Category: Dark Reading

How to Create an Effective GRC Program: 3 Phases

A crawl, walk, run approach allows organizations to establish a governance, risk, and compliance (GRC) program that grows and matures with the business. This article has been indexed from Dark Reading Read the original article: How to Create an Effective…

CISOs Need Backing to Take Charge of Security

Unless the CEO and other C-suite executives defer to the CISO’s decisions on cybersecurity, is that CISO really running things? This article has been indexed from Dark Reading Read the original article: CISOs Need Backing to Take Charge of Security

Instagram Flags AI-Generated Content

Amid the national discussion about AI safety and non-human-originated content in the US, an app researcher spotted an effort by the social media app to flag AI posts for its 2+ billion users. This article has been indexed from Dark…

Iran’s APT34 Hits UAE With Supply Chain Attack

The prolific APT, also known as OilRig and MuddyWater, was caught targeting an IT company’s government clients in the region, with the aim of carrying out cyber espionage. This article has been indexed from Dark Reading Read the original article:…

Cyber-Insurance Underwriting Is Still Stuck in the Dark Ages

Innovations in continuous controls monitoring may be the only way underwriters can offer cyber-insurance policies that make sense in the market. This article has been indexed from Dark Reading Read the original article: Cyber-Insurance Underwriting Is Still Stuck in the…

Tesla Jailbreak Unlocks Theft of In-Car Paid Features

Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs. This article has been indexed from Dark Reading Read the original article: Tesla Jailbreak Unlocks…

Unified XDR and SIEM Alleviate Security Alert Fatigue

By integrating detection response with information and event management, organizations can move beyond protective controls and harden their defenses. This article has been indexed from Dark Reading Read the original article: Unified XDR and SIEM Alleviate Security Alert Fatigue

Apple Users Open to Remote Control via Tricky macOS Malware

The Hidden Virtual Network Computing (hVNC) malware infests Macs and silently executes complete takeovers, with no user permission needed. It also sports persistence through reboots. This article has been indexed from Dark Reading Read the original article: Apple Users Open…

Lessons Not Learned From Software Supply Chain Attacks

Businesses that develop business-, mission-, or safety-critical software must learn from previous victims of software supply chain attacks. This article has been indexed from Dark Reading Read the original article: Lessons Not Learned From Software Supply Chain Attacks

Why the California Delete Act Matters

Bill 362 is a perfect template for a nationwide win against data brokers and the privacy infringements they cause. This article has been indexed from Dark Reading Read the original article: Why the California Delete Act Matters

What Implementing Biometrics for Authentication Looks Like

CISOs are incorporating biometrics as part of their multifactor authentication strategies. This is what they should be thinking about during implementation. This article has been indexed from Dark Reading Read the original article: What Implementing Biometrics for Authentication Looks Like

Israeli Oil Refinery Taken Offline by Pro-Iranian Attackers

The apparent pro-Iranian Cyber Avengers posted images of BAZAN Groups’s SCADA systems, diagrams, and programmable logic controller (PLC) code. This article has been indexed from Dark Reading Read the original article: Israeli Oil Refinery Taken Offline by Pro-Iranian Attackers

Best Practices for Enterprise Private 5G Security

Omdia’s latest research with Trend Micro and CTOne sheds light on 5G security challenges and ways to effectively extend enterprise-grade security to 5G networks This article has been indexed from Dark Reading Read the original article: Best Practices for Enterprise…

Why Today’s CISOs Must Embrace Change

With change happening faster than ever before, tools can help bridge capability gaps, along with accelerated workforce training. This article has been indexed from Dark Reading Read the original article: Why Today’s CISOs Must Embrace Change

Coro Acquires Network Security Startup Privatise

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Coro Acquires Network Security Startup Privatise

Peloton Bugs Expose Enterprise Networks to IoT Attacks

Hackers have three key pathways — the OS, apps, and malware — for leveraging the popular home fitness equipment as initial access for data compromise, ransomware, and more This article has been indexed from Dark Reading Read the original article:…

Cybercrime as a Public Health Crisis

The impact of fraud on a victim’s health and well-being can be more painful than the financial loss. This article has been indexed from Dark Reading Read the original article: Cybercrime as a Public Health Crisis

Are AI-Engineered Threats FUD or Reality?

The rise of generative AI is creating new ways to both attack and defend assets. Which threats are solid and which are vapor? This article has been indexed from Dark Reading Read the original article: Are AI-Engineered Threats FUD or…

Orgs Face Record $4.5M Per Data Breach Incident

Cl0p stands to make $100M on the MOVEit campaign, and according to a just-released survey, more than half of businesses are willing to pass data breach costs onto customers. This article has been indexed from Dark Reading Read the original…

Atlassian RCE Bugs Plague Confluence, Bamboo

The security vulnerabilities allow full takeover of Atlassian instances, so admins should patch now. This article has been indexed from Dark Reading Read the original article: Atlassian RCE Bugs Plague Confluence, Bamboo

North Korean Cyberspies Target GitHub Developers

The North Korean APT is setting up legitimate accounts on GitHub and social media platforms to pose as developers or recruiters — ultimately to fool targets into loading npm repositories with malicious code. This article has been indexed from Dark…

How to Put the Sec in DevSecOps

Learn the importance of adding security practices into DevOps life cycles and how to make security stronger. This article has been indexed from Dark Reading Read the original article: How to Put the Sec in DevSecOps

What C-Suite Leaders Need to Know About XDR

Considering adopting extended detection and response (XDR) in your cybersecurity defense program? Here’s what you need to know about the technology platform. This article has been indexed from Dark Reading Read the original article: What C-Suite Leaders Need to Know…

Rootkit Attack Detections Increase at UAE Businesses

Detections of rootkit attacks against businesses in the United Arab Emirates are up 167% in 2023, with an increased view of their use in the Middle East overall. This article has been indexed from Dark Reading Read the original article:…