
0

Qwiet AI Builds a Neural Net to Catch Coding Vulnerabilities

Thứ Hai, 24 tháng 4, 2023
Code property graphs and a threat feed powered by artificial narrow intelligence help developers incorporate AppSec into DevOps.
0

ZeroFox to Acquire LookingGlass, Broadening Global Attack Surface Intelligence Capabilities

Deal strengthens ZeroFox's External Cybersecurity Platform with attack surface management (EASM) and threat intelligence capabilities.
0

Cisco Unveils Solution to Rapidly Detect Advanced Cyber Threats and Automate Response

0

Cybersecurity Survival: Hide From Adversarial AI

Consider adding some security-through-obscurity tactics to your organization's protection arsenal to boost protection. Mask your attack surface behind additional zero-trust layers to remove AI's predictive advantage.
0

The New Frontier in Email Security: Goodbye, Gateways; Hello, Behavioral AI

As email attackers move to more targeted and sophisticated attacks, email security needs to understand the organization, not past attacks, to keep up with attacker innovation and stop novel threats on the first encounter.
0

CrowdStrike Introduces CrowdStream to Accelerate and Simplify XDR Adoption

Powered by Cribl, a CrowdStrike Falcon Fund partner, and available to CrowdStrike Falcon platform customers.
0

Shields Health Breach Exposes 2.3M Users' Data

Thứ Sáu, 21 tháng 4, 2023
The medical imaging firm's systems were compromised by a threat actor, exposing patients' driver's licenses and other identifying information.
0

Intel Prioritizes Security in Latest vPro Chips

While Intel is building more hardware protections directly into the chips, enterprises still need a strategy for applying security updates on these components.
0

OpenSSF Adds Software Supply Chain Tracks to SLSA Framework

The Open Source Security Foundation's SLSA v1.0 release is an important milestone in improving software supply chain security and providing organizations with the tools they need to protect their software.
0

Infoblox Uncovers DNS Malware Toolkit & Urges Companies to Block Malicious Domains

Thứ Năm, 20 tháng 4, 2023
0

'GhostToken' Opens Google Accounts to Permanent Infection

A bug in how Google Cloud Platform handles OAuth tokens opened the door to Trojan apps that could access anything in users' personal or business Google Drives, Photos, Gmail, and more.
0

Red Canary Announces Readiness

0

Major US CFPB Data Breach Caused by Employee

The sensitivity of the personal information involved in the breach has yet to be determined by agency officials, but it affects 256,000 consumers.
0

Global Spyware Attacks Spotted Against Both New & Old iPhones

Campaigns that wielded NSO Group's Pegasus against high-risk users over a six-month period demonstrate the growing sophistication and relentless nature of spyware actors.
0

GPT-4 Provides Improved Answers While Posing New Questions

As is typical with emerging technologies, both innovators and regulators struggle with developments in generative AI, much less the rules that should govern its use.
0

Newer Authentication Tech a Priority for 2023

Organizations are planning on newer multifactor authentication methods such as invisible MFA and passwordless, says SecureAuth in its State of Authentication report.
0

7 Sizzling Sessions to Check Out at RSA Conference 2023

Thứ Tư, 19 tháng 4, 2023
Here are some of the most interesting, can't-miss sessions at the upcoming show in San Francisco.
0

Russian Fancy Bear APT Exploited Unpatched Cisco Routers to Hack US, EU Gov't Agencies

The nation-stage threat group deployed custom malware on archaic versions of Cisco's router operating system. Experts warn that such attacks targeting network infrastructure are on the rise.
0

CrowdStrike Announces Managed XDR to Close the Cybersecurity Skills Gap, Expands MDR Portfolio

0

Report: Over Half of North American Consumers Are Open to Passwordless

Thứ Ba, 18 tháng 4, 2023
1Password research reveals consumers are fed up with passwords; education, access, and validation will drive passwordless adoption.
0

'Zaraza' Bot Targets Google Chrome to Extract Login Credentials

The data-stealing malware threatens the cyber safety of individual and organizational privacy by infecting a range of Web browsers.
0

QBot Expands Initial Access Malware Strategy With PDF-WSF Combo

The infamous Trojan's operators are switching up tactics with the use of simulated business correspondence, which helps instill trust with intended victims, and a stealthier payload.
0

Researchers Discover First Ever Major Ransomware Targeting macOS

In targeting Apple users, LockBit is going where no major ransomware gang has gone before. But it's a warning shot, and Mac users need not worry yet.
0

APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks

China-linked APT41 group targeted a Taiwanese media organization and an Italian job agency with standard, open source penetration test tools, in a change in strategy.
0

Why Your Anti-Fraud, Identity & Cybersecurity Efforts Should Be Merged

To address the rising risk of online fraud, stolen identities, and cyberattacks, innovative organizations have begun converging their security functions — here's how yours can prepare.
0

lockr Raises $2.5M

Thứ Hai, 17 tháng 4, 2023
lockr preserves open access to information across the Internet while honoring consumer privacy and choice.
0

Google Issues Emergency Chrome Update for Zero-Day Bug

Because the security vulnerability is under active exploit, Google isn't releasing full details of the flaw while users could remain vulnerable.
0

How CISOs Can Craft Better Narratives for the Board

Communicating cyber-risk upward to C-suite and board takes simplification and better understanding of the audience.
0

Aloha PoS Restaurant Software Downed by Ransomware Attack

Thousands of restaurants impacted by what Aloha PoS parent company NCR says was a ransomware attack on one of its data centers.
0

Name That Toon: Lucky Charm

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
0

Top 5 Data Security RSAC 2023 Sessions to Attend

A little preconference reconnoitering of upcoming seminars, keynotes, and track sessions makes plotting your days easier. Here's one attendee's list.
0

Russian SolarWinds Culprits Launch Fresh Barrage of Espionage Cyberattacks

Thứ Sáu, 14 tháng 4, 2023
The threat group behind the SolarWinds supply-chain attacks is back with new tools for spying on officials in NATO countries and Africa.
0

Why xIoT Devices Are Cyberattackers' Gateway Drug for Lateral Movement

Detailing how extended IoT (xIoT) devices can be used at scale by attackers to establish persistence across networks and what enterprises should start doing about the risk.
0

Software-Dependency Data Delivers Security to Developers

Google has opened up its software-dependency database, adding to the security data available to developers and tool makers. Now developers need to use it.
0

Bugs in Manarium Play-to-Earn Showcase Crypto-Gaming Insecurity

Researchers plug in winning scores to make off with NFTs without actually playing the GameFi platform's minigames.
0

Western Digital Hackers Demand 8-Figure Ransom Payment for Data

Western Digital has yet to comment on claims that the breach reported earlier this month led to data being stolen.
0

SASE Market Worth $5.9B by 2028 — Report by MarketsandMarkets™

0

What the Recent Collapse of SVB Means for Privacy

Businesses must be diligent in their actions, cultivate awareness with employees, and implement strict standards around external communications in the wake of Silicon Valley Bank's collapse.
0

Why the US Needs Quantum-Safe Cryptography Deployed Now

Thứ Năm, 13 tháng 4, 2023
Quantum computers might be a decade away, but guess how long it will take to switch systems over to post-quantum cryptography?
0

Remcos RAT Targets Tax Pros to Scurry Off With Workers' Filing Info

Something exciting to liven up tax season: cybercriminals accessing sensitive personal information for individuals through the army of accountants preparing for Tax Day in the US.
0

Super-Yacht Specialist Lürssen in Dry Dock After Ransomware Attack

The ransomware attack proves that even the wealthiest cannot buy their immunity from threat actors.
0

The Internet Reform Trilemma

An "open" Internet faces challenges from autocratic governance models. Policymakers should instead think about creating an Internet that's equitable, inclusive, and secure.
0

Opera Adds Free VPN to Opera for iOS

Thứ Tư, 12 tháng 4, 2023
0

FBI & FCC Warn on 'Juice Jacking' at Public Chargers, but What's the Risk?

Hackers can compromise public charging hubs to steal data, install malware on phones, and more, threatening individuals and businesses alike.
0

Survey Findings Show Link Between Data Silos and Security Vulnerabilities

A recent survey showed a surprising correlation between those who operate their businesses with risk and compliance data in silos and those who experienced data breaches in the last 24 months.
0

Data on 400K Kodi Forum Members Stolen and Put Up for Sale

Open source media player Kodi still hasn't recovered its forum and plans to redeploy it on a new server with software update.
0

Microsoft: NSO Group-Like 'QuaDream' Actor Selling Mobile Spyware to Governments

Researchers at Microsoft have discovered links between a threat group tracked as DEV-0196 and an Israeli private-sector company, QuaDream, that sells a platform for exfiltrating data from mobile devices.
0

Gartner: Human-Centric Design Is Top Cybersecurity Trend for 2023

In order to reduce cybersecurity risks and failures, organizations will need to focus on employees, management, and new operating models.
0

LastPass Breach Reveals Important Lessons

Devastating cyberattacks often can be prevented with basic cybersecurity measures.
0

Microsoft Patches 97 CVEs, Including Zero-Day & Wormable Bugs

Thứ Ba, 11 tháng 4, 2023
The April 2023 Patch Tuesday security update also included a reissue of a fix for a 10-year-old bug that a threat actor recently exploited in the supply chain attack on 3CX.
0

Microsoft Azure Shared Key Misconfiguration Could Lead to RCE

Azure admins are urged to disable shared key access and implement Azure Active Directory authentication.
0

'Blatantly Obvious': Spyware Offered to Cyberattackers via PyPI Python Repository

Malware-as-a-service hackers from Spain decided to use a public code repository to openly advertise their wares.
0

7 Things Your Ransomware Response Playbook Is Likely Missing

Incident response experts share their secrets for success when it comes to creating a professional-grade ransomware response playbook. Are you ready for the worst?
0

Attackers Hide RedLine Stealer Behind ChatGPT, Google Bard Facebook Ads

The campaign shrouds the commodity infostealer in OpenAI files in a play that aims to take advantage of the growing public interest in AI-based chatbots.
0

How Password Managers Can Get Hacked

Password managers aren't foolproof, but they do help mitigate risks from weak credentials and password reuse. Following best practices can contribute to a company's defenses.
0

Apps for Sale: Cybercriminals Sell Android Hacks for Up to $20K a Pop

Thứ Hai, 10 tháng 4, 2023
The marketplace for malicious Google Play applications and app-takeover tools is thriving, thanks to novel hacking techniques and lax enterprise security.
0

Pair of Apple Zero-Days Under Active Exploit; Patch & Update Accordingly

Unpatched Macs, iPhones, and iPads open to browser takeover and system kernel-level malicious code execution, Apple warns.
0

High-Stakes Ransomware Response: Know What Cards You Hold

When ransomware strikes, how much should you gamble on your resources and opponents' intentions? Here's how to deal yourself a rational, informed way to weigh your options after an attack.
0

Russia's Joker DPR Claims Access to Ukraine Troop Movement Data

A hacktivist group working with Russia claims it breached DELTA, the Ukrainian battlefield management system (BMS).
0

How and Why to Put Multicloud to Work

Complex multicloud environments present organizations with security challenges, but also opportunities for efficiency.
0

Rethinking Cybersecurity's Structure & the Role of the Modern CISO

A CISO with a focused role will be better prepared to thrive in an organization and accelerate adoption and understanding of cybersecurity.
0

TikTok, Other Mobile Apps Violate Privacy Regulations

Thứ Sáu, 7 tháng 4, 2023
App developers are ignoring laws and guidelines regulating data protection measures aimed at minors, putting their monetization plans in jeopardy and risking user trust.
0

Close the Permissions Gap With Identity And Access Management For Multicloud Workforces

Consolidating identity management on one platform gives organizations real-time access management for all identities on hybrid and multicloud installations. (First of a two-part series.)
0

Printers Pose Persistent Yet Overlooked Threat

Vulnerabilities in the device firmware and drivers underscore how printers cannot be set-and-forget technology and need to be managed.
0

Bad Actors Will Use Large Language Models — but Defenders Can, Too

Security teams need to find the best, most effective uses of large language models for defensive purposes.
0

Cybercriminals 'CAN' Steal Your Car, Using Novel IoT Hack

Your family's SUV could be gone in the night thanks to a headlight crack and hack attack.
0

Fight AI With AI

Thứ Năm, 6 tháng 4, 2023
By developing new tools to defend against adversarial AI, companies can help ensure that AI is developed and used in a responsible and safe manner.
0

What to Discuss at RSA Conference — and It's Not ChatGPT

In-person conversations are a productive way to understand the state of the industry and learn new techniques. Take advantage of peers' experience, compare notes, and boost your skill set.
0

Styx Marketplace Provides Hub for Financial Cybercrime

An emerging, illicit marketplace proves that financial cybercrime is still on the rise, with a need for countries to collectively put safeguards in place.
0

The Pope's Security Gets a Boost With Vatican's MDM Move

Faced with enterprise challenges, the Holy See looks to ensure it avoids a "holey" mobile device management solution.
0

AppSec Looms Large for RSAC 2023 Innovation Sandbox Finalists

Thứ Tư, 5 tháng 4, 2023
Application security is the dominant trend for this year's startup contest, but AI, blockchain, and compliance are all represented as well.
0

BlackBerry Introduces Integrated Solution to Assure Secure Bi-Directional Response Communications During Cyber Incidents

BlackBerry integrates award-winning CylanceGUARD and BlackBerry AtHoc technologies for "combat-ready" cyber event continuity planning and response.
0

Garage Door Openers Open to Hijacking, Thanks to Unpatched Security Vulns

CISA is advising Nexx customers to unplug impacted devices until the security issues are addressed — but so far, it's crickets as to patch timeline.
0

F5 Safeguards Digital Services With New AI-Powered App and API Security Capabilities

Thứ Ba, 4 tháng 4, 2023
Enhanced API defenses, granular machine learning capabilities, and new managed service offerings provide comprehensive protection across distributed environments.
0

Akamai Launches Managed Security Service Updates and New Premium Offering

Customers have increased access to Akamai security experts to help protect from sophisticated cyberattacks.
0

eFile Tax Return Software Found Serving Up Malware

In the height of tax-return season, a popular tax prep software service leaves a malicious JavaScript file online for weeks.
0

Mysterious 'Rorschach' Ransomware Doubles Known Encryption Speeds

The malware is one of the most sophisticated ransomwares ever seen in the wild, and marks a leap ahead for cybercrime.
0

'Proxyjacking' Cybercriminals Exploit Log4J in Emerging, Lucrative Cloud Attacks

Proxyjacking is an emerging, low-effort and high-reward attack for threat actors, with the potential for far-reaching implications.
0

How Strategic Investors Can Help Cybersecurity Startups

Cybersecurity startups face pressure during this economic uncertainty, but strategic investors can help them succeed in providing tech that defends against cyberattacks.
0

3CX Breach Widens as Cyberattackers Drop Second-Stage Backdoor

Thứ Hai, 3 tháng 4, 2023
"Gopuram" is a backdoor that North Korea's Lazarus Group has used in some campaigns dating back to 2020, some researchers say.
0

For Cybercrime Gangs, Professionalization Comes With 'Corporate' Headaches

They rake in millions, but now, as much as zero-days and ransoms, cybercriminals are dealing with management structures and overhead.
0

Data Breach Strikes Western Digital

The company behind digital storage brand SanDisk says its systems were compromised on March 26.
0

How Good Is Your Advanced Threat Management?

Whether protecting a financial institution or a hospital, everyone needs an effective strategy for fending off slippery threats like those that hide in memory.
0

Name That Edge Toon: Tower of Babble

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
0

4 Steps for Shifting Left & Winning the Cybersecurity Battle

If companies prioritize communications and make the DevOps process more transparent, team members will better know what vulnerabilities to look for.