
Chris Kirsch, CEO of runZero, sits down with Dark Reading’sTerry Sweeney for a Fast Chat on the importance of asset discovery.
https://www.darkreading.com/risk/why-most-companies-still-don-t-know-what-s-on-their-network
Data Privacy Day rolls around year after year, and data privacy breaches likewise. Two-thirds of data breaches result in data exposure.
https://www.darkreading.com/omdia/on-data-privacy-day-organizations-fail-data-privacy-expectations
A nasty SSRF bug in Web Services plagues a laundry list of enterprise printers.
https://www.darkreading.com/cloud/critical-rce-lexmark-printer-bug-has-public-exploit
Google has mounted a massive takedown, but Dragonbridge's extensive capabilities for generating and distributing vast amounts of largely spammy content calls into question the motivation behind t...
An academic analysis of website defacement behavior by 241 new hackers shows there are four clear trajectories they can take in future, researchers say.
https://www.darkreading.com/attacks-breaches/noob-hackers-become-persistent-threats
OpenAI's chatbot has the promise to revolutionize how security practitioners work.
https://www.darkreading.com/vulnerabilities-threats/3-ways-chatgpt-will-change-infosec-in-2023
Highlighting continued attacks on game developers, attackers stole source code from and issued a ransom demand to the maker of League of Legends.
Whether you dream of your child growing into a CISO or just want them to improve their security hygiene, consider this roundup of literary geekery.
https://www.darkreading.com/edge-slideshows/a-child-s-garden-of-cybersecurity
Hackers don't need a key to get past your defenses if they can essentially teleport using RMMs, warns CISA and the NSA.
The accused sold an enormous data set stolen from the Austrian radio and television licensing authority — to an undercover cop.
https://www.darkreading.com/attacks-breaches/dutchman-detained-dealing-details-millions-people
A vulnerability within Microsoft's OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.
The US Department of Justice hacked into Hive's infrastructure, made off with hundreds of decryptors, and seized the gang's operations.
https://www.darkreading.com/vulnerabilities-threats/hive-ransomware-gang-loses-honeycomb
After Berlin pledged tanks for Ukraine, some German websites were knocked offline temporarily by Killnet DDoS attacks.
https://www.darkreading.com/ics-ot/german-government-airports-banks-hit-killnet-ddos-attacks
The rapid maturation and rebranding of ransomware groups calls for relentless preparation and flexibility in response, according to one view from the trenches.
https://www.darkreading.com/attacks-breaches/7-insights-from-a-ransomware-negotiator
Only one in 10 enterprises will create a robust zero-trust foundation in the next three years, while more than half of attacks won't even be prevented by it, according to Gartner.
https://www.darkreading.com/remote-workforce/companies-struggle-zero-trust-attackers-adapt
Dark Reading: Connecting the Information and Security Community
https://www.darkreading.com/cloud/new-study-examines-application-connectivity-security-in-the-cloud
Program provides financial assistance to aspiring information security professionals, enabling students toward long-term career success.
Advanced workflow, approval process, and management dashboard enhance control, distribution, and supervision, while reducing errors and streamlining the entire SBOM management process.
New guidance seeks to cultivate trust in AI technologies and promote AI innovation while mitigating risk
Expect more regulatory and enforcement action in the US and around the world.
https://www.darkreading.com/endpoint/organizations-must-brace-for-privacy-impacts-this-year
One of the most closely watched security startups continues to build bank because its platform appeals to both developers and security pros.
https://www.darkreading.com/dr-tech/snyk-gets-nod-of-approval-with-servicenow-strategic-investment
Delivering secure, global IoT device connectivity, deployment, and management at scale.
https://www.darkreading.com/iot/kore-delivers-iot-safe-solution-for-massive-iot-use-cases-with-aws
Dark Reading: Connecting the Information and Security Community
Two common attacks against on-premises Kerberos authentication servers — known as Pass the Ticket and Silver Ticket — can be used against Microsoft's Azure AD Kerberos, a security firms says.
https://www.darkreading.com/cloud/microsoft-azure-kerberos-attacks-open-cloud-accounts
Zacks Elite sign-ups for the period 1999–2005 were accessed, including name, address, email address, phone number, and the password associated with Zacks.com.
In the Play Store's ToS, a paragraph says Google may remove "harmful" applications from users' devices. Is that a step too far?
https://www.darkreading.com/edge-articles/google-play-terms-of-service-push-privacy-to-the-limit
Dark Reading: Connecting the Information and Security Community
New Cyberseek™ data shows US is short nearly 530,000 skilled cybersecurity staff.
Dark Reading: Connecting the Information and Security Community
The security vulnerability allows attackers to spoof a target certificate and masquerade as any website, among other things.
https://www.darkreading.com/application-security/researchers-poc-exploit-nsa-flaw-windows-cryptoapi
Encrypted backups for several GoTo remote work tools were exfiltrated from LastPass, along with encryption keys.
https://www.darkreading.com/application-security/goto-encrypted-backups-stolen-lastpass-breach
Don't make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the vulnerability is on a potential a...
The DPRK has turned crypto scams into big business to replenish its depleted state coffers.
https://www.darkreading.com/remote-workforce/north-korea-apt-swindled-1b-crypto-investors-2022
Some predictions about impending security challenges, with a few tips for proactively addressing them.
https://www.darkreading.com/zscaler/multicloud-security-challenges-will-persist-in-2023
Dark Reading: Connecting the Information and Security Community
Dark Reading: Connecting the Information and Security Community
https://www.darkreading.com/attacks-breaches/bd-publishes-2022-cybersecurity-annual-report
Despite economic headwinds and layoffs in other areas, most retail and hospitality CISOs expect to add staff in 2023, according to a new report.
Report identifies 1.75m cyberattacks were stopped by BlackBerry in the last 90 days.
If you or your company can't find good infosec candidates, consider changing up the qualifications to find more nontraditional talent.
https://www.darkreading.com/operations/can-t-fill-open-positions-rewrite-your-minimum-requirements
Skyhawk Synthesis extends cloud security misconfiguration detection across multiple clouds, the company says — throwing cloud security posture management in for free.
Participants in a working session on ransomware at the World Economic Forum discussed how planning ahead can reduce cyber risk.
https://www.darkreading.com/edge-articles/view-from-davos-the-changing-economics-of-cybercrime
Ticketmaster testified in the Senate that a cyberattack was to blame for the high-profile Taylor Swift concert sales collapse, but some senators aren't so sure.
https://www.darkreading.com/attacks-breaches/ticketmaster-blames-bots-taylor-swift-eras-tour-debacle
Mainz brings 25 years of industry experience to execute on Forescout’s strategy and drive its next phase of growth.
https://www.darkreading.com/risk/forescout-appoints-technology-veteran-barry-mainz-as-ceo
Restoration teams must be part of a collaborative, initial response team to address costly downtime.
Respondents indicate organizations are unprepared to handle cyberwarfare, there's no one-size-fits-all response to ransomware, and cybersecurity spending is on the rise.
Dark Reading: Connecting the Information and Security Community
Dark Reading: Connecting the Information and Security Community
https://www.darkreading.com/cloud/the-2022-2023-cloud-awards-announces-its-finalists-
Machine learning offers great opportunities, but it still can't replace human experts.
Hackers cleverly cobbled together a suite of open source software — including a novel RAT — and hijacked servers owned by ordinary businesses.
The company will block the configuration files, which interact with Web applications — since threat actors increasingly use the capability to install malicious code.
https://www.darkreading.com/vulnerabilities-threats/microsoft-excel-add-ins-stop-office-exploits
When EVs and smart chargers plug in to critical infrastructure, what can go wrong? Plenty.
API Leak Management software discovers exposed API keys and other secrets, blocks their use, and monitors for abuse, the company says.
https://www.darkreading.com/dr-tech/wallarm-aims-to-reduce-the-harm-from-compromised-apis
Devices running Android 12 and below are at risk of attackers downloading apps that direct users to a malicious domain.
Security leaders must build resiliency against these complex attacks immediately.
Dark Reading: Connecting the Information and Security Community
Dark Reading: Connecting the Information and Security Community
Amid all the NFL playoff action, FanDuel has sent an email warning to gamblers that their data was exposed in its third-party breach, putting them at risk for phishing attacks.
Here's how a security team can present itself to citizen developers as a valuable resource rather than a bureaucratic roadblock.
https://www.darkreading.com/edge-articles/no-one-wants-to-be-governed-everyone-wants-to-be-helped
A Swiss hacker poking around in an unprotected Jenkins development server belonging to CommuteAir accessed the names and birthdates of some 1.5 million people on a TSA no-fly list from 2019.
Dark Reading: Connecting the Information and Security Community
Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.
https://www.darkreading.com/threat-intelligence/hunting-insider-threats-on-the-dark-web
S-RM reports show that cybersecurity concerns surrounding hybrid work prevail for 37% of organizations.
Dark Reading: Connecting the Information and Security Community
This time around, weak API security allowed a threat actor to access account information, the mobile phone giant reported.
https://www.darkreading.com/attacks-breaches/t-mobile-breached-again-exposing-37m-customers-data
Two new reports show ransomware revenues for threat actors dropped sharply in 2022 as more victims ignored ransom demands.
https://www.darkreading.com/attacks-breaches/ransomware-profits-decline-victims-refuse-pay
Zendesk has alerted customers to a successful SMS phishing campaign that has exposed "service data," but details remain scarce.
https://www.darkreading.com/application-security/compromised-zendesk-employee-credentials-breach
Orca Security is one of the companies integrating conversational AI technology into its products.
https://www.darkreading.com/dr-tech/gpt-emerges-ai-tech-security-vendors
Serious security flaws go unpatched, and ransomware attacks increase against manufacturers.
https://www.darkreading.com/ics-ot/critical-manufacturing-sector-in-the-bulls-eye
Head off account takeover attacks by being proactive about IoT security. Start with designing and building better security protocols into IoT devices, always change weak default configurations, a...
The credential-stuffing attack, likely fueled by password reuse, yielded personal identifiable information that can be used to verify the authenticity of previously stolen data.
https://www.darkreading.com/attacks-breaches/paypal-breach-exposed-pii-of-nearly-35k-accounts
Multiple misconfigurations in a service that underpins many Azure features could have allowed an attacker to remotely compromise a cloud user's system.
https://www.darkreading.com/cloud/emojideploy-attack-chain-targets-misconfigured-azure-service
Mainly Apple iOS in-app ads were targeted, injecting malicious JavaScript code to rack up phony views.
https://www.darkreading.com/attacks-breaches/massive-adware-campaign-shuttered
The "BoldMove" backdoor demonstrates a high level of knowledge of FortiOS, according to Mandiant researchers, who said the attacker appears to be based out of China.
Dark Reading: Connecting the Information and Security Community
Traditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches.
https://www.darkreading.com/cloud/shift-identity-left-preventing-identity-based-breaches
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
https://www.darkreading.com/application-security/name-that-toon-poker-hand
The report highlights concerning security stats following two years of extreme tech growth.
ICS/OT cybersecurity firm finds 35% of CVEs in second half of 2022 unpatchable.
Open architecture, non-standalone roaming, nation-state attacks, ransomware, and the need for more industry collaboration are among the major 5G security challenges that operators must address in...
KnowBe4 partners with the Center for Cyber Safety and Education to bolster women in cybersecurity for the fourth consecutive year.
New program enables students and early career professionals to learn critical skills required in today's entry-level cybersecurity field, helping address urgent cyber workforce jobs gap.
There's a fine line between a hacker and an attacker, but it pays to be proactive. Consider tests by ethical hackers, a red team, or pen testers, and then bolster your company's defenses against ...
Dark Reading: Connecting the Information and Security Community
Research shows that over 50% of organizations performing software development struggle with fully integrating security into their software development lifecycle.
Corsha’s Annual State of API Secrets Management Report finds over 50% of respondents suffered a data breach due to compromised API secrets.
The growing use of mobile devices for MFA and the proliferation of 5G and VoIP in general could result in more attacks in future, experts say.
https://www.darkreading.com/threat-intelligence/cybercriminals-target-telecom-provider-networks
Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization.
Ensuring that data can be easily discovered, classified, and secured is a crucial cornerstone of a data security strategy.
https://www.darkreading.com/tech-trends/data-security-in-multicloud-limit-access-increase-visibility
Without noncompetes, how do organizations make sure employees aren't taking intellectual property when they go work to work for a competitor?
https://www.darkreading.com/edge-ask-the-experts/how-would-ftc-rule-noncompetes-affect-data-security
These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks.
https://www.darkreading.com/ics-ot/vulnerable-historian-servers-imperil-ot-networks
Dark Reading: Connecting the Information and Security Community
Layoffs intended to cut costs, help company shift its focus on cybersecurity services, Sophos says.
https://www.darkreading.com/operations/sophos-cuts-jobs-to-focus-on-cybersecurity-services-
The powerful AI bot can produce malware without malicious code, making it tough to mitigate.
New module introduces shadow SaaS application discovery, monitoring, and remediation to protect businesses from supply chain attacks.
KnowBe4 releases overall 2022 and Q4 2022 global phishing test reports and finds business-related emails continue to be utilized as a phishing strategy and reveal top holiday email phishing subje...
From updating employee education and implementing stronger authentication protocols to monitoring corporate accounts and adopting a zero-trust model, companies can better prepare defenses against...
Threat actors are diversifying across all aspects to attack critical infrastructure, muddying the threat landscape, and forcing industrial organizations to rethink their security.
Dark Reading: Connecting the Information and Security Community
The integration provides crucial protection for businesses’ most vulnerable departments — help desks and customer support teams — preventing the most advanced threats sent by online users.
Dark Reading: Connecting the Information and Security Community
https://www.darkreading.com/threat-intelligence/new-coalfire-report-reveals-cisos-rising-influence