Category: Dark Reading

Why ChatGPT Isn’t a Death Sentence for Cyber Defenders

Generative AI combined with user awareness training creates a security alliance that can let organizations work protected from ChatGPT. This article has been indexed from Dark Reading Read the original article: Why ChatGPT Isn’t a Death Sentence for Cyber Defenders

How to Optimize Your Cyber Insurance Coverage

From prevention and detection processes to how you handle policy information, having strong cyber insurance coverage can help mitigate cybersecurity attacks. This article has been indexed from Dark Reading Read the original article: How to Optimize Your Cyber Insurance Coverage

‘Money Lover’ Finance App Exposes User Data

A broken access control vulnerability could have led to dangerous follow-on attacks for users of the money-management app. This article has been indexed from Dark Reading Read the original article: ‘Money Lover’ Finance App Exposes User Data

Keeping KillNet at Bay: Use the IP Address Blocklist

Security teams should use a blocklist containing tens of thousands of proxy IP addresses used by the pro-Russian hacktivist group to defend their organizations from DDoS attacks. This article has been indexed from Dark Reading Read the original article: Keeping…

Crypto Drainers Are Ready to Ransack Investor Wallets

Cryptocurrency drainers are the latest hot ticket being used in a string of lucrative cyberattacks aimed at virtual currency investors. This article has been indexed from Dark Reading Read the original article: Crypto Drainers Are Ready to Ransack Investor Wallets

Cybercrime Shows No Signs of Slowing Down

Look for recent trends in attacks, strategies, and vulnerabilities to continue gaining steam throughout 2023. This article has been indexed from Dark Reading Read the original article: Cybercrime Shows No Signs of Slowing Down

Name That Edge Toon: For the Birds

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Edge Toon: For the Birds

6 Examples of the Evolution of a Scam Site

Examining some key examples of recently found fraud sites that target the lucrative retail shoe industry helps us understand how brand impersonation sites evolve. This article has been indexed from Dark Reading Read the original article: 6 Examples of the…

Discrepancies Discovered in Vulnerability Severity Ratings

Differences in how the National Vulnerability Database (NVD) and vendors score bugs can make patch prioritization harder, study says. This article has been indexed from Dark Reading Read the original article: Discrepancies Discovered in Vulnerability Severity Ratings

Why CISOs Should Care About Brand Impersonation Scam Sites

Enterprises often don’t know whose responsibility it is to monitor for spoofed brand sites and scams that steal customers’ trust, money, and personally identifiable information. This article has been indexed from Dark Reading Read the original article: Why CISOs Should…

What CISOs Can Do About Brand Impersonation Scam Sites

Apply these 9 tips to proactively fight fraudulent websites that steal customers’ trust, money, and personally identifiable information. This article has been indexed from Dark Reading Read the original article: What CISOs Can Do About Brand Impersonation Scam Sites

CISA to Open Supply Chain Risk Management Office

A new supply chain risk management office aims to help public and private sectors implement recent CISA policies and guidance. This article has been indexed from Dark Reading Read the original article: CISA to Open Supply Chain Risk Management Office

Nearly All Firms Have Ties With Breached Third Parties

The average organization does business with 11 third parties, and 98% of organizations do business with a third party who has suffered a breach, an analysis finds. This article has been indexed from Dark Reading Read the original article: Nearly…

MITRE Releases Tool to Design Cyber-Resilient Systems

Engineers can use the Cyber Resiliency Engineering Framework Navigator to visuzalize their cyber-resiliency capabilities. This article has been indexed from Dark Reading Read the original article: MITRE Releases Tool to Design Cyber-Resilient Systems

Google Fi Users Caught Up in T-Mobile Breach

Google Fi mobile customers have been alerted that their SIM card serial numbers, phone numbers, and other data were exposed in T-Mobile hack. This article has been indexed from Dark Reading Read the original article: Google Fi Users Caught Up…

Application Security Must Be Nonnegotiable

Companies need to keep security priorities top of mind during economic downturns so all-important revenue generation doesn’t come with a heaping side order of security problems. This article has been indexed from Dark Reading Read the original article: Application Security…

How the Cloud Is Shifting CISO Priorities

The greatly expanding attack surface created by the cloud needs to be protected. This article has been indexed from Dark Reading Read the original article: How the Cloud Is Shifting CISO Priorities

MITRE Releases Tool to Design Cyber Resilient Systems

Engineers can use the Cyber Resiliency Engineering Framework Navigator to visuzalize their cyber resiliency capabilities. This article has been indexed from Dark Reading Read the original article: MITRE Releases Tool to Design Cyber Resilient Systems

Korelock Launches IOT Smart Lock Technology Company

Denver-based business secures Series A Funding through partnerships with Iron Gate Capital and Kozo Keikaku Engineering. This article has been indexed from Dark Reading Read the original article: Korelock Launches IOT Smart Lock Technology Company

6 Examples of the Evolution of a Scam Site

Examining some key examples of recently found fraud sites that target the lucrative retail shoe industry helps us understand how brand impersonation sites evolve. This article has been indexed from Dark Reading Read the original article: 6 Examples of the…

Discrepancies Discovered in Vulnerability Severity Ratings

Differences in how the National Vulnerability Database (NVD) and vendors score bugs can make patch prioritization harder, study says. This article has been indexed from Dark Reading Read the original article: Discrepancies Discovered in Vulnerability Severity Ratings

Why CISOs Should Care About Brand Impersonation Scam Sites

Enterprises often don’t know whose responsibility it is to monitor for spoofed brand sites and scams that steal customers’ trust, money, and personally identifiable information. This article has been indexed from Dark Reading Read the original article: Why CISOs Should…

Nearly All Firms Have Ties With Breached Third Parties

The average organization does business with 11 third parties, and 98% of organizations do business with a third party who has suffered a breach, an analysis finds. This article has been indexed from Dark Reading Read the original article: Nearly…

CISA to Open Supply Chain Risk Management Office

A new supply chain risk management office aims to help public and private sectors implement recent CISA policies and guidance. This article has been indexed from Dark Reading Read the original article: CISA to Open Supply Chain Risk Management Office

Google Fi Users Caught Up in T-Mobile Breach

Google Fi mobile customers have been alerted that their SIM card serial numbers, phone numbers, and other data were exposed in T-Mobile hack. This article has been indexed from Dark Reading Read the original article: Google Fi Users Caught Up…

Application Security Must Be Nonnegotiable

Companies need to keep security priorities top of mind during economic downturns so all-important revenue generation doesn’t come with a heaping side order of security problems. This article has been indexed from Dark Reading Read the original article: Application Security…