Tag: Dark Reading

Startup Spotlight: Mobb Aims to Be the Fixer

The startup, one of four finalists in this year’s Black Hat USA Startup Spotlight competition, automates vulnerability remediation using AI. This article has been indexed from Dark Reading Read the original article: Startup Spotlight: Mobb Aims to Be the Fixer

Less Than Half of SMBs Deploy Privileged Access Management

Keeper Security highlights S&P Market Intelligence’s latest research showing that lack of PAM is leaving SMBs vulnerable to attack. This article has been indexed from Dark Reading Read the original article: Less Than Half of SMBs Deploy Privileged Access Management

Hackers Exploit Policy Loophole in Windows Kernel Drivers

Using open source tools, attackers target Chinese speakers with malicious drivers with expired certificates, potentially allowing for full system takeover. This article has been indexed from Dark Reading Read the original article: Hackers Exploit Policy Loophole in Windows Kernel Drivers

Ransomware, From a Different Perspective

A good backup strategy can be effective at mitigating a ransomware attack, but how many organizations consider that their backup data can also be targeted? This article has been indexed from Dark Reading Read the original article: Ransomware, From a…

Bangladesh Government Website Leaks Personal Data

Personal details of Bangladeshi citizens found online by researcher included full names, phone numbers, email addresses, and national ID numbers. This article has been indexed from Dark Reading Read the original article: Bangladesh Government Website Leaks Personal Data

Critical VMware Bug Exploit Code Released Into the Wild

The exploit code was brought to VMware’s attention by an anonymous researcher, in tandem with the Trend Micro Zero Day Initiative. This article has been indexed from Dark Reading Read the original article: Critical VMware Bug Exploit Code Released Into…

Top Takeaways From Table Talks With Fortune 100 CISOs

As organizations struggle to keep up with new regulations and hiring challenges, chief information security officers share common challenges and experiences. This article has been indexed from Dark Reading Read the original article: Top Takeaways From Table Talks With Fortune…

‘ScarletEel’ Hackers Worm Into AWS Cloud

A toolset upgrade is making ScarletEel more slippery than ever while it continues to manipulate the cloud to perform cryptojacking, DDoS, and more. This article has been indexed from Dark Reading Read the original article: ‘ScarletEel’ Hackers Worm Into AWS…

Analysts: Cybersecurity Funding Set for Rebound

Analysts seem bullish about funding and M&A activity for the second half of the year, though transaction volumes and values dipped again in Q2. This article has been indexed from Dark Reading Read the original article: Analysts: Cybersecurity Funding Set…

NIST Launches Generative AI Working Group

The public working group will develop guidance around the special risks of AI technologies that generate content. This article has been indexed from Dark Reading Read the original article: NIST Launches Generative AI Working Group

Amazon Prime Day Draws out Cyber Scammers

Cybercriminals lining up to score off Amazon Prime Day shoppers, who spent more than $22B in US online sales alone last year, according to estimates. This article has been indexed from Dark Reading Read the original article: Amazon Prime Day…

10 Features an API Security Service Needs to Offer

Securing APIs is specialized work. Here’s what organizations should look for when selecting an outside partner. This article has been indexed from Dark Reading Read the original article: 10 Features an API Security Service Needs to Offer

APT35 Develops Mac Bespoke Malware

Iran-linked APT35 group crafted specific Mac malware when targeting a member of the media with new tools to add backdoors. This article has been indexed from Dark Reading Read the original article: APT35 Develops Mac Bespoke Malware

Deepfake Quantum AI Investment Scam Pops Up on Facebook

A consumer finance journalist and television personality took to Twitter to warn his followers about advertisements using his name and face to scam victims. This article has been indexed from Dark Reading Read the original article: Deepfake Quantum AI Investment…

How to Use Log Management to Retrace Your Digital Footsteps

Log management tools help IT and security teams monitor and improve a system’s performance by identifying bugs, cybersecurity breaches, and other issues that can create outages or compliance problems. This article has been indexed from Dark Reading Read the original…

Spyware Gamed 1.5M Users of Google Play Store

Malware spoofed file management applications thanks to elevated permissions, enabling exfiltration of sensitive data with no user interaction, researchers find. This article has been indexed from Dark Reading Read the original article: Spyware Gamed 1.5M Users of Google Play Store

MOVEit Transfer Faces Another Critical Data-Theft Bug

Users need to patch the latest SQL injection vulnerability as soon as possible. Meanwhile, Cl0p’s data extortion rampage gallops on. This article has been indexed from Dark Reading Read the original article: MOVEit Transfer Faces Another Critical Data-Theft Bug

Startup Spotlight: Endor Labs Focuses on Reachability

The company, one of four finalists in Black Hat USA’s 2023 startup competition, looks to find the vulnerabilities an attacker could actually access. This article has been indexed from Dark Reading Read the original article: Startup Spotlight: Endor Labs Focuses…

Shell Becomes Latest Cl0p MOVEit Victim

In another MOVEit attack, oil and gas giant Shell has been made a victim with the release of the private information of its employees. This article has been indexed from Dark Reading Read the original article: Shell Becomes Latest Cl0p…

Privacy Woes Hold Up Global Instagram Threads Launch

Meta’s answer to Twitter went live and quickly racked up millions of members — but the social media app’s privacy practices are under the microscope. This article has been indexed from Dark Reading Read the original article: Privacy Woes Hold…

6 Steps To Outsmart Business Email Compromise Scammers

Email fraud is a confidence game that costs the economy billions. An effective defense takes technology and vigilance. This article has been indexed from Dark Reading Read the original article: 6 Steps To Outsmart Business Email Compromise Scammers

Microsoft Teams Exploit Tool Auto-Delivers Malware

The “TeamsPhisher” cyberattack tool gives pentesters — and adversaries — a way to deliver malicious files directly to a Teams user from an external account, or tenant. This article has been indexed from Dark Reading Read the original article: Microsoft…

OPERA1ER Cybercrime Group’s Leader Arrested by Interpol

The group’s mastermind was nabbed in Côte d’Ivoire for stealing up to $30 million using malware, phishing campaigns, and BEC scams, as part of international law enforcement’s Operation Nervone. This article has been indexed from Dark Reading Read the original…

OPERA1ER Cybercrime Group’s Leader Arrested by INTERPOL

The group’s mastermind was nabbed in Côte d’Ivoire for stealing up to $30 million using malware, phishing campaigns, and BEC scams, as part of international law enforcement’s Operation Nervone. This article has been indexed from Dark Reading Read the original…

Ransomware Halts Operations at Japan’s Port of Nagoya

LockBit 3.0 claims responsibility for the cyberattack that shuttered the largest port in Japan, according to authorities. This article has been indexed from Dark Reading Read the original article: Ransomware Halts Operations at Japan’s Port of Nagoya

Microsoft Can Fix Ransomware Tomorrow

You can’t encrypt a file you can’t open — Microsoft could dramatically impact ransomware by slowing it down This article has been indexed from Dark Reading Read the original article: Microsoft Can Fix Ransomware Tomorrow

Israel Aided UAE in Defending Against DDoS Attack

Israel’s cyber head points finger at Iran-backed MuddyWater APT group as the perpetrator of a recent attack against a university. This article has been indexed from Dark Reading Read the original article: Israel Aided UAE in Defending Against DDoS Attack

SSH Servers Hit in ‘Proxyjacking’ Cyberattacks

Cybercriminals employ obfuscated script to stealthily hijack victim server bandwidth for use in legitimate proxy networks. This article has been indexed from Dark Reading Read the original article: SSH Servers Hit in ‘Proxyjacking’ Cyberattacks

Name That Edge Toon: Three-Ring Circus

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Edge Toon: Three-Ring Circus

Architecting XDR to Save Money and Your SOC’s Sanity

XDR can lower platform costs and improve detection, but it requires committing to a few principles that go against the established way of thinking about SOC. This article has been indexed from Dark Reading Read the original article: Architecting XDR…

3 Ways to Build a More Skilled Cybersecurity Workforce

With the right collaboration among employers, educators, and policymakers, we can come together to create a more secure environment for all. This article has been indexed from Dark Reading Read the original article: 3 Ways to Build a More Skilled…

AI-Enabled Voice Cloning Anchors Deepfaked Kidnapping

Virtual kidnapping is just one of many new artificial intelligence attack types that threat actors have begun deploying, as voice cloning emerges as a potent new imposter tool. This article has been indexed from Dark Reading Read the original article:…

Cybersecurity Is the Healthcare Your Organization Needs

Organizations should consider their security practices the same way people think about their well-being. Focus on staying healthy instead of finding a new pill for every security symptom you see. This article has been indexed from Dark Reading Read the…

3 Tips to Increase Hybrid and Multicloud Security

As cloud adoption grows, organizations need to rethink their approaches to securing hybrid cloud and multicloud environments. This article has been indexed from Dark Reading Read the original article: 3 Tips to Increase Hybrid and Multicloud Security