Five Million Downloads OyeTalk Android App Leaks Private User ConversationsCyber researchers warn OyeTalk users that the app`s database exposed their private data and conversations to data...
Day: February 23, 2023
ChatGPT: The Dark Side of Artificial Intelligence Crafting Custom Malware
ChatGPT: The Dark Side of Artificial Intelligence Crafting Custom MalwareIt’s easy to see why there has always been some skepticism and uncertainty about the emergence of...
What Are DNS Records? Types and Role in DNS Attacks Mitigation
What Are DNS Records? Types and Role in DNS Attacks MitigationDNS records or resource records (RR) contain various types of data about domain names and IP...
Driving Business Growth in Turbulent Times from the Perspective of SOC Prime’s CEO: Part II
Driving Business Growth in Turbulent Times from the Perspective of SOC Prime’s CEO: Part II How Fusing Sigma & MITRE ATT&CK® Empowers Collective Cyber Defense to...
Moving Connected Device Security Standards Forward
Moving Connected Device Security Standards ForwardPosted by Eugene Liderman, Director of Mobile Security Strategy, Google As Mobile World Congress approaches, we have the opportunity to have...
Cloud-ready and Channel-first
Cloud-ready and Channel-firstTrend Micro named one of 2023’s coolest cloud security companiesRead MoreTrend Micro Research, News, PerspectivesTrend Micro named one of 2023’s coolest cloud security companies
A Deep Dive into the Evolution of Ransomware Part 2
A Deep Dive into the Evolution of Ransomware Part 2This 3-part blog series takes an in-depth look at the evolution of ransomware business models, from the...
Clasiopa hackers use new Atharvan malware in targeted attacks
Clasiopa hackers use new Atharvan malware in targeted attacksSecurity researchers have observed a hacking group targeting companies in the materials research sector with a unique toolset that...
Russian malware dev behind NLBrute hacking tool extradited to US
Russian malware dev behind NLBrute hacking tool extradited to USA Russian malware developer accused of creating and selling the NLBrute password-cracking tool was extradited to the...
Fruit giant Dole suffers ransomware attack impacting operations
Fruit giant Dole suffers ransomware attack impacting operationsDole Food Company, one of the world's largest producers and distributors of fresh fruit and vegetables, has announced that it is...
European Commission bans staff using TikTok on work devices over security fears
European Commission bans staff using TikTok on work devices over security fearsParent company, ByteDance, says action is ‘misguided’ and has contacted commission to ‘set the record...
Third-Party Providers Create Identity and Access Control Challenges for Fintech Apps
Third-Party Providers Create Identity and Access Control Challenges for Fintech AppsFintech has drastically shifted the financial services industry toward digital technologies and, in so doing, has...
Israel’s Top Tech University Targeted by DarkBit Ransomware
Israel's Top Tech University Targeted by DarkBit RansomwareAn Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send...
Coinbase Crypto Exchange Ensnared in ‘Oktapus’-Related Smishing Attack
Coinbase Crypto Exchange Ensnared in 'Oktapus'-Related Smishing AttackSome employees' personal data was leaked, but the company responded swiftly to a socially engineered incident that gained access...
Cyberthreats, Regulations Mount for Financial Industry
Cyberthreats, Regulations Mount for Financial IndustryNation-state adversaries, new reporting regulations, and a fast-paced threat landscape mean that financial services and technology firms need to bolster their...
Name That Toon: Join the Club
Name That Toon: Join the ClubFeeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.Read MoreDark...
Analysts Slam Twitter’s Decision to Disable SMS-Based 2FA
Analysts Slam Twitter's Decision to Disable SMS-Based 2FAMaking the option available only to paid subscribers — while also claiming SMS authentication is broken — doesn't make...
Malwarebytes Expands Platform With New Application Block Capabilities
Malwarebytes Expands Platform With New Application Block CapabilitiesLatest threat prevention module helps resource-strapped security teams block unsafe, untrusted or vulnerable applications.Read MoreDark ReadingLatest threat prevention module...
CREST Calls for Greater Equity, Inclusion and Diversity As Part of National Cyber Security Strategy
CREST Calls for Greater Equity, Inclusion and Diversity As Part of National Cyber Security StrategyPost ContentRead MoreDark Reading
Black Hat to Launch Official Certification Program
Black Hat to Launch Official Certification ProgramPost ContentRead MoreDark Reading
How to Stop Attackers That Target Healthcare Imaging Data
How to Stop Attackers That Target Healthcare Imaging DataAttribute-based encryption could help keep sensitive metadata off of the Dark Web.Read MoreDark ReadingAttribute-based encryption could help keep...
Scrut Automation Raises Funding of $7.5M, Led by MassMutual Ventures, Lightspeed, and Endiya Partners
Scrut Automation Raises Funding of $7.5M, Led by MassMutual Ventures, Lightspeed, and Endiya PartnersWith the fresh capital, Scrut aims to focus on simplifying risk management and...
4 Tips to Guard Against DDoS Attacks
4 Tips to Guard Against DDoS AttacksAttackers are now using multiple types of distributed denial-of-service (DDoS) attacks to take down sites. Here are some ways to...
7 Tips for Mitigating Cyber-Risks to Your Corporate Social Media
7 Tips for Mitigating Cyber-Risks to Your Corporate Social MediaHow to stay safe, even when tech-savvy admins can't tell the difference between a scam and the...
Exploit Code Released for Critical Fortinet RCE Bug
Exploit Code Released for Critical Fortinet RCE BugOrganizations are urged to update to the latest versions of FortiNAC to patch a flaw that allows unauthenticated attackers...
Trend Micro Acquires SOC Technology Expert Anlyz
Trend Micro Acquires SOC Technology Expert AnlyzTechnology tuck-in enhances industry's broadest XDR security platform.Read MoreDark ReadingTechnology tuck-in enhances industry's broadest XDR security platform.
This Will Be the Year of the SBOM, for Better or for Worse
This Will Be the Year of the SBOM, for Better or for WorseSharing attestations on software supply chain data that are formed into a policy will...
Top Takeaways From CloudNativeSecurityCon 2023
Top Takeaways From CloudNativeSecurityCon 2023CloudNativeSecurityCon North America 2023 was a vendor-neutral cloud-native security conference. Here's why it was important.Read MoreDark ReadingCloudNativeSecurityCon North America 2023 was a...
(ISC)² Opens Security Congress 2023 Call for Presentations
(ISC)² Opens Security Congress 2023 Call for Presentations(ISC)2 members and cybersecurity professionals worldwide are encouraged to share their expertise, best practices and experiences with their peers...
Why Are My Employees Integrating With So Many Unsanctioned SaaS Apps?
Why Are My Employees Integrating With So Many Unsanctioned SaaS Apps?Before adopting SaaS apps, companies should set security guardrails to vet new vendors and check security...
