Microsoft Patches Zero-Day Actively Exploited in the WildThe computing giant issued a massive Patch Tuesday update, including a pair of remote execution flaws in the Microsoft...
Cisco fixes bug allowing RSA private key theft on ASA, FTD devices
Cisco fixes bug allowing RSA private key theft on ASA, FTD devicesCisco has addressed a high severity vulnerability affecting its Adaptive Security Appliance (ASA) and Firepower Threat Defense...
Hacker uses new RAT malware in Cuba Ransomware attacks
Hacker uses new RAT malware in Cuba Ransomware attacksA member of the Cuba ransomware operation is employing previously unseen tactics, techniques, and procedures (TTPs), including a...
Software Development Pipelines Offer Cybercriminals ‘Free-Range’ Access to Cloud, On-Prem
Software Development Pipelines Offer Cybercriminals 'Free-Range' Access to Cloud, On-PremA Q&A with NCC Group's Viktor Gazdag ahead of a Black Hat USA session on CI/CD pipeline...
Conti extortion gangs behind surge of BazarCall phishing attacks
Conti extortion gangs behind surge of BazarCall phishing attacksAt least three groups split from the Conti ransomware operation have adopted BazarCall phishing tactics as the primary...
Looking Back at 25 Years of Black Hat
Looking Back at 25 Years of Black HatThe Black Hat USA conference's silver jubilee is an opportunity to remember its defining moments, the impact it has...
Dark Utilities C2 as a service tool leverages IPFS, targets several operating systems
Dark Utilities C2 as a service tool leverages IPFS, targets several operating systemsA new command and control as a service allows cybercriminals to easily control victims'...
Making Linux Kernel Exploit Cooking Harder
Making Linux Kernel Exploit Cooking Harder Posted by Eduardo Vela, Exploit Critic Cover of the medieval cookbook. Title in large letters kernel Exploits. Adorned. Featuring a...
Improve Threat Detection & Response with OCSF
Improve Threat Detection & Response with OCSFNew open source initiative helping organizations to detect and respond to cyber-attacks faster and easierLeer másTrend Micro Research, News, PerspectivesNew...
Top 5 best backup practices
Top 5 best backup practicesGive yourself peace of mind by implementing a new backup strategy with our tips. The post Top 5 best backup practices appeared...
Cybersecurity: Power to the People
Cybersecurity: Power to the PeopleExpert best practice in building a strong security culture A security culture occurs when both the values and behaviors of leaders and...
Dark Reading News Desk: Live at Black Hat USA 2022
Dark Reading News Desk: Live at Black Hat USA 2022LIVE NOW: Dark Reading News Desk returns to Black Hat USA 2022Leer másDark ReadingLIVE NOW: Dark Reading...
Cyber Security in the Workplace Guide
Cyber Security in the Workplace GuideProtect your organization before, during, and after a cyber attack When it comes to cyber security, your employees are your best...
Flow Security Launches Next-Gen Data Security Platform Following $10 Million Seed Round
Flow Security Launches Next-Gen Data Security Platform Following $10 Million Seed RoundFirst-of-its-kind solution discovers and protects both data at rest and in motion.Leer másDark ReadingFirst-of-its-kind solution...
Cracking the Hackers: How to Build a 100% Engaged Human Firewall
Cracking the Hackers: How to Build a 100% Engaged Human FirewallCritical steps for a successful cyber security awareness campaign Staff working remotely are at greater risk...
How to find and remove spyware from your smartphone
How to find and remove spyware from your smartphoneContributed by George Mack, Content Marketing Manager, Check Point Software. Our phones have become an integral part of...
Zero Trust & XDR: The New Architecture of Defense
Zero Trust & XDR: The New Architecture of DefenseZero trust and XDR are complementary and both are necessary in today's modern IT environment. In this article,...
Creating a culture of cyber security excellence
Creating a culture of cyber security excellenceEdwin Doyle, Global Cyber Security Strategist, Check Point Software. One of the greatest challenges for a CISO today is working...
Compliance Certifications: Worth the Effort?
Compliance Certifications: Worth the Effort?Because demonstrating compliance with industry regulations can be cumbersome and expensive, it's important to ensure they're also absolutely essential.Leer másDark ReadingBecause demonstrating...
Deepfence ThreatMapper 1.4 Unveils Open Source Threat Graph to Visualize Cloud-Native Threat Landscape
Deepfence ThreatMapper 1.4 Unveils Open Source Threat Graph to Visualize Cloud-Native Threat LandscapeNew release also includes enterprise-grade cloud security posture management (CSPM) and YARA-based malware scanning...
dnsrecon v1.1.2 releases: DNS Enumeration Script
dnsrecon v1.1.2 releases: DNS Enumeration ScriptDNSRecon DNSRecon is a Python port of a Ruby script that I wrote to learn the language and about DNS... The...
Washington Doctor Might Plead Guilty in Murder For Hire Case
Washington Doctor Might Plead Guilty in Murder For Hire CaseA neonatologist who allegedly tried to hire a hitman on the darkweb to kidnap his wife and...
Cirrusgo – A Fast Tool To Scan SAAS, PAAS App Written In Go
Cirrusgo – A Fast Tool To Scan SAAS, PAAS App Written In GoA fast tool to scan SAAS,PAAS App written in Go SAAS App Support :...
7 actionable CISO strategies for effective executive-level communication
7 actionable CISO strategies for effective executive-level communicationEXECUTIVE SUMMARY: At this point, the value of cyber security should be readily apparent to Board members and executive...
Counterfeit Euro Use in Germany Is on the Decline
Counterfeit Euro Use in Germany Is on the DeclineThe number of counterfeit banknotes in circulation in Germany fell to the lowest since 2013. According to Germany’s...
Bugcrowd Taps Top Hackers for Live Hacking Event with Indeed at 2022 Black Hat Conference
Bugcrowd Taps Top Hackers for Live Hacking Event with Indeed at 2022 Black Hat Conference.Leer másDark Reading.
RedGuard: C2 front flow control tool to avoid Blue Teams, AVs, EDRs check
RedGuard: C2 front flow control tool to avoid Blue Teams, AVs, EDRs checkRedGuard – Excellent C2 Front Flow Control tool RedGuard is a derivative work of...
OPSWAT Presents New Malware Analysis Capabilities for Operational Technology at Black Hat USA 2022
OPSWAT Presents New Malware Analysis Capabilities for Operational Technology at Black Hat USA 2022Product enhancements to offer full IT and OT threat intelligence services for OPSWAT...
Three Sentenced for Operating the "Reboot” Store on Hydra
Three Sentenced for Operating the "Reboot” Store on HydraThree drug dealers were sentenced to prison in Russia for operating a store on the Hydra darkweb marketplace....
Mimecast Announces Mimecast X1™ Platform Providing Customers With Email and Collaboration Security
Mimecast Announces Mimecast X1™ Platform Providing Customers With Email and Collaboration SecurityPlatform engineered to let organizations mitigate risk and manage complexities.Leer másDark ReadingPlatform engineered to let...