Organizations often defer patching because of business disruption fears — but that didn’t work out very well for Rackspace’s Hosted Exchange service. This article has been indexed from Dark Reading Read the original article: Rackspace Ransomware Incident Highlights Risks of…
Category: Dark Reading
‘Copyright Infringement’ Lure Used for Facebook Credential Harvesting
Business users receive a message from Facebook warning their accounts will be permanently suspended for using photos illegally if they don’t appeal within 24 hours, leading victims to a credential-harvesting page instead. This article has been indexed from Dark Reading…
JsonWebToken Security Bug Opens Servers to RCE
The JsonWebToken package plays a big role in the authentication and authorization functionality for many applications. This article has been indexed from Dark Reading Read the original article: JsonWebToken Security Bug Opens Servers to RCE
CISOs Are Focused on These 3 Trends. Are You?
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy. This article has been indexed from Dark Reading Read the original article: CISOs Are Focused on These 3 Trends. Are You?
7 Use Cases for Distributed Cloud Environments
As infrastructure has grown more complex, the need to effectively manage it has grown, too – particularly for applications and APIs. This article has been indexed from Dark Reading Read the original article: 7 Use Cases for Distributed Cloud Environments
Schneider Electric and BitSight Announce Partnership to Improve Detection of Operational Technology (OT) Cybersecurity Exposure
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Schneider Electric and BitSight Announce Partnership to Improve Detection of Operational…
Web 3.0 Shifts Attack Surface and Highlights Need for Continuous Security
A model of continuous authentication and identification is needed to keep consumers safe. This article has been indexed from Dark Reading Read the original article: Web 3.0 Shifts Attack Surface and Highlights Need for Continuous Security
In Memoriam: Remembering Those Who Passed
Security stands on the shoulders of giants. We take a moment to remember their contributions toward keeping people, data, and systems safe. This article has been indexed from Dark Reading Read the original article: In Memoriam: Remembering Those Who Passed
PurpleUrchin Gang Embraces DevOps in Massive Cloud Malware Campaign
The Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger. This article has been indexed from Dark Reading Read the original…
Russia-Linked Turla APT Sneakily Co-Opts Ancient Andromeda USB Infections
Using command-and-control servers from the decade-old Andromeda malware, the group is installing reconnaissance tools and a backdoor on previously infected systems to target Ukrainian victims. This article has been indexed from Dark Reading Read the original article: Russia-Linked Turla APT…
Vice Society Releases Info Stolen From 14 UK Schools, Including Passport Scans
In what’s become a pattern, the cybercriminal ring stole data, demanded payment, and posted personal information when ransom was denied. This article has been indexed from Dark Reading Read the original article: Vice Society Releases Info Stolen From 14 UK…
PurpleUrchin Gang Embraces DevOps In Massive Cloud Malware Campaign
The Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger. This article has been indexed from Dark Reading Read the original…
From Ferrari to Ford, Cybersecurity Bugs Plague Automotive Safety
Security vulnerabilities plague automakers, and as vehicles become more connected, a more proactive stance on cybersecurity will be required — alongside regulations. This article has been indexed from Dark Reading Read the original article: From Ferrari to Ford, Cybersecurity Bugs…
ChatGPT Artificial Intelligence: An Upcoming Cybersecurity Threat?
The role of artificial intelligence in cybersecurity is growing. A new AI model highlights the opportunities and challenges. This article has been indexed from Dark Reading Read the original article: ChatGPT Artificial Intelligence: An Upcoming Cybersecurity Threat?
Don’t Be Blindsided by Software Bills of Materials
It’s imperative we collaborate and partner to improve software security. This may require developing tools and standards that can enrich SBOMs and provide deeper analysis. This article has been indexed from Dark Reading Read the original article: Don’t Be Blindsided…
New Survey: 1 In 4 Schools Were Victims Of Cyber Attacks In the Last Year; Administrators To Increase Spending On Privacy and Security
In a new survey from Clever, 3 out of 4 school districts say they will increase their spending on security and privacy in the next two to three years; 1 in 4 teachers report that cybersecurity training is missing in…
200M Twitter Profiles, With Email Addys, Dumped on Dark Web for Free
A data dump of Twitter user details on an underground forum appears to stem from an API endpoint compromise and large-scale data scraping. This article has been indexed from Dark Reading Read the original article: 200M Twitter Profiles, With Email…
Rackspace Sunsets Email Service Downed in Ransomware Attack
The hosting services provider shared new details on the breach that took down its Hosted Exchange Email service. This article has been indexed from Dark Reading Read the original article: Rackspace Sunsets Email Service Downed in Ransomware Attack
200M Twitter Profiles, with Email Addys, Dumped on Dark Web for Free
A data dump of Twitter user details on an underground forum appears to stem from an API endpoint compromise and large-scale data scraping. This article has been indexed from Dark Reading Read the original article: 200M Twitter Profiles, with Email…
How Confidential Computing Can Change Cybersecurity
Encrypting data while in use, not just in transit and at rest, closes one more avenue of cyberattack. This article has been indexed from Dark Reading Read the original article: How Confidential Computing Can Change Cybersecurity
LogRhythm Enhances Security Analytics With Expanded Security Operations Capabilities
New platform features and integrations enable analysts to quickly detect and remediate threats. This article has been indexed from Dark Reading Read the original article: LogRhythm Enhances Security Analytics With Expanded Security Operations Capabilities
Check Point Research Reports a 38% Increase In 2022 Global Cyberattacks
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Check Point Research Reports a 38% Increase In 2022 Global Cyberattacks
New Survey: One In Four Schools Were Victims Of Cyber Attacks In the Last Year; Administrators To Increase Spending On Privacy and Security
In a new survey from Clever, 3 out of 4 school districts say they will increase their spending on security and privacy in the next two to three years; 1 in 4 teachers report that cybersecurity training is missing in…
Space Race: Defenses Emerge as Satellite-Focused Cyberattacks Ramp Up
Amid escalating cyber activity, two separate cybersecurity frameworks are targeting the satellite arena, highlighting the ease in attacking the infrastructure and the difficulty in defending it. This article has been indexed from Dark Reading Read the original article: Space Race:…
CircleCI: Rotate Stored Secrets ASAP
DevOps platform warns customers of a “security incident” under investigation. This article has been indexed from Dark Reading Read the original article: CircleCI: Rotate Stored Secrets ASAP
Bluebottle Continues Bank Heist Assault With Signed Malware
The financially motivated threat group, also known as OPERA1ER, demonstrated an evolution in tactics in its compromise of three Francophone financial institutions in Africa, likely adding to its $11 million to-date haul. This article has been indexed from Dark Reading…
WordPress Sites Under Attack From Newly Found Linux Trojan
Researchers who discovered the backdoor Linux malware say it may have been around for more than three years — and it targets 30+ plug-in bugs. This article has been indexed from Dark Reading Read the original article: WordPress Sites Under…
Trend Micro Announces New Subsidiary for 5G Cybersecurity
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Trend Micro Announces New Subsidiary for 5G Cybersecurity
Netskope Receives $401M In New Funding
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Netskope Receives $401M In New Funding
US Based ICOIN Technology Announces Secure Messaging Solution Using Hardware Wallet Encryption
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: US Based ICOIN Technology Announces Secure Messaging Solution Using Hardware Wallet…
Threat Actors Evade Detection Through Geofencing & Fingerprinting
Security teams may be missing targeted attacks and advanced exploits if attackers are using evasive techniques to avoid detection. Defenders need to up their game. This article has been indexed from Dark Reading Read the original article: Threat Actors Evade…
How to Ensure Cybersecurity Investments Remain a Priority Across Your Organization
Collaboration across all business units is key to building a robust cybersecurity program. This article has been indexed from Dark Reading Read the original article: How to Ensure Cybersecurity Investments Remain a Priority Across Your Organization
Netscope Receives $401M In New Funding
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Netscope Receives $401M In New Funding
DirectTrust and EHNAC Announce Closing Of Merger
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: DirectTrust and EHNAC Announce Closing Of Merger
Maternal & Family Health Services Issues Notice Of Cybersecurity Incident
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Maternal & Family Health Services Issues Notice Of Cybersecurity Incident
Five Guys Data Breach Puts HR Data Under a Heat Lamp
Job applicants could face a raft of follow-on attacks after cyber intruders accessed their data in an opportunistic attack. This article has been indexed from Dark Reading Read the original article: Five Guys Data Breach Puts HR Data Under a…
Rackspace: Ransomware Attack Bypassed ProxyNotShell Mitigations
The hosting provider had not applied Microsoft’s new patch due to publicly reported issues with the update. This article has been indexed from Dark Reading Read the original article: Rackspace: Ransomware Attack Bypassed ProxyNotShell Mitigations
What Are Some Ways to Make APIs More Secure?
Developers should go beyond the basics to make it harder to exploit the API. This article has been indexed from Dark Reading Read the original article: What Are Some Ways to Make APIs More Secure?
Effective and Efficient Automation for Security Teams
Even very short tasks may be worth automating if you do them frequently. Here’s how to decide what to tackle first. This article has been indexed from Dark Reading Read the original article: Effective and Efficient Automation for Security Teams
CORL Technologies Introduces Proactive Third-Party Incident Response Solution for Healthcare
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: CORL Technologies Introduces Proactive Third-Party Incident Response Solution for Healthcare
BitRat Malware Gnaws at Victims With Bank Heist Data
Attackers have compromised a Colombian financial institution and are using a bevy of leaked customer details in further malicious activity to spread an info-gathering remote access Trojan (RAT). This article has been indexed from Dark Reading Read the original article:…
Insights On the Mobile Biometrics Global Market To 2028 – Increase In Platforms Using Biometric Authentication Drives Growth
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Insights On the Mobile Biometrics Global Market To 2028 – Increase…
Understanding Infrastructure-as-Code Risks in the Cloud
Improve overall IT administration and establish a framework to identify misconfigurations and automate the process of checking IaC before it makes it into the production environment. This article has been indexed from Dark Reading Read the original article: Understanding Infrastructure-as-Code…
2023 Will See Renewed Focus on Quantum Computing
Adopting post-quantum cryptography is something that has been discussed for years; it’s time for organizations to get to work. This article has been indexed from Dark Reading Read the original article: 2023 Will See Renewed Focus on Quantum Computing
Cyberattackers Torch Python Machine Learning Project
The popular PyTorch Python project for data scientists and machine learning developers has become the latest open source project to be targeted with a dependency confusion attack. This article has been indexed from Dark Reading Read the original article: Cyberattackers…
C2A Security To Showcase Automotive Cybersecurity DevOps Platform at CES In Las Vegas, January 5-8
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: C2A Security To Showcase Automotive Cybersecurity DevOps Platform at CES In…
Holiday Spirit? LockBit Gives Children’s Hospital Free Decryptor
The Russian-speaking cybercrime gang said an affiliate violated its rules against attacks that could lead to bodily harm for medical patients. This article has been indexed from Dark Reading Read the original article: Holiday Spirit? LockBit Gives Children’s Hospital Free…
WordPress Sites Under Attack from Newly Found Linux Trojan
Researchers who discovered the backdoor Linux malware say it may have been around for more than three years — and it targets 30+ plug-in bugs. This article has been indexed from Dark Reading Read the original article: WordPress Sites Under…
Chinese ‘RedZei’ Group Batters Victims With Incessant Vishing Effort
The cybercriminals switch up carriers and SIM cards regularly, making it difficult for either mobile users or telecom companies to block the barrage of malicious calls and voicemails. This article has been indexed from Dark Reading Read the original article:…
Raspberry Robin Worm Hatches a Highly Complex Upgrade
The Evil Corp-linked malware family has undergone an evolution, becoming more obfuscated and “several times more complex,” as the group behind it tests how far the worm can be spread. This article has been indexed from Dark Reading Read the…
Name That Edge Toon: The Upside Down
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Edge Toon: The Upside Down
Are Meta and Twitter Ushering in a New Age of Insider Threats?
The era of digital trust is broken, and constant vigilance is needed to get things back on track. This article has been indexed from Dark Reading Read the original article: Are Meta and Twitter Ushering in a New Age of…
Black Hat Flashback: The Day That Dan Kaminsky Saved the Internet
Dark Reading’s Kelly Jackson Higgins explains the enormous legacy left behind by Dan Kaminsky and his seminal “Great DNS Vulnerability” talk at Black Hat 2008. This article has been indexed from Dark Reading Read the original article: Black Hat Flashback:…