Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Day: January 30, 2023
A Child’s Garden of Cybersecurity
A Child's Garden of CybersecurityWhether you dream of your child becoming a CISO or just want them to improve their security hygiene, consider this roundup of...
Riot Games Latest Video-Game Maker to Suffer Breach
Riot Games Latest Video-Game Maker to Suffer BreachHighlighting continued attacks on game developers, attackers stole source code from and issued a ransom demand to the maker...
3 Ways ChatGPT Will Change Infosec in 2023
3 Ways ChatGPT Will Change Infosec in 2023OpenAI's chatbot has the promise to revolutionize how security practitioners work.Read MoreDark ReadingOpenAI's chatbot has the promise to revolutionize...
How Noob Website Hackers Can Become Persistent Threats
How Noob Website Hackers Can Become Persistent ThreatsAn academic analysis of website defacement behavior by 241 new hackers shows there are four clear trajectories they can...
Google: Influence Operator Dragonbridge Floods Social Media in Sprawling Cyber Campaign
Google: Influence Operator Dragonbridge Floods Social Media in Sprawling Cyber CampaignGoogle has mounted a massive takedown, but Dragonbridge's extensive capabilities for generating and distributing vast amounts...
Critical RCE Lexmark Printer Bug Has Public Exploit
Critical RCE Lexmark Printer Bug Has Public ExploitA nasty SSRF bug in Web Services plagues a laundry list of enterprise printers.Read MoreDark ReadingA nasty SSRF bug...
On Data Privacy Day, Organizations Fail Data Privacy Expectations
On Data Privacy Day, Organizations Fail Data Privacy ExpectationsData Privacy Day rolls around year after year, and data privacy breaches likewise. Two-thirds of data breaches result...
Why Most Companies Still Don’t Know What’s on Their Network
Why Most Companies Still Don’t Know What’s on Their NetworkChris Kirsch, CEO of runZero, sits down with Dark Reading’sTerry Sweeney for a Fast Chat on the...
Enterprises Need to Do More to Assure Consumers About Privacy
Enterprises Need to Do More to Assure Consumers About PrivacyOrganizations care about data privacy, but their priorities appear to be different from what their customers think...
Enterprises Don’t Know What to Buy for Responsible AI
Enterprises Don't Know What to Buy for Responsible AIOrganizations are struggling to procure appropriate technical tools to address responsible AI, such as consistent bias detection in...
Spotlight on 2023 DevSecOps Trends
Spotlight on 2023 DevSecOps TrendsSolutions that provide more actionable results — remediation that frees up engineers, processes which integrate security into software development from its design,...
The Journal, Artificial Intelligence in the Life Sciences, Highlights the Contributions of Women in Artificial Intelligence in the Life Sciences
The Journal, Artificial Intelligence in the Life Sciences, Highlights the Contributions of Women in Artificial Intelligence in the Life SciencesThe launch of a new article collection...
Long Con Impersonates Financial Advisers to Target Victims
Long Con Impersonates Financial Advisers to Target VictimsCybercriminals are co-opting the identities of legitimate US financial advisers to use them as fodder for relationship scams (aka...
Convincing, Malicious Google Ads Look to Lift Password Manager Logins
Convincing, Malicious Google Ads Look to Lift Password Manager LoginsUsers searching for Bitwarden and 1Password's Web vaults on Google have recently reported seeing paid ads with...
Fake Texts From the Boss, Bogus Job Postings and Frankenstein Shoppers — Oh My!
Fake Texts From the Boss, Bogus Job Postings and Frankenstein Shoppers — Oh My!Experian’s annual Future of Fraud Forecast highlights five fraud threats facing businesses and...
JD Sports admits intruder accessed 10 million customers’ data
JD Sports admits intruder accessed 10 million customers' dataNo payment details exposed in breach, says retailer, but shoppers told to be 'vigilant about potential scams' Sports...
JD Sports Details Data Breach Affecting 10 Million Customers
JD Sports Details Data Breach Affecting 10 Million CustomersExposed: Online Customer Details, But Not Complete Payment Card DataJD Sports, a sports fashion retailer with global operations,...
How Hackers Used Legitimate Software to Breach U.S. Federal Agencies
How Hackers Used Legitimate Software to Breach U.S. Federal AgenciesA phishing scam using legitimate remote monitoring and management (RMM) software was used to target at least...
Killnet Russian Hacking Group Launches DDoS Attacks on German Websites
Killnet Russian Hacking Group Launches DDoS Attacks on German WebsitesOn January 25th, Killnet Russian activist threat group put several German websites offline after performing a DDoS...
What Is an SEO Poisoning Attack and How Does It Affect Network Security?
What Is an SEO Poisoning Attack and How Does It Affect Network Security?SEO poisoning attacks have been on the rise in recent years, as more and...
Explaining Vulnerability Scanning: Definition, Types, Best Practices
Explaining Vulnerability Scanning: Definition, Types, Best PracticesThe ever-changing landscape of cybersecurity makes it harder for companies to keep up with the malicious intents of threat actors....
How to Choose Between Access Control Models? RBAC vs. ABAC vs. PBAC
How to Choose Between Access Control Models? RBAC vs. ABAC vs. PBACAs organizations are increasingly dealing with security concerns, there is a need for more sophisticated...
FBI Closes Down Hive Ransomware Gang: What Does This Mean for the Security Landscape?
FBI Closes Down Hive Ransomware Gang: What Does This Mean for the Security Landscape?Federal authorities have taken down a website run by a notorious ransomware gang...
Security Flaws Disclosed in Samsung’s Galaxy Store App for Android
Security Flaws Disclosed in Samsung’s Galaxy Store App for AndroidFlaws found in the Galaxy App Store gave attackers the ability to install apps without the user’s...
Aurora Infostealer Malware Deploys Shapeshifting Tactics
Aurora Infostealer Malware Deploys Shapeshifting TacticsOne of the most recent finds exposed the Aurora Stealer malware imitating popular applications to infect as many users as possible....
Doenerium: When Stealing from Thieves Is Also a Crime
Doenerium: When Stealing from Thieves Is Also a CrimeBy Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’...
Five Ways to Keep Endpoint Protection Simple
Five Ways to Keep Endpoint Protection SimpleBy Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve....
What Is Spyware, What It Does, and How to Block It?
What Is Spyware, What It Does, and How to Block It?We are sure that you already heard of spyware, but are you curious to dive deeper...
The Rise in Cyber-Attacks from Bad International Actors
The Rise in Cyber-Attacks from Bad International ActorsThere has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems...