5 Ways to Survive Scam Season — or Rather, Tax SeasonSecurity pros need to look beyond user education to find and disarm fraudulent actors.Read MoreDark ReadingSecurity...
Month: February 2023
DataDome’s Inaugural E-Commerce Holiday Bot & Online Fraud Report Reveals the U.S. as the Top Source of Bot Attacks
DataDome's Inaugural E-Commerce Holiday Bot & Online Fraud Report Reveals the U.S. as the Top Source of Bot AttacksPost ContentRead MoreDark Reading
Valtix Survey: 95% of Organizations Say Multi-cloud Is a ‘Strategic Priority’ but Only 58% Have the Security Architecture to Support It
Valtix Survey: 95% of Organizations Say Multi-cloud Is a 'Strategic Priority' but Only 58% Have the Security Architecture to Support ItPost ContentRead MoreDark Reading
Financial Institutions Are Suffering From Increasingly Sophisticated Cyberattacks, According to Contrast Security
Financial Institutions Are Suffering From Increasingly Sophisticated Cyberattacks, According to Contrast SecurityPost ContentRead MoreDark Reading
Infosec Launches New Office Comedy Themed Security Awareness Training Series
Infosec Launches New Office Comedy Themed Security Awareness Training SeriesPost ContentRead MoreDark Reading
Intel 471 Announces Powerful and Scalable Attack Surface Protection Solution Suite
Intel 471 Announces Powerful and Scalable Attack Surface Protection Solution SuitePost ContentRead MoreDark Reading
ARMO Integrates ChatGPT to Help Users Secure Kubernetes
ARMO Integrates ChatGPT to Help Users Secure KubernetesPost ContentRead MoreDark Reading
Coalfire Compliance Essentials Optimized for Automated Evidence Collection
Coalfire Compliance Essentials Optimized for Automated Evidence CollectionPost ContentRead MoreDark Reading
Backdoor in Dingo Cryptocurrency Allows Creator to Steal (Nearly) Everything
Backdoor in Dingo Cryptocurrency Allows Creator to Steal (Nearly) EverythingA tax variable in the software implementing the Dingo Token allows the creators to charge 99% in...
With TikTok Bans, the Time for Operational Governance Is Now
With TikTok Bans, the Time for Operational Governance Is NowEmerging risks and trends need to be monitored, but cybersecurity challenges can be fixed with a focus...
LockBit Group Goes From Denial to Bargaining Over Royal Mail
LockBit Group Goes From Denial to Bargaining Over Royal MailRansomware Remains a Royal Pain, as Criminals' Latest Extortion Attempt HighlightsThe LockBit group has gone from denying...
7 Reasons to Choose an MDR Provider
7 Reasons to Choose an MDR ProviderMDR Services Offer Deep Domain Expertise, Robust Research Tools and SkillsDetecting and responding to cyberthreats is challenging for any organization,...
Microsoft Experiences Second Major Cloud Outage in 2 Weeks
Microsoft Experiences Second Major Cloud Outage in 2 Weeks'Recent Changes' Blamed as Outlook.com Webmail and Calendar APIs Left InaccessibleMicrosoft suffered its second major outage in less...
Patching & Passwords Lead the Problem Pack for Cyber-Teams
Patching & Passwords Lead the Problem Pack for Cyber-TeamsDespite growing awareness, organizations remain plagued with unpatched vulnerabilities and weaknesses in credential policies.Read MoreDark ReadingDespite growing awareness,...
Cybercrime Shows No Signs of Slowing Down
Cybercrime Shows No Signs of Slowing DownLook for recent trends in attacks, strategies, and vulnerabilities to continue gaining steam throughout 2023.Read MoreDark ReadingLook for recent trends...
Cadien Cyber Response Launches to Deliver Incident Response & Complex Digital Forensics Services
Cadien Cyber Response Launches to Deliver Incident Response & Complex Digital Forensics ServicesPost ContentRead MoreDark Reading
Global Ransomware Attack on VMware EXSi Hypervisors Continues to Spread
Global Ransomware Attack on VMware EXSi Hypervisors Continues to SpreadThe fresh "ESXiArgs" malware is exploiting a 2-year-old RCE security vulnerability (tracked as CVE-2021-21974), resulting in thousands...
BlackBasta Blamed for Global Attacks on VMware ESXi Servers
BlackBasta Blamed for Global Attacks on VMware ESXi ServersItaly, Germany, France, US and Canada Investigating Hacks of Unpatched ServersThe Italian cybersecurity agency says at least a...
Lawsuit Alleges GoodRx Unlawfully Shared Health Data
Lawsuit Alleges GoodRx Unlawfully Shared Health DataLitigation Also Names Meta, Google, Criteo in Use of Tracking Code TechOn the heels of an enforcement action last week...
‘PixPirate” Banking Trojan Targets Brazilian Pix Users
'PixPirate" Banking Trojan Targets Brazilian Pix UsersBrazil Weathers Yet Another Malicious App for Stealing MoneyAn Android banking Trojan is targeting Brazilian adopters of an instant payment...
UScellular Customer Data On Hacker Forum
UScellular Customer Data On Hacker ForumData Leaked from a Thrid-Party VendorU.S. wireless telecom USCellular says a data breach at a third party vendor resulted in a...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
6 Examples of the Evolution of a Scam Site
6 Examples of the Evolution of a Scam SiteExamining some key examples of recently found fraud sites that target the lucrative retail shoe industry helps us...
Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally
Cyberattack on Fintech Firm Disrupts Derivatives Trading GloballyThe Russia-linked LockBit ransomware group claims to be behind the attack that fouled automated transactions for dozens of clients...
Korelock Launches IOT Smart Lock Technology Company
Korelock Launches IOT Smart Lock Technology CompanyDenver-based business secures Series A Funding through partnerships with Iron Gate Capital and Kozo Keikaku Engineering.Read MoreDark ReadingDenver-based business secures...
Hornetsecurity Combats QR Code Phishing With Launch of New Technology
Hornetsecurity Combats QR Code Phishing With Launch of New TechnologyPost ContentRead MoreDark Reading
MITRE Releases Tool to Design Cyber-Resilient Systems
MITRE Releases Tool to Design Cyber-Resilient SystemsEngineers can use the Cyber Resiliency Engineering Framework Navigator to visuzalize their cyber-resiliency capabilities.Read MoreDark ReadingEngineers can use the Cyber...
How the Cloud Is Shifting CISO Priorities
How the Cloud Is Shifting CISO PrioritiesThe greatly expanding attack surface created by the cloud needs to be protected.Read MoreDark ReadingThe greatly expanding attack surface created...
Scores of Redis Servers Infested by Sophisticated Custom-Built Malware
Scores of Redis Servers Infested by Sophisticated Custom-Built MalwareAt least 1,200 Redis servers worldwide have been infected with "HeadCrab" cryptominers since 2021.Read MoreDark ReadingAt least 1,200...
Iran-Backed Actor Behind ‘Holy Souls’ Cyberattack on Charlie Hebdo, Microsoft Says
Iran-Backed Actor Behind 'Holy Souls' Cyberattack on Charlie Hebdo, Microsoft SaysThe January attack was in retaliation for the satirical French magazine's decision to launch a cartoon...