Category: Dark Reading

Cl0p in Your Network? Here’s How to Find Out

Companies targeted by hacking groups with Cl0p ransomware typically have several chances to catch the attack prior to the payload being deployed, experts say. This article has been indexed from Dark Reading Read the original article: Cl0p in Your Network?…

Remediation Ballet Is a Pas de Deux of Patch and Performance

AI-generated code promises quicker fixes for vulnerabilities, but ultimately developers and security teams must balance competing interests. This article has been indexed from Dark Reading Read the original article: Remediation Ballet Is a Pas de Deux of Patch and Performance

How Infrastructure as Code Can Help Minimize Human Error

Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code. This article has been indexed from Dark Reading Read the original article: How Infrastructure as Code Can Help Minimize…

Trojanized Super Mario Installer Goes After Gamer Data

A legitimate installer for the popular Nintendo game infects Windows machines with various malware, including a cryptominer and an infostealer, again showcasing the importance of remote worker security hygiene. This article has been indexed from Dark Reading Read the original…

ITDR Combines and Refines Familiar Cybersecurity Approaches

Identity threat detection and response adds user entity behavioral analytics to fraud detection, creating a powerful tool for real-time protection. This article has been indexed from Dark Reading Read the original article: ITDR Combines and Refines Familiar Cybersecurity Approaches

Suspicious Smartwatches Mailed to US Army Personnel

Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise. This article has been indexed from Dark Reading Read the original article: Suspicious Smartwatches Mailed to…

Why Legacy System Users Prioritize Uptime Over Security

For line-of-business execs, the fear of grinding mission-critical systems to a halt overrides the fear of ransomware. How can CISOs overcome this? This article has been indexed from Dark Reading Read the original article: Why Legacy System Users Prioritize Uptime…

Deception Technologies Have a Maturity Problem

While there’s plenty of upside to rolling out deception technologies, it’s not clear if cybersecurity leaders — or their organizations — are ready for them. This article has been indexed from Dark Reading Read the original article: Deception Technologies Have…

Job Seekers, Look Out for Job Scams

Scammers are setting out lures for people looking for work. If a position sounds too good to be true, it probably is. This article has been indexed from Dark Reading Read the original article: Job Seekers, Look Out for Job…

Growing SaaS Usage Means Larger Attack Surface

Software-as-a-service expands an organization’s attack surface, and security teams need to understand how to address those risks. This article has been indexed from Dark Reading Read the original article: Growing SaaS Usage Means Larger Attack Surface

Airgap Networks Acquires NetSpyGlass

Acquisition of NetSpyGlass extends Airgap Zero Trust Firewall™ innovation leadership with advanced network and asset intelligence for business-critical networks. This article has been indexed from Dark Reading Read the original article: Airgap Networks Acquires NetSpyGlass

Sumsub Launches Advanced Deepfakes Detector

Full-cycle verification platform enhances its facial biometrics verification with innovative deepfake detection technology; shares new 2023 identity fraud trends. This article has been indexed from Dark Reading Read the original article: Sumsub Launches Advanced Deepfakes Detector

5 Steps for Minimizing Dark Data Risk

Dark data may be your most elusive asset, but it can also be your most costly if you don’t protect it. This article has been indexed from Dark Reading Read the original article: 5 Steps for Minimizing Dark Data Risk

6 Attack Surfaces You Must Protect

More connectivity means more potential ways into your enterprise, so securing every main attack surface is imperative. This article has been indexed from Dark Reading Read the original article: 6 Attack Surfaces You Must Protect

Lessons From a Pen Tester: 3 Steps to Stay Safer

From hardening Windows systems to adding access control and segmenting the network, there are steps organizations can take to better secure corporate data. This article has been indexed from Dark Reading Read the original article: Lessons From a Pen Tester:…

Ironscales Adds AI Assistant to Suss Out Phishing Attempts

The company says its Themis Co-pilot for Outlook helps recipients discern business email compromise attacks, reducing false positives for security staff. This article has been indexed from Dark Reading Read the original article: Ironscales Adds AI Assistant to Suss Out…

Keep Job Scams From Hurting Your Organization

From fake job listings that ding your reputation to fake job applicants who hack your network, job scams are a major threat. This article has been indexed from Dark Reading Read the original article: Keep Job Scams From Hurting Your…

SMB Edge Devices Walloped With Asus, Zyxel Patch Warnings

A slew of critical advisories this week showcase an exploding edge device attack surface for SMBs, which have limited cybersecurity protection, visibility, and maintenance available. This article has been indexed from Dark Reading Read the original article: SMB Edge Devices…

Cyberattacks on OT, ICS Lay Groundwork for Kinetic Warfare

Organizations need to start taking critical infrastructure threats seriously, as they could be a precursor to future, hybrid cyber-kinetic warfare attacks, experts warn. This article has been indexed from Dark Reading Read the original article: Cyberattacks on OT, ICS Lay…

Fresh Ransomware Gangs Emerge As Market Leaders Decline

The ransomware landscape is energized with the emergence of smaller groups and new tactics, while established gangs like LockBit see fewer victims. This article has been indexed from Dark Reading Read the original article: Fresh Ransomware Gangs Emerge As Market…

Rorschach Ransomware: What You Need to Know

Learn how the latest ransomware variant has heightened attack execution speed and what that means for cybersecurity operations. This article has been indexed from Dark Reading Read the original article: Rorschach Ransomware: What You Need to Know

Name That Toon: Time to Spare?

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Toon: Time to Spare?

US Investors Sniffing Around Blacklisted NSO Group Assets

Pressure mounts on the NSO Group’s business viability as Khashoggi widow joins group of plaintiffs suing the Israeli firm for Pegasus spyware abuse. This article has been indexed from Dark Reading Read the original article: US Investors Sniffing Around Blacklisted…

Getting Over the DNS Security Awareness Gap

To properly secure DNS infrastructure, organizations need strong security hygiene around DNS infrastructure and records management as well as closely monitoring and filtering DNS traffic. This article has been indexed from Dark Reading Read the original article: Getting Over the…

Cybercrime Doesn’t Take a Vacation

Organizations need to prepare for security threats as summer holidays approach. This article has been indexed from Dark Reading Read the original article: Cybercrime Doesn’t Take a Vacation

HashiCorp Expands PAM, Secrets Management Capabilities

The new privileged access management and secrets management capabilities tackles access issues and secret sprawl across the cloud environment. This article has been indexed from Dark Reading Read the original article: HashiCorp Expands PAM, Secrets Management Capabilities

Free Training’s Role in Cybersecurity

It’s easy to find free training in cybersecurity, but is free the best option for entering the field? This article has been indexed from Dark Reading Read the original article: Free Training’s Role in Cybersecurity

‘Shampoo’ ChromeLoader Variant Difficult to Wash Out

A new version of the infamous browser extension is spreading through files on websites offering pirated wares, and leverages unique persistence mechanisms. This article has been indexed from Dark Reading Read the original article: ‘Shampoo’ ChromeLoader Variant Difficult to Wash…

Borderless Data vs. Data Sovereignty: Can They Co-Exist?

Organizations that remain compliant with data-sovereignty regulations while enabling cross-border data sharing gain significant competitive advantage because they can make quick, agile, and informed decisions. This article has been indexed from Dark Reading Read the original article: Borderless Data vs.…

Network-Security Testing Standard Nears Prime Time

NetSecOpen recently released a new draft of its testing and benchmarking guide, which could be adopted later this year. This article has been indexed from Dark Reading Read the original article: Network-Security Testing Standard Nears Prime Time

Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In

Attackers continue to attempt to steal Bitcoin and other virtual coins, with a 40% increase in phishing attacks and fourfold increase in incidents. This article has been indexed from Dark Reading Read the original article: Cryptocurrency Attacks Quadrupled as Cybercriminals…

Moving the Cyber Industry Forward Requires a Novel Approach

CISOs need to be better equipped with strategic metrics and proof points to better align their organization for defense against the ever-changing threat landscape. This article has been indexed from Dark Reading Read the original article: Moving the Cyber Industry…

Why Your SEG Could Be Your Email Security Achilles’ Heel

As business email compromise attacks continue to grow and become increasingly sophisticated, is your secure email gateway providing sufficient protection? This article has been indexed from Dark Reading Read the original article: Why Your SEG Could Be Your Email Security…

Fortinet: Patched Critical Flaw May Have Been Exploited

Users urged to apply updates to FortiOS SSL-VPN after attackers may have leveraged a recently discovered vulnerability in attacks against government, manufacturing, and critical infrastructure organizations. This article has been indexed from Dark Reading Read the original article: Fortinet: Patched…

Microsoft Fixes 69 Bugs, but None Are Zero-Days

The June 2023 Patch Tuesday security update included fixes for a bypass for two previously addressed issues in Microsoft Exchange and a critical elevation of privilege flaw in SharePoint Server. This article has been indexed from Dark Reading Read the…

Analysis: Social Engineering Drives BEC Losses to $50B Globally

Threat actors have grown increasingly sophisticated in applying social engineering tactics against their victims, which is key to this oft-underrated cybercriminal scam’s success. This article has been indexed from Dark Reading Read the original article: Analysis: Social Engineering Drives BEC…