Category: Dark Reading

10 Features an API Security Service Needs to Offer

Securing APIs is specialized work. Here’s what organizations should look for when selecting an outside partner. This article has been indexed from Dark Reading Read the original article: 10 Features an API Security Service Needs to Offer

APT35 Develops Mac Bespoke Malware

Iran-linked APT35 group crafted specific Mac malware when targeting a member of the media with new tools to add backdoors. This article has been indexed from Dark Reading Read the original article: APT35 Develops Mac Bespoke Malware

Deepfake Quantum AI Investment Scam Pops Up on Facebook

A consumer finance journalist and television personality took to Twitter to warn his followers about advertisements using his name and face to scam victims. This article has been indexed from Dark Reading Read the original article: Deepfake Quantum AI Investment…

How to Use Log Management to Retrace Your Digital Footsteps

Log management tools help IT and security teams monitor and improve a system’s performance by identifying bugs, cybersecurity breaches, and other issues that can create outages or compliance problems. This article has been indexed from Dark Reading Read the original…

Spyware Gamed 1.5M Users of Google Play Store

Malware spoofed file management applications thanks to elevated permissions, enabling exfiltration of sensitive data with no user interaction, researchers find. This article has been indexed from Dark Reading Read the original article: Spyware Gamed 1.5M Users of Google Play Store

MOVEit Transfer Faces Another Critical Data-Theft Bug

Users need to patch the latest SQL injection vulnerability as soon as possible. Meanwhile, Cl0p’s data extortion rampage gallops on. This article has been indexed from Dark Reading Read the original article: MOVEit Transfer Faces Another Critical Data-Theft Bug

Startup Spotlight: Endor Labs Focuses on Reachability

The company, one of four finalists in Black Hat USA’s 2023 startup competition, looks to find the vulnerabilities an attacker could actually access. This article has been indexed from Dark Reading Read the original article: Startup Spotlight: Endor Labs Focuses…

Shell Becomes Latest Cl0p MOVEit Victim

In another MOVEit attack, oil and gas giant Shell has been made a victim with the release of the private information of its employees. This article has been indexed from Dark Reading Read the original article: Shell Becomes Latest Cl0p…

Privacy Woes Hold Up Global Instagram Threads Launch

Meta’s answer to Twitter went live and quickly racked up millions of members — but the social media app’s privacy practices are under the microscope. This article has been indexed from Dark Reading Read the original article: Privacy Woes Hold…

6 Steps To Outsmart Business Email Compromise Scammers

Email fraud is a confidence game that costs the economy billions. An effective defense takes technology and vigilance. This article has been indexed from Dark Reading Read the original article: 6 Steps To Outsmart Business Email Compromise Scammers

Microsoft Teams Exploit Tool Auto-Delivers Malware

The “TeamsPhisher” cyberattack tool gives pentesters — and adversaries — a way to deliver malicious files directly to a Teams user from an external account, or tenant. This article has been indexed from Dark Reading Read the original article: Microsoft…

OPERA1ER Cybercrime Group’s Leader Arrested by Interpol

The group’s mastermind was nabbed in Côte d’Ivoire for stealing up to $30 million using malware, phishing campaigns, and BEC scams, as part of international law enforcement’s Operation Nervone. This article has been indexed from Dark Reading Read the original…

OPERA1ER Cybercrime Group’s Leader Arrested by INTERPOL

The group’s mastermind was nabbed in Côte d’Ivoire for stealing up to $30 million using malware, phishing campaigns, and BEC scams, as part of international law enforcement’s Operation Nervone. This article has been indexed from Dark Reading Read the original…

Ransomware Halts Operations at Japan’s Port of Nagoya

LockBit 3.0 claims responsibility for the cyberattack that shuttered the largest port in Japan, according to authorities. This article has been indexed from Dark Reading Read the original article: Ransomware Halts Operations at Japan’s Port of Nagoya

Microsoft Can Fix Ransomware Tomorrow

You can’t encrypt a file you can’t open — Microsoft could dramatically impact ransomware by slowing it down This article has been indexed from Dark Reading Read the original article: Microsoft Can Fix Ransomware Tomorrow

Israel Aided UAE in Defending Against DDoS Attack

Israel’s cyber head points finger at Iran-backed MuddyWater APT group as the perpetrator of a recent attack against a university. This article has been indexed from Dark Reading Read the original article: Israel Aided UAE in Defending Against DDoS Attack

SSH Servers Hit in ‘Proxyjacking’ Cyberattacks

Cybercriminals employ obfuscated script to stealthily hijack victim server bandwidth for use in legitimate proxy networks. This article has been indexed from Dark Reading Read the original article: SSH Servers Hit in ‘Proxyjacking’ Cyberattacks

Name That Edge Toon: Three-Ring Circus

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Edge Toon: Three-Ring Circus

Architecting XDR to Save Money and Your SOC’s Sanity

XDR can lower platform costs and improve detection, but it requires committing to a few principles that go against the established way of thinking about SOC. This article has been indexed from Dark Reading Read the original article: Architecting XDR…

3 Ways to Build a More Skilled Cybersecurity Workforce

With the right collaboration among employers, educators, and policymakers, we can come together to create a more secure environment for all. This article has been indexed from Dark Reading Read the original article: 3 Ways to Build a More Skilled…

AI-Enabled Voice Cloning Anchors Deepfaked Kidnapping

Virtual kidnapping is just one of many new artificial intelligence attack types that threat actors have begun deploying, as voice cloning emerges as a potent new imposter tool. This article has been indexed from Dark Reading Read the original article:…

Cybersecurity Is the Healthcare Your Organization Needs

Organizations should consider their security practices the same way people think about their well-being. Focus on staying healthy instead of finding a new pill for every security symptom you see. This article has been indexed from Dark Reading Read the…

3 Tips to Increase Hybrid and Multicloud Security

As cloud adoption grows, organizations need to rethink their approaches to securing hybrid cloud and multicloud environments. This article has been indexed from Dark Reading Read the original article: 3 Tips to Increase Hybrid and Multicloud Security

Newbie Akira Ransomware Builds Momentum With Linux Shift

A new version of the double-extortion group’s malware reflects a growing trend among ransomware actors to expand cybercrime opportunities beyond Windows. This article has been indexed from Dark Reading Read the original article: Newbie Akira Ransomware Builds Momentum With Linux…

Social Engineering Adds Depth to Red Team Exercises

Because social engineering usually succeeds, companies need to test whether their defenses can block adversaries that gain employees’ trust. This article has been indexed from Dark Reading Read the original article: Social Engineering Adds Depth to Red Team Exercises

Astrix Security Raises $25M in Series A Funding

The investment will allow enterprises to further secure non-human identities and safely leverage the soaring adoption of third-party apps and Generative AI services. This article has been indexed from Dark Reading Read the original article: Astrix Security Raises $25M in…

3 Strategies for Bringing Rigor to Software Security

With the National Cybersecurity Strategy planning to add real teeth into enforcement actions, software vendors have extra incentive to reduce applications’ security debt. This article has been indexed from Dark Reading Read the original article: 3 Strategies for Bringing Rigor…

Trans-Rights Hacktivists Steal City of Ft. Worth’s Data

In a move to embarrass the city, hacking group known as SiegedSec accessed thousands of files with administrator logins, but it’s making no ransom demands. This article has been indexed from Dark Reading Read the original article: Trans-Rights Hacktivists Steal…

Mockingjay Slips By EDR Tools With Process Injection Technique

By leveraging misconfigured DLLs instead of EDR-monitored APIs, this new technique injects malicious code into running processes, completely evading endpoint security. This article has been indexed from Dark Reading Read the original article: Mockingjay Slips By EDR Tools With Process…

Most Enterprise SIEMs Blind to MITRE ATT&CK Tactics

Organizations are largely deluded about their own security postures, according to an analysis, with the average SIEM failing to detect a whopping 76% of attacker TTPs. This article has been indexed from Dark Reading Read the original article: Most Enterprise…

Pilot Applicant Information for American, Southwest Hacked

The attack exposed personal information from pilot applicants, prompting both airlines to ditch their third-party provider and move services internally. This article has been indexed from Dark Reading Read the original article: Pilot Applicant Information for American, Southwest Hacked

Why Cyber Funding Flows for Rural Water Systems

The $7.5 million in new funds from the Cybersecurity for Rural Water Systems Act of 2023 is not just a drop in the bucket for crucially important rural water systems. This article has been indexed from Dark Reading Read the…

SolarWinds Execs Targeted by SEC, CEO Vows to Fight

CEO says SEC penalties related to the 2020 SolarWinds supply chain attacks are unwarranted and is ready to mount a defense to any legal actions against the company or its employees. This article has been indexed from Dark Reading Read…