With artificial intelligence poised to displace many SOC professionals, it’s important to think ahead to potential niches for cybersmart humans — even to outer space. This article has been indexed from Dark Reading Read the original article: Cyber Jobs of…
Tag: Dark Reading
Infoblox Appoints Scott Harrell to CEO
Jesper Andersen has decided to retire and will continue to serve on the Board of Directors. This article has been indexed from Dark Reading Read the original article: Infoblox Appoints Scott Harrell to CEO
The Resolution Every CSO/CISO Should Make This Year
Shift your mindset from risk to resilience. This article has been indexed from Dark Reading Read the original article: The Resolution Every CSO/CISO Should Make This Year
Cloudflare Announces Email Security & Data Protection Tools
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Cloudflare Announces Email Security & Data Protection Tools
SecureAuth Announces Seven New Patents for Biobehavioral Credentials for Continuous Authentication, and ID Proofing to Secure Digital Identities
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: SecureAuth Announces Seven New Patents for Biobehavioral Credentials for Continuous Authentication,…
Intel’s New Xeon Chip Pushes Confidential Computing to the Cloud
After a delay of more than a year, Intel’s on-chip confidential computing feature is coming to all the major cloud providers, starting with Microsoft’s Azure. This article has been indexed from Dark Reading Read the original article: Intel’s New Xeon…
98 Patches: Microsoft Greets New Year With Zero-Day Security Fixes
Microsoft’s January 2023 Patch Tuesday security update contains fixes for bugs in multiple products. Here’s what you need to patch now. This article has been indexed from Dark Reading Read the original article: 98 Patches: Microsoft Greets New Year With…
Security Planning: Ask What Could Go Wrong
Are you asking the right questions about potential scenarios when thinking about disaster recovery and business continuity? This article has been indexed from Dark Reading Read the original article: Security Planning: Ask What Could Go Wrong
Preparing for the Effects of Quantum-Centric Supercomputing
While it has been a perennial forecast that efficient universal quantum computers are “a decade away,” that prospect now seems a legitimate possibility. Organizations need to get ready now. This article has been indexed from Dark Reading Read the original…
Bay Bridge Administrators, LLC Notifies Individuals of Data Breach
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Bay Bridge Administrators, LLC Notifies Individuals of Data Breach
SCOTUS OKs WhatsApp Suit Against NSO Group
Supreme Court rules WhatsApp can sue NSO Group for damages caused by unauthorized Pegasus spyware installations. This article has been indexed from Dark Reading Read the original article: SCOTUS OKs WhatsApp Suit Against NSO Group
Cerberus Sentinel to Acquire RAN Security
US cybersecurity services firm continues expansion into Latin America. This article has been indexed from Dark Reading Read the original article: Cerberus Sentinel to Acquire RAN Security
San Fran’s BART Investigates Vice Society Data Breach Claims
Vice Society is boasting that it compromised the San Francisco transportation system, while BART maintains operations and mounts an investigation. This article has been indexed from Dark Reading Read the original article: San Fran’s BART Investigates Vice Society Data Breach…
Quantum Decryption Breakthrough? Not So Fast
A paper by two dozen Chinese researchers maintains that near-future quantum computers could crack RSA-2048 encryption, but experts call the claims misleading. This article has been indexed from Dark Reading Read the original article: Quantum Decryption Breakthrough? Not So Fast
Microsoft: Kinsing Targets Kubernetes via Containers, PostgreSQL
The cryptomining malware, which typically targets Linux, is exploiting weaknesses in an open source container tool for initial access to cloud environments. This article has been indexed from Dark Reading Read the original article: Microsoft: Kinsing Targets Kubernetes via Containers,…
Preparing for the Effects Of Quantum-Centric Supercomputing
While it has been a perennial forecast that efficient universal quantum computers are “a decade away,” that prospect now seems a legitimate possibility. Organizations need to get ready now. This article has been indexed from Dark Reading Read the original…
NetSPI Acquires nVisium
nVisium’s cloud and application security experts join NetSPI to support, scale, and deliver the most comprehensive suite of offensive security solutions. This article has been indexed from Dark Reading Read the original article: NetSPI Acquires nVisium
Moving Analytics Launches Single Sign on to Strengthen Data Security and Improve User Experience
Moving Analytics, leading provider of virtual cardiac rehabilitation and prevention, announced that it is launching single sign on authentication for its entire software platform. This article has been indexed from Dark Reading Read the original article: Moving Analytics Launches Single…
Delinea 2022 State of Ransomware Report Reveals That Attacks Are Down 61% From the Previous Year, and Ransom Payments Are Also on the Decline
Annual survey uncovers surprising data but warns against complacency. This article has been indexed from Dark Reading Read the original article: Delinea 2022 State of Ransomware Report Reveals That Attacks Are Down 61% From the Previous Year, and Ransom Payments…
Netskope Threat Research: Malware-Delivering Cloud Apps Nearly Tripled in 2022
401 distinct cloud apps shown to deliver malware; Microsoft OneDrive delivered 30% of all cloud malware downloads. This article has been indexed from Dark Reading Read the original article: Netskope Threat Research: Malware-Delivering Cloud Apps Nearly Tripled in 2022
65% of Organizations Plan to Adopt a Security Service Edge Platform in Next 2 Years: Axis Security
2023 Security Service Edge (SSE) Adoption Report finds that SSE technology addresses key pain points including much-needed solution consolidation, transition to hybrid work and need for hardened security. This article has been indexed from Dark Reading Read the original article:…
Vade Releases Advanced Threat Intel & Investigation Capabilities
New Add-On Empowers SOCs and MSPs to Automate & Orchestrate Incident Response for Microsoft 365. This article has been indexed from Dark Reading Read the original article: Vade Releases Advanced Threat Intel & Investigation Capabilities
Black Hat Flashback: The Deadly Consequences of Weak Medical Device Security
Hacking to kill: Dark Reading’s Fahmida Y. Rashid reflects on the monumental Black Hat 2011 moment when Jay Radcliffe showed how to hack his insulin pump. This article has been indexed from Dark Reading Read the original article: Black Hat…
Latest Firmware Flaws in Qualcomm Snapdragon Need Attention
The issue concerns the boot layer of ARM chips, which are driving a low-power mobile ecosystem that includes 5G smartphones and base stations. This article has been indexed from Dark Reading Read the original article: Latest Firmware Flaws in Qualcomm…
Firmware Vulnerability in Chips Helps Hackers Take Control of Systems
The issue concerns the boot layer of ARM chips, which are driving a low-power mobile ecosystem that includes 5G smartphones and base stations. This article has been indexed from Dark Reading Read the original article: Firmware Vulnerability in Chips Helps…
Attackers Are Already Exploiting ChatGPT to Write Malicious Code
The AI-based chatbot is allowing bad actors with absolutely no coding experience to develop malware. This article has been indexed from Dark Reading Read the original article: Attackers Are Already Exploiting ChatGPT to Write Malicious Code
Serbia Slammed With DDoS Attacks
The Serbian government reports that it staved off five attacks aimed at crippling Serbian infrastructure. This article has been indexed from Dark Reading Read the original article: Serbia Slammed With DDoS Attacks
Rackspace Ransomware Incident Highlights Risks of Relying on Mitigation Alone
Organizations often defer patching because of business disruption fears — but that didn’t work out very well for Rackspace’s Hosted Exchange service. This article has been indexed from Dark Reading Read the original article: Rackspace Ransomware Incident Highlights Risks of…
‘Copyright Infringement’ Lure Used for Facebook Credential Harvesting
Business users receive a message from Facebook warning their accounts will be permanently suspended for using photos illegally if they don’t appeal within 24 hours, leading victims to a credential-harvesting page instead. This article has been indexed from Dark Reading…
JsonWebToken Security Bug Opens Servers to RCE
The JsonWebToken package plays a big role in the authentication and authorization functionality for many applications. This article has been indexed from Dark Reading Read the original article: JsonWebToken Security Bug Opens Servers to RCE
CISOs Are Focused on These 3 Trends. Are You?
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy. This article has been indexed from Dark Reading Read the original article: CISOs Are Focused on These 3 Trends. Are You?
7 Use Cases for Distributed Cloud Environments
As infrastructure has grown more complex, the need to effectively manage it has grown, too – particularly for applications and APIs. This article has been indexed from Dark Reading Read the original article: 7 Use Cases for Distributed Cloud Environments
Schneider Electric and BitSight Announce Partnership to Improve Detection of Operational Technology (OT) Cybersecurity Exposure
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Schneider Electric and BitSight Announce Partnership to Improve Detection of Operational…
Web 3.0 Shifts Attack Surface and Highlights Need for Continuous Security
A model of continuous authentication and identification is needed to keep consumers safe. This article has been indexed from Dark Reading Read the original article: Web 3.0 Shifts Attack Surface and Highlights Need for Continuous Security
In Memoriam: Remembering Those Who Passed
Security stands on the shoulders of giants. We take a moment to remember their contributions toward keeping people, data, and systems safe. This article has been indexed from Dark Reading Read the original article: In Memoriam: Remembering Those Who Passed
PurpleUrchin Gang Embraces DevOps in Massive Cloud Malware Campaign
The Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger. This article has been indexed from Dark Reading Read the original…
Russia-Linked Turla APT Sneakily Co-Opts Ancient Andromeda USB Infections
Using command-and-control servers from the decade-old Andromeda malware, the group is installing reconnaissance tools and a backdoor on previously infected systems to target Ukrainian victims. This article has been indexed from Dark Reading Read the original article: Russia-Linked Turla APT…
Vice Society Releases Info Stolen From 14 UK Schools, Including Passport Scans
In what’s become a pattern, the cybercriminal ring stole data, demanded payment, and posted personal information when ransom was denied. This article has been indexed from Dark Reading Read the original article: Vice Society Releases Info Stolen From 14 UK…
PurpleUrchin Gang Embraces DevOps In Massive Cloud Malware Campaign
The Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger. This article has been indexed from Dark Reading Read the original…
From Ferrari to Ford, Cybersecurity Bugs Plague Automotive Safety
Security vulnerabilities plague automakers, and as vehicles become more connected, a more proactive stance on cybersecurity will be required — alongside regulations. This article has been indexed from Dark Reading Read the original article: From Ferrari to Ford, Cybersecurity Bugs…
ChatGPT Artificial Intelligence: An Upcoming Cybersecurity Threat?
The role of artificial intelligence in cybersecurity is growing. A new AI model highlights the opportunities and challenges. This article has been indexed from Dark Reading Read the original article: ChatGPT Artificial Intelligence: An Upcoming Cybersecurity Threat?
Don’t Be Blindsided by Software Bills of Materials
It’s imperative we collaborate and partner to improve software security. This may require developing tools and standards that can enrich SBOMs and provide deeper analysis. This article has been indexed from Dark Reading Read the original article: Don’t Be Blindsided…
New Survey: 1 In 4 Schools Were Victims Of Cyber Attacks In the Last Year; Administrators To Increase Spending On Privacy and Security
In a new survey from Clever, 3 out of 4 school districts say they will increase their spending on security and privacy in the next two to three years; 1 in 4 teachers report that cybersecurity training is missing in…
200M Twitter Profiles, With Email Addys, Dumped on Dark Web for Free
A data dump of Twitter user details on an underground forum appears to stem from an API endpoint compromise and large-scale data scraping. This article has been indexed from Dark Reading Read the original article: 200M Twitter Profiles, With Email…
Rackspace Sunsets Email Service Downed in Ransomware Attack
The hosting services provider shared new details on the breach that took down its Hosted Exchange Email service. This article has been indexed from Dark Reading Read the original article: Rackspace Sunsets Email Service Downed in Ransomware Attack
200M Twitter Profiles, with Email Addys, Dumped on Dark Web for Free
A data dump of Twitter user details on an underground forum appears to stem from an API endpoint compromise and large-scale data scraping. This article has been indexed from Dark Reading Read the original article: 200M Twitter Profiles, with Email…
How Confidential Computing Can Change Cybersecurity
Encrypting data while in use, not just in transit and at rest, closes one more avenue of cyberattack. This article has been indexed from Dark Reading Read the original article: How Confidential Computing Can Change Cybersecurity
LogRhythm Enhances Security Analytics With Expanded Security Operations Capabilities
New platform features and integrations enable analysts to quickly detect and remediate threats. This article has been indexed from Dark Reading Read the original article: LogRhythm Enhances Security Analytics With Expanded Security Operations Capabilities
Check Point Research Reports a 38% Increase In 2022 Global Cyberattacks
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Check Point Research Reports a 38% Increase In 2022 Global Cyberattacks
New Survey: One In Four Schools Were Victims Of Cyber Attacks In the Last Year; Administrators To Increase Spending On Privacy and Security
In a new survey from Clever, 3 out of 4 school districts say they will increase their spending on security and privacy in the next two to three years; 1 in 4 teachers report that cybersecurity training is missing in…
Space Race: Defenses Emerge as Satellite-Focused Cyberattacks Ramp Up
Amid escalating cyber activity, two separate cybersecurity frameworks are targeting the satellite arena, highlighting the ease in attacking the infrastructure and the difficulty in defending it. This article has been indexed from Dark Reading Read the original article: Space Race:…
CircleCI: Rotate Stored Secrets ASAP
DevOps platform warns customers of a “security incident” under investigation. This article has been indexed from Dark Reading Read the original article: CircleCI: Rotate Stored Secrets ASAP
Bluebottle Continues Bank Heist Assault With Signed Malware
The financially motivated threat group, also known as OPERA1ER, demonstrated an evolution in tactics in its compromise of three Francophone financial institutions in Africa, likely adding to its $11 million to-date haul. This article has been indexed from Dark Reading…
WordPress Sites Under Attack From Newly Found Linux Trojan
Researchers who discovered the backdoor Linux malware say it may have been around for more than three years — and it targets 30+ plug-in bugs. This article has been indexed from Dark Reading Read the original article: WordPress Sites Under…
Trend Micro Announces New Subsidiary for 5G Cybersecurity
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Trend Micro Announces New Subsidiary for 5G Cybersecurity
Netskope Receives $401M In New Funding
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Netskope Receives $401M In New Funding
US Based ICOIN Technology Announces Secure Messaging Solution Using Hardware Wallet Encryption
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: US Based ICOIN Technology Announces Secure Messaging Solution Using Hardware Wallet…
Threat Actors Evade Detection Through Geofencing & Fingerprinting
Security teams may be missing targeted attacks and advanced exploits if attackers are using evasive techniques to avoid detection. Defenders need to up their game. This article has been indexed from Dark Reading Read the original article: Threat Actors Evade…
How to Ensure Cybersecurity Investments Remain a Priority Across Your Organization
Collaboration across all business units is key to building a robust cybersecurity program. This article has been indexed from Dark Reading Read the original article: How to Ensure Cybersecurity Investments Remain a Priority Across Your Organization
Netscope Receives $401M In New Funding
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Netscope Receives $401M In New Funding
DirectTrust and EHNAC Announce Closing Of Merger
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: DirectTrust and EHNAC Announce Closing Of Merger
Maternal & Family Health Services Issues Notice Of Cybersecurity Incident
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Maternal & Family Health Services Issues Notice Of Cybersecurity Incident
Five Guys Data Breach Puts HR Data Under a Heat Lamp
Job applicants could face a raft of follow-on attacks after cyber intruders accessed their data in an opportunistic attack. This article has been indexed from Dark Reading Read the original article: Five Guys Data Breach Puts HR Data Under a…
Rackspace: Ransomware Attack Bypassed ProxyNotShell Mitigations
The hosting provider had not applied Microsoft’s new patch due to publicly reported issues with the update. This article has been indexed from Dark Reading Read the original article: Rackspace: Ransomware Attack Bypassed ProxyNotShell Mitigations
What Are Some Ways to Make APIs More Secure?
Developers should go beyond the basics to make it harder to exploit the API. This article has been indexed from Dark Reading Read the original article: What Are Some Ways to Make APIs More Secure?
Effective and Efficient Automation for Security Teams
Even very short tasks may be worth automating if you do them frequently. Here’s how to decide what to tackle first. This article has been indexed from Dark Reading Read the original article: Effective and Efficient Automation for Security Teams
CORL Technologies Introduces Proactive Third-Party Incident Response Solution for Healthcare
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: CORL Technologies Introduces Proactive Third-Party Incident Response Solution for Healthcare
BitRat Malware Gnaws at Victims With Bank Heist Data
Attackers have compromised a Colombian financial institution and are using a bevy of leaked customer details in further malicious activity to spread an info-gathering remote access Trojan (RAT). This article has been indexed from Dark Reading Read the original article:…
Insights On the Mobile Biometrics Global Market To 2028 – Increase In Platforms Using Biometric Authentication Drives Growth
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Insights On the Mobile Biometrics Global Market To 2028 – Increase…
Understanding Infrastructure-as-Code Risks in the Cloud
Improve overall IT administration and establish a framework to identify misconfigurations and automate the process of checking IaC before it makes it into the production environment. This article has been indexed from Dark Reading Read the original article: Understanding Infrastructure-as-Code…
2023 Will See Renewed Focus on Quantum Computing
Adopting post-quantum cryptography is something that has been discussed for years; it’s time for organizations to get to work. This article has been indexed from Dark Reading Read the original article: 2023 Will See Renewed Focus on Quantum Computing
Cyberattackers Torch Python Machine Learning Project
The popular PyTorch Python project for data scientists and machine learning developers has become the latest open source project to be targeted with a dependency confusion attack. This article has been indexed from Dark Reading Read the original article: Cyberattackers…
C2A Security To Showcase Automotive Cybersecurity DevOps Platform at CES In Las Vegas, January 5-8
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: C2A Security To Showcase Automotive Cybersecurity DevOps Platform at CES In…
Holiday Spirit? LockBit Gives Children’s Hospital Free Decryptor
The Russian-speaking cybercrime gang said an affiliate violated its rules against attacks that could lead to bodily harm for medical patients. This article has been indexed from Dark Reading Read the original article: Holiday Spirit? LockBit Gives Children’s Hospital Free…
WordPress Sites Under Attack from Newly Found Linux Trojan
Researchers who discovered the backdoor Linux malware say it may have been around for more than three years — and it targets 30+ plug-in bugs. This article has been indexed from Dark Reading Read the original article: WordPress Sites Under…
Chinese ‘RedZei’ Group Batters Victims With Incessant Vishing Effort
The cybercriminals switch up carriers and SIM cards regularly, making it difficult for either mobile users or telecom companies to block the barrage of malicious calls and voicemails. This article has been indexed from Dark Reading Read the original article:…
Raspberry Robin Worm Hatches a Highly Complex Upgrade
The Evil Corp-linked malware family has undergone an evolution, becoming more obfuscated and “several times more complex,” as the group behind it tests how far the worm can be spread. This article has been indexed from Dark Reading Read the…
Name That Edge Toon: The Upside Down
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Edge Toon: The Upside Down
Are Meta and Twitter Ushering in a New Age of Insider Threats?
The era of digital trust is broken, and constant vigilance is needed to get things back on track. This article has been indexed from Dark Reading Read the original article: Are Meta and Twitter Ushering in a New Age of…
Black Hat Flashback: The Day That Dan Kaminsky Saved the Internet
Dark Reading’s Kelly Jackson Higgins explains the enormous legacy left behind by Dan Kaminsky and his seminal “Great DNS Vulnerability” talk at Black Hat 2008. This article has been indexed from Dark Reading Read the original article: Black Hat Flashback:…