3 Reasons Why BEC Scams Work in Real EstateIdentity verification could be the key to fighting back and building trust in an industry beset with high-stakes...
Day: October 1, 2022
Dangerous New Attack Technique Compromising VMware ESXi Hypervisors
Dangerous New Attack Technique Compromising VMware ESXi HypervisorsChina-based threat actor used poisoned vSphere Installation Bundles to deliver multiple backdoors on systems, security vendor says.Read MoreDark ReadingChina-based...
The Country Where You Live Impacts Password Choices
The Country Where You Live Impacts Password ChoicesLiteracy, levels of personal freedom, and other macro-social factors help determine how strong average passwords are in a given...
Why the US Should Help Secure Mexican Infrastructure — and What It Gets in Return
Why the US Should Help Secure Mexican Infrastructure — and What It Gets in ReturnCall it cross-border enlightened self-interest: As one of the US's premier trade...
Ransomware Attacks Continue Increasing: 20% of All Reported Attacks Occurred in the Last 12 Months – New Survey
Ransomware Attacks Continue Increasing: 20% of All Reported Attacks Occurred in the Last 12 Months - New SurveySurvey of over 2,000 IT pros revealed that a...
Pathlock Expands SAP Capabilities with Acquisition of Grey Monarch
Pathlock Expands SAP Capabilities with Acquisition of Grey MonarchCombination of two companies to help SAP customers streamline audit, compliance and control processes.Read MoreDark ReadingCombination of two...
KnowBe4 Simplifies Compliance Requirements for Healthcare Privacy
KnowBe4 Simplifies Compliance Requirements for Healthcare PrivacyKnowBe4's Compliance Audit Readiness Assessment (CARA) now addresses select requirements from HIPAA Security Rule.Read MoreDark ReadingKnowBe4's Compliance Audit Readiness Assessment...
Latest Delinea Update Streamlines DevOps Security
Latest Delinea Update Streamlines DevOps Security.Read MoreDark Reading.
Intel Hardens Confidential Computing With Project Amber Updates
Intel Hardens Confidential Computing With Project Amber UpdatesThe chip giant has developed new features and services to make it tougher for malicious hackers and insiders to...
Organizations Finding the Need for New Approaches on the Cybersecurity Front, CompTIA research reveals
Organizations Finding the Need for New Approaches on the Cybersecurity Front, CompTIA research revealsSettling for 'satisfactory' level of readiness may underestimate growing levels of risk.Read MoreDark...
YouMail, Inc. and WMC Global Partner to Deliver Voice and SMS Phishing Disruption Services
YouMail, Inc. and WMC Global Partner to Deliver Voice and SMS Phishing Disruption ServicesJoint phishing intelligence solution provides 360-degree mobile communication defense.Read MoreDark ReadingJoint phishing intelligence...
Veristor Partners with SANS Security Awareness to Deliver Employee Security Awareness Training
Veristor Partners with SANS Security Awareness to Deliver Employee Security Awareness TrainingCompanies collaborate to strengthen organizations' first line of security defense – end users.Read MoreDark ReadingCompanies...
Aunalytics Launches Security Patching Platform as a Service
Aunalytics Launches Security Patching Platform as a ServiceExpedited software patching and updating recognized as one of the most important processes to protect against system compromise from...
Israel Cybersecurity Enterprise (ICE) Teams with CybeReady to Deliver World-Class Security Training
Israel Cybersecurity Enterprise (ICE) Teams with CybeReady to Deliver World-Class Security TrainingSecurity service provider selects cybersecurity training platform to safeguard enterprises in LATAM.Read MoreDark ReadingSecurity service...
Safous Adds Browser Isolation to Its Zero-Trust Network Access Service
Safous Adds Browser Isolation to Its Zero-Trust Network Access ServiceThis new function offers secure access to corporate applications and external SaaS through a virtual browser.Read MoreDark...
Cyera Survey Finds One in Three Respondents Want to Minimize Cloud Data Risk
Cyera Survey Finds One in Three Respondents Want to Minimize Cloud Data RiskMultiple providers say 'cloud data sprawl' makes managing cloud data risk a priority initiative...
Onyxia Raises $5M to Help Companies Proactively Manage Cybersecurity Risks Using AI
Onyxia Raises $5M to Help Companies Proactively Manage Cybersecurity Risks Using AIOnyxia, an AI-powered cybersecurity strategy and performance platform providing a centralized way for security teams...
With the Software Supply Chain, You Can’t Secure What You Don’t Measure
With the Software Supply Chain, You Can't Secure What You Don't MeasureReports to the National Vulnerability Database jumped in 2022, but we should pay just as...
SolarMarker Attack Leverages Weak WordPress Sites, Fake Chrome Browser Updates
SolarMarker Attack Leverages Weak WordPress Sites, Fake Chrome Browser UpdatesThe SolarMarker group is exploiting a vulnerable WordPress-run website to encourage victims to download fake Chrome browser...
Microsoft Confirms Pair of Blindsiding Exchange Zero-Days, No Patch Yet
Microsoft Confirms Pair of Blindsiding Exchange Zero-Days, No Patch YetThe "ProxyNotShell" security vulnerabilities can be chained for remote code execution and total takeover of corporate email...
Trojanized, Signed Comm100 Chat Installer Anchors Supply Chain Attack
Trojanized, Signed Comm100 Chat Installer Anchors Supply Chain AttackMalicious Comm100 files have been found scattered throughout North America, and across sectors including tech, healthcare, manufacturing, telecom,...
Cybercriminals See Allure in BEC Attacks Over Ransomware
Cybercriminals See Allure in BEC Attacks Over RansomwareWhile ransomware seems stalled, business email compromise (BEC) attacks continue to make profits from the ProxyShell and Log4j vulnerabilities,...
Reshaping the Threat Landscape: Deepfake Cyberattacks Are Here
Reshaping the Threat Landscape: Deepfake Cyberattacks Are HereIt's time to dispel notions of deepfakes as an emergent threat. All the pieces for widespread attacks are in...
LA School District Ransomware Attackers Now Threaten to Leak Stolen Data
LA School District Ransomware Attackers Now Threaten to Leak Stolen DataWeeks after it breached the Los Angeles Unified School District, the Vice Society ransomware group is...
Worried About the Exchange Zero-Day? Here’s What to Do
Worried About the Exchange Zero-Day? Here's What to DoWhile organizations wait for an official patch for the two zero-day flaws in Microsoft Exchange, they should scan...
ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)
ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)Introduction In recent months, we have observed in our telemetry an increase in ransomware that...
ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)
ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)Introduction In recent months, we have observed in our telemetry an increase in ransomware that...
How CIA betrayed informants with shoddy front websites built for covert comms
How CIA betrayed informants with shoddy front websites built for covert commsTop tip, don't give your secret login box the HTML form type 'password' For almost...
Ex-eBay execs jailed for cyberstalking web critics
Ex-eBay execs jailed for cyberstalking web criticsStill to come: Civil RICO lawsuit against e-souk and former top brass Two now-former eBay executives who pleaded guilty to...
Stop us if you’ve heard this one before: Exchange Server zero-days actively exploited
Stop us if you've heard this one before: Exchange Server zero-days actively exploitedRemember this next time Microsoft talks about how seriously it takes security Updated Infosec...