Category: Dark Reading

Harness the Power of PKI to Battle Data Breaches

The average cost of a data breach is $4.35 million. Understand the power of public key infrastructure (PKI) and its role in encrypting data and battling breaches. This article has been indexed from Dark Reading Read the original article: Harness…

Why Critical Infrastructure Remains a Ransomware Target

While protecting critical infrastructure seems daunting, here are some critical steps the industry can take now to become more cyber resilient and mitigate risks. This article has been indexed from Dark Reading Read the original article: Why Critical Infrastructure Remains…

10 Important Security Tasks You Shouldn’t Skip

Time and money are valuable and finite, but some actions are well worth spending those resources on. This article has been indexed from Dark Reading Read the original article: 10 Important Security Tasks You Shouldn’t Skip

Doing Less With Less: Focusing on Value

Always reach for defense in depth with proposed security changes. Measure and test results, focus on items of greatest impact, and get C-suite members involved to drive better outcomes. This article has been indexed from Dark Reading Read the original…

Passkeys See Fresh Momentum With New Pilot Programs

Apple adds API that will enable sharing of passkeys across platforms, and Google offers passkey authentication in beta for Google Workspace and Google Cloud. This article has been indexed from Dark Reading Read the original article: Passkeys See Fresh Momentum…

DOS Attacks Dominate, but System Intrusions Cause Most Pain

In the latest Verizon “Data Breach Investigations Report,” denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems. This article has been indexed from Dark Reading Read the original…

DOS Attacks Dominate, But System Intrusions Cause Most Pain

In the latest Verizon Data Breach Investigations Report, denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems. This article has been indexed from Dark Reading Read the original…

South African Female Students Offered Cyber Scholarship

Women of color are being offered a scholarship opportunity in South Africa — the offer will cover costs for pursuing a cyber career and encourage greater diversity of those studying cybersecurity courses. This article has been indexed from Dark Reading…

Cybersecurity Institute to Open in Saudi Arabia

The Global Cybersecurity Forum branch, which will be in Riyadh, is meant to enable the exchange of ideas and facilitate international projects and partnerships. This article has been indexed from Dark Reading Read the original article: Cybersecurity Institute to Open…

Cybercrooks Scrape OpenAI API Keys to Pirate GPT-4

With more than 50,000 publicly leaked OpenAI keys on GitHub alone, OpenAI developer accounts are the third-most exposed in the world. This article has been indexed from Dark Reading Read the original article: Cybercrooks Scrape OpenAI API Keys to Pirate…

Fighting AI-Powered Fraud: Let the Battle of the Machines Begin

As cybercriminals tap the power of machine learning and generative AI to outwit fraud-detection systems, online fraud-prevention technologies must evolve accordingly. This article has been indexed from Dark Reading Read the original article: Fighting AI-Powered Fraud: Let the Battle of…

Minecraft Malware Spreading Through Mods, Plug-ins

A worm virus called “fracturizer” has been embedded in modpacks from various sites, including CurseForge and CraftBukkit. This article has been indexed from Dark Reading Read the original article: Minecraft Malware Spreading Through Mods, Plug-ins

Defenders Buckle Up for a Future of Detecting Deepfakes

Today, technology companies have high success rates against generative AI-created voices and videos, but future detection will be much more difficult. This article has been indexed from Dark Reading Read the original article: Defenders Buckle Up for a Future of…

Microsoft Fined $20M For Xbox Child Data Collection

The FTC has demanded additional data privacy protections for kids using Xbox gaming systems, extending COPPA protections. This article has been indexed from Dark Reading Read the original article: Microsoft Fined $20M For Xbox Child Data Collection

Cyber Essentialism & ‘Doing Less With Less’

Cybersecurity benefits from a focus on the vital few chores rather than the trivial many. Find the “right things” to encourage strategic thinking, then move the culture needle to promote that policy. This article has been indexed from Dark Reading…

The Case for a Federal Cyber-Insurance Backstop

By stepping in to provide aid, the federal government could help protect companies, insurers, and the economy from the impact of a widespread, catastrophic cyberattack. This article has been indexed from Dark Reading Read the original article: The Case for…

Filling the Gaps: How to Secure the Future of Hybrid Work

By enhancing remote management and adopting hardware-enforced security, productivity can continue without inviting extra cyber-risk. This article has been indexed from Dark Reading Read the original article: Filling the Gaps: How to Secure the Future of Hybrid Work

Jetpack WordPress Plug-in API Bug Triggers Mass Updates

An audit uncovers an API-related security vulnerability dating back to Jetpack version 2.0 released in 2012 — and it affects millions of websites. This article has been indexed from Dark Reading Read the original article: Jetpack WordPress Plug-in API Bug…

Where SBOMs Stand Today

It’s been two years since Executive Order 14028. By using SBOMs as a standard, organizations can manage software risks, protect their reputation, and improve their cybersecurity posture. This article has been indexed from Dark Reading Read the original article: Where…

Dark Reading Launches Inaugural CISO Advisory Board

Ten chief information security officers from a variety of verticals will provide valuable insights to Dark Reading on what they see as the industry’s most pressing issues. This article has been indexed from Dark Reading Read the original article: Dark…

Mirai Variant Opens Tenda, Zyxel Gear to RCE, DDoS

Researchers have observed several cyberattacks leveraging a botnet called IZ1H9, which exploits vulnerabilities in exposed devices and servers running on Linux. This article has been indexed from Dark Reading Read the original article: Mirai Variant Opens Tenda, Zyxel Gear to…

Focus Security Efforts on Choke Points, Not Visibility

By finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation. This article has been indexed from Dark Reading Read the original article: Focus Security Efforts on Choke Points, Not Visibility

Salesforce ‘Ghost Sites’ Expose Sensitive Corporate Data

Some companies have moved on from using Salesforce. But without remembering to fully deactivate their clouds, Salesforce won’t move on from them. This article has been indexed from Dark Reading Read the original article: Salesforce ‘Ghost Sites’ Expose Sensitive Corporate…

Spotlight on 2023 Dan Kaminsky Fellow: Dr. Gus Andrews

As the second Kaminsky Fellow, Dr. Andrews will study the use of threat intelligence to track campaigns against the human rights community. This article has been indexed from Dark Reading Read the original article: Spotlight on 2023 Dan Kaminsky Fellow:…

421M Spyware Apps Downloaded Through Google Play

A Trojan SDK snuck past Google Play protections to infest 101 Android applications, bent on exfiltrating infected device data. This article has been indexed from Dark Reading Read the original article: 421M Spyware Apps Downloaded Through Google Play

9M Dental Patients Affected by LockBit Attack on MCNA

The government-sponsored dental and oral healthcare provider warned its customers that a March attack exposed sensitive data, some of which was leaked online by the ransomware group. This article has been indexed from Dark Reading Read the original article: 9M…