Category: Dark Reading

Check Point Boosts AppSec Focus With CNAPP Enhancements

Established network security players like Check Point are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains. This article has been indexed from Dark Reading Read the original article: Check Point…

AppSec Threats Deserve Their Own Incident Response Plan

With a rearranging of priorities and good incident response plans, organizations can be ready to face the future of software attacks. This article has been indexed from Dark Reading Read the original article: AppSec Threats Deserve Their Own Incident Response…

SideWinder APT Spotted Targeting Crypto

The nation-state threat group has been attacking a wider range of victims and regions than previously thought. This article has been indexed from Dark Reading Read the original article: SideWinder APT Spotted Targeting Crypto

Atlassian: Leaked Data Stolen via Third-Party App

SiegedSec threat group leaked data that Atlassian says was taken from app used to coordinate in-office resources. This article has been indexed from Dark Reading Read the original article: Atlassian: Leaked Data Stolen via Third-Party App

Infrastructure Risks Increase As IT and OT Converge

Explosive growth of devices associated with the Internet of Things and operational technologies gives attackers a larger pool of targets. This article has been indexed from Dark Reading Read the original article: Infrastructure Risks Increase As IT and OT Converge

Cybersecurity Jobs Remain Secure Despite Recession Fears

Only 10% of corporate executives expect to lay off members of cybersecurity teams in 2023, much lower than other areas, as companies protect hard-to-find skill sets. This article has been indexed from Dark Reading Read the original article: Cybersecurity Jobs…

SideWinder APT Spotted Stealing Crypto

The nation-state threat group has been attacking a wider range of victims and regions than previously thought. This article has been indexed from Dark Reading Read the original article: SideWinder APT Spotted Stealing Crypto

Descope Handles Authentication So Developers Don’t Have To

Developers don’t have to build authentication and user management from scratch, and can devote their energies to the core functions of the application, instead. This article has been indexed from Dark Reading Read the original article: Descope Handles Authentication So…

Oligo Security Takes Aim at Open Source Vulnerabilities

The startup’s software helps organizations secure their containers in the cloud by teasing out which packages are running and which are vulnerable. This article has been indexed from Dark Reading Read the original article: Oligo Security Takes Aim at Open…

2023 Is the Year of Risk: 5 Ways to Prepare

2022 saw a record number of cyberattacks. In response, regulators are prescribing how companies should manage their risks. How do you prepare? This article has been indexed from Dark Reading Read the original article: 2023 Is the Year of Risk:…

GAO Calls for Improved Data Privacy Protections

US federal watchdog agency outlines key measures for better protecting sensitive data under the federal government’s control. This article has been indexed from Dark Reading Read the original article: GAO Calls for Improved Data Privacy Protections

3 Ways CISOs Can Lead Effectively and Avoid Burnout

Information security is a high-stakes field with sky-high expectations. Here’s how CISOs can offset the pressures and stay healthy. This article has been indexed from Dark Reading Read the original article: 3 Ways CISOs Can Lead Effectively and Avoid Burnout

What Purple Teams Wish Companies Knew

Here are some of the easily avoidable mistakes most companies made last year, gleaned from hundreds of cybersecurity engagements by red and blue teams. This article has been indexed from Dark Reading Read the original article: What Purple Teams Wish…

NIST’s New Crypto Standard a Step Forward in IoT Security

The National Institute of Standards and Technology has settled on a standard for encrypting Internet of Things (IoT) communications, but many devices remain vulnerable and unpatched. This article has been indexed from Dark Reading Read the original article: NIST’s New…

OT Network Security Myths Busted in a Pair of Hacks

How newly exposed security weaknesses in industrial wireless, cloud-based interfaces, and nested PLCs serve as a wake-up call for hardening the physical process control layer of the OT network. This article has been indexed from Dark Reading Read the original…

9 New Microsoft Bugs to Patch Now

78 new CVEs patched in this month’s batch — nearly half of which are remotely executable and three of which attackers already are exploiting. This article has been indexed from Dark Reading Read the original article: 9 New Microsoft Bugs…

Why SecDataOps Is the Future of Your Security Program

The goal: Ensure that data is always finely curated and accessible, and that security decisions get made with high-fidelity data. This article has been indexed from Dark Reading Read the original article: Why SecDataOps Is the Future of Your Security…

Lessons All Industries Can Learn From Automotive Security

Industry standards must evolve as digital transformation makes all companies software companies. Security testing boosts development speed and software quality. This article has been indexed from Dark Reading Read the original article: Lessons All Industries Can Learn From Automotive Security

9 Scammers Busted for 5M Euro Phishing Fraud Ring

The network is alleged to have operated 100 bank accounts and stolen millions from American people and companies. This article has been indexed from Dark Reading Read the original article: 9 Scammers Busted for 5M Euro Phishing Fraud Ring

Accenture Acquires Morphus, Brazil-Based Cybersecurity Company

Morphus’s deep cybersecurity research expertise, cyber defense and threat intelligence services widen Accenture’s cybersecurity footprint in Latin America. This article has been indexed from Dark Reading Read the original article: Accenture Acquires Morphus, Brazil-Based Cybersecurity Company

Healthcare in the Crosshairs of North Korean Cyber Operations

CISA, FBI, and South Korean intelligence agencies warn that the North Korean government is sponsoring ransomware attacks to fund its cyber-espionage activities. This article has been indexed from Dark Reading Read the original article: Healthcare in the Crosshairs of North…

What Happened to #OpRussia?

The cyberwar to attack Russia has never really stopped, despite a decreasing interest from the West. This article has been indexed from Dark Reading Read the original article: What Happened to #OpRussia?

Why ChatGPT Isn’t a Death Sentence for Cyber Defenders

Generative AI combined with user awareness training creates a security alliance that can let organizations work protected from ChatGPT. This article has been indexed from Dark Reading Read the original article: Why ChatGPT Isn’t a Death Sentence for Cyber Defenders

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

The US Treasury Department linked the notorious cybercrime gang to Russian Intelligence Services because cyberattacks that disrupted hospitals and other critical infrastructure align with Russian state interests. This article has been indexed from Dark Reading Read the original article: Trickbot…

How to Optimize Your Cyber Insurance Coverage

From prevention and detection processes to how you handle policy information, having strong cyber insurance coverage can help mitigate cybersecurity attacks. This article has been indexed from Dark Reading Read the original article: How to Optimize Your Cyber Insurance Coverage

Malicious Game Mods Target Dota 2 Game Users

Valve’s unpatched JavaScript engine and incomplete modification vetting process for Steam-delivered mods led to user systems being backdoored. This article has been indexed from Dark Reading Read the original article: Malicious Game Mods Target Dota 2 Game Users

Google Cloud Connects Chronicle to Health ISAC Feed

Members of the Health-ISAC can ingest threat indicators directly into Chronicle to investigate whether the threat is present in their environment. This article has been indexed from Dark Reading Read the original article: Google Cloud Connects Chronicle to Health ISAC…

Reddit Breached With Stolen Employee Credentials

Reddit code, internal documents, dashboards, and business systems were compromised in the cyberattack. This article has been indexed from Dark Reading Read the original article: Reddit Breached With Stolen Employee Credentials

How Do Playbooks Help CISOs Improve SecOps?

Extended detection and response (XDR) solutions have evolved to offer automated tools, such as playbooks, that enhance context and response. This article has been indexed from Dark Reading Read the original article: How Do Playbooks Help CISOs Improve SecOps?

NewsPenguin Goes Phishing for Maritime & Military Secrets

A sophisticated cyber-espionage attack against high-value targets attending a maritime technology conference in Pakistan this weekend has been in the works since last year. This article has been indexed from Dark Reading Read the original article: NewsPenguin Goes Phishing for…

7 Critical Cloud Threats Facing the Enterprise in 2023

From shadow data to misconfigurations, and overpermissioning to multicloud sprawl, Dark Reading’s cloud security slideshow helps security pros understand the threat horizon. This article has been indexed from Dark Reading Read the original article: 7 Critical Cloud Threats Facing the…

Cryptographers Decode Secret Letters of Mary, Queen of Scots

Nearly a half-millennium after her execution, encrypted letters from the imprisoned royal offer a fascinating look into early cryptography. This article has been indexed from Dark Reading Read the original article: Cryptographers Decode Secret Letters of Mary, Queen of Scots

Phishing Surges Ahead, as ChatGPT & AI Loom

AI and phishing-as-a-service (PaaS) kits are making it easier for threat actors to create malicious email campaigns, which continue to target high-volume applications using popular brand names. This article has been indexed from Dark Reading Read the original article: Phishing…

In Perfect Harmony: Cybersecurity Regulation Harmonization

By simplifying compliance management, security and risk teams can focus on managing operational risk, not compliance risk — and better counter threats. This article has been indexed from Dark Reading Read the original article: In Perfect Harmony: Cybersecurity Regulation Harmonization

Jailbreak Trick Breaks ChatGPT Content Safeguards

Jailbreak command creates ChatGPT alter ego DAN, willing to create content outside of its own content restriction controls. This article has been indexed from Dark Reading Read the original article: Jailbreak Trick Breaks ChatGPT Content Safeguards

Building Up IAM in a Multicloud World

In the cloud-first world, the security goal is to ensure only qualified users can access information across clouds. This article has been indexed from Dark Reading Read the original article: Building Up IAM in a Multicloud World

ActZero Unveils Next-Generation MDR Platform

Latest release gives small and mid-sized enterprises AI-driven analysis tools and unified visibility across IT environments for stronger ransomware protection. This article has been indexed from Dark Reading Read the original article: ActZero Unveils Next-Generation MDR Platform