Tag: Dark Reading

Cyber Defenders Lead the AI Arms Race for Now

Cyberattackers are slow to implement AI in their attack chains, according to Mandiant’s analysis. This article has been indexed from Dark Reading Read the original article: Cyber Defenders Lead the AI Arms Race for Now

Boards Don’t Want Security Promises — They Want Action

CISOs must demonstrate that security processes and updates reduce risk in measurable ways. Put emphasis on action, get the basics right, and improve processes. This article has been indexed from Dark Reading Read the original article: Boards Don’t Want Security…

Iran and the Rise of Cyber-Enabled Influence Operations

Iranian threat actors are combining offensive network ops with messaging and amplification to manipulate targets’ perceptions and behavior. Here are three examples. This article has been indexed from Dark Reading Read the original article: Iran and the Rise of Cyber-Enabled…

QR Code Phishing Campaign Targets Top US Energy Company

Attackers sent more than 1,000 emails with 2FA, MFA, and other security-related lures aimed at stealing Microsoft credentials. This article has been indexed from Dark Reading Read the original article: QR Code Phishing Campaign Targets Top US Energy Company

Patch Now: OpenNMS Bug Steals Data, Triggers Denial of Service

Monitoring platform is trusted by Cisco, Savannah River Nuclear Solutions, and others in CISA’s critical infrastructure Sectors, say Synopsys researchers. This article has been indexed from Dark Reading Read the original article: Patch Now: OpenNMS Bug Steals Data, Triggers Denial…

Bolstering Africa’s Cybersecurity

A thriving economy needs several factors to continue an upward trajectory — but is Africa in a position to enable these factors to take place? This article has been indexed from Dark Reading Read the original article: Bolstering Africa’s Cybersecurity

How & Why Cybercriminals Fabricate Data Leaks

A closer look at the nature of fake leaks can provide guidance on how to effectively mitigate associated risks. This article has been indexed from Dark Reading Read the original article: How & Why Cybercriminals Fabricate Data Leaks

3 Mobile or Client-Side Security Myths Debunked

The industry’s understanding of mobile or client-side security is too limited, leaving many mobile apps vulnerable. Don’t let these three myths lead you astray. This article has been indexed from Dark Reading Read the original article: 3 Mobile or Client-Side…

Security Pressures Mount Around AI’s Promises & Peril

Both threats to enterprises and career opportunities are being created by the escalation of generative AI and ChatGPT, warns Maria ‘Azeria’ Markstedter. This article has been indexed from Dark Reading Read the original article: Security Pressures Mount Around AI’s Promises…

Mobb Wins Black Hat Startup Spotlight Competition

The four finalists in the startup competition tackled problems in firmware security, cloud infrastructure, open source software, and vulnerability remediation. This article has been indexed from Dark Reading Read the original article: Mobb Wins Black Hat Startup Spotlight Competition

What’s in New York’s ‘First Ever’ Cyber Strategy?

Governor Kathy Hochul has made cybersecurity a key priority, with New York’s first chief cyber officer, Colin Ahern, leading the effort. This article has been indexed from Dark Reading Read the original article: What’s in New York’s ‘First Ever’ Cyber…

Dell Credentials Bug Opens VMWare Environments to Takeover

Decoding private keys from even one Dell customer could give attackers control over VMWare environments across all organizations running the same programs. This article has been indexed from Dark Reading Read the original article: Dell Credentials Bug Opens VMWare Environments…

EvilProxy Cyberattack Flood Targets Execs via Microsoft 365

A campaign sent 120,000 phishing emails in three months, circumventing MFA to compromise cloud accounts of high-level executives at global organizations This article has been indexed from Dark Reading Read the original article: EvilProxy Cyberattack Flood Targets Execs via Microsoft…

The Hard Realities of Setting AI Risk Policy

Time to get real about what it takes to set and enforce cybersecurity and resilience standards for AI risk management in the enterprise. This article has been indexed from Dark Reading Read the original article: The Hard Realities of Setting…

‘MoustachedBouncer’ APT Spies on Embassies, Likely via ISPs

Diplomats who didn’t use VPNs may have lost sensitive state information to a Belarusian threat actor that wields the “Disco” and “Nightclub” malware. This article has been indexed from Dark Reading Read the original article: ‘MoustachedBouncer’ APT Spies on Embassies,…

It’s Time for Cybersecurity to Talk About Climate Change

From e-waste to conference swag to addressing data center energy consumption, cybersecurity stakeholders need a whole-industry approach to being part of the solution and reducing the risk of climate change. This article has been indexed from Dark Reading Read the…

New LLM Tool Seeks and Remediates Vulnerabilities

Vicarius launched vuln_GPT, which it says will generate and execute scripts to ameliorate flaws such as the TETRA backdoor. This article has been indexed from Dark Reading Read the original article: New LLM Tool Seeks and Remediates Vulnerabilities

Top 3 Insights I Learned at Recent Cybersecurity Events

Events like RSA Conference and Infosecurity Europe provide industry collaboration opportunities required to address the evolving cybersecurity threat landscape. This article has been indexed from Dark Reading Read the original article: Top 3 Insights I Learned at Recent Cybersecurity Events

Sweet Security Debuts Runtime Management for Cloud

Existing detection tools either provide limited functionality or aren’t optimized for the cloud, Israeli startup claims. This article has been indexed from Dark Reading Read the original article: Sweet Security Debuts Runtime Management for Cloud

AI Risk Database Tackles AI Supply Chain Risks

The open source tool — a collaboration between Robust Intelligence, MITRE, and Indiana University — assesses heavily shared, public machine learning models for risk. This article has been indexed from Dark Reading Read the original article: AI Risk Database Tackles…

Analyzing Network Chaos Leads to Better DDoS Detection

Suspicious changes in entropy allow researchers to more accurately spot distributed denial-of-service attacks, but false positives remain a problem. This article has been indexed from Dark Reading Read the original article: Analyzing Network Chaos Leads to Better DDoS Detection

Microsoft Fixes 74 CVEs in August Update

Attackers are already exploiting one of Microsoft’s latest fixes in the wild. This article has been indexed from Dark Reading Read the original article: Microsoft Fixes 74 CVEs in August Update

Custom Yashma Ransomware Crashes Into the Scene

The threat actor is targeting organizations in Bulgaria, China, Vietnam, and various English-speaking nations. This article has been indexed from Dark Reading Read the original article: Custom Yashma Ransomware Crashes Into the Scene

Citrix Zero-Day: 7K Instances Remain Exposed, 460 Compromised

Many organizations have failed to patch a critical zero-day vulnerability, allowing hackers to install Web shells on hundreds of endpoints. This article has been indexed from Dark Reading Read the original article: Citrix Zero-Day: 7K Instances Remain Exposed, 460 Compromised