FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdaySecurity

Reddit Hack Shows Limits of MFA, Strengths of Security Training

A tailored spear-phishing attack successfully convinced a Reddit employee to hand over their credentials and their one-time password, but soon after, the same worker notified security.

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

The US Treasury Department linked the notorious cybercrime gang to Russian Intelligence Services because cyberattacks that disrupted hospitals and other critical infrastructure align with Russian state interests.

MagicWeb Mystery Highlights Nobelium Attacker's Sophistication

The authentication bypass used by the Nobelium group, best known for the supply chain attack on SolarWinds, required a massive, real-time investigation to uncover, Microsoft says.

Reddit admits it was hacked and data stolen, says “Don’t panic”

Reddit is suggesting three tips as a follow-up to this breach. We agree with two of them but not with the third...

Malicious Game Mods Target Dota 2 Game Users

Valve's unpatched JavaScript engine and incomplete modification vetting process for Steam-delivered mods led to user systems being backdoored.

Attacker Allure: A Look at the Super Bowl's Operational Cyber-Risks

Event organizers should be exercising various cyberattack scenarios to ensure they have the proper checks and balances in place to respond accordingly and maintain resilience.

Google Cloud Connects Chronicle to Health ISAC Feed

Members of the Health-ISAC can ingest threat indicators directly into Chronicle to investigate whether the threat is present in their environment.

Reddit Breached With Stolen Employee Credentials

Reddit code, internal documents, dashboards, and business systems were compromised in the cyberattack.

How Do Playbooks Help CISOs Improve SecOps?

Extended detection and response (XDR) solutions have evolved to offer automated tools, such as playbooks, that enhance context and response.

NewsPenguin Goes Phishing for Maritime & Military Secrets

A sophisticated cyber-espionage attack against high-value targets attending a maritime technology conference in Pakistan this weekend has been in the works since last year.

4 Ways to Handle AI Decision-Making in Cybersecurity

As evolving cyber threats force security teams to adopt AI to automate workflows, we ask how the relationship between humans and AI will pan out.

Avast Threat Report: Consumers Plagued With Refund Fraud, Tech Support Scams, and Adware

Avast researchers also discovered and reported two zero-day vulnerabilities, and observed the spread of information-stealing malware, remote access trojans, and botnets.

7 Critical Cloud Threats Facing the Enterprise in 2023

From shadow data to misconfigurations, and overpermissioning to multicloud sprawl, Dark Reading's cloud security slideshow helps security pros understand the threat horizon.

Kaspersky Finds Growing Number of Parents Experiencing Ransomware Attacks on Children's Schools

Schools paying higher ransoms and seeing longer closures, according to survey of parents.

Cryptographers Decode Secret Letters of Mary, Queen of Scots

Nearly a half-millennium after her execution, encrypted letters from the imprisoned royal offer a fascinating look into early cryptography.

Phishing Surges Ahead, as ChatGPT & AI Loom

AI and phishing-as-a-service (PaaS) kits are making it easier for threat actors to create malicious email campaigns, which continue to target high-volume applications using popular brand names.

NIST Picks IoT Standard for Small Electronics Cybersecurity

NIST announces that it will use Ascon as a cryptography standard for lightweight IoT device protection.

In Perfect Harmony: Cybersecurity Regulation Harmonization

By simplifying compliance management, security and risk teams can focus on managing operational risk, not compliance risk — and better counter threats.

Twitter Implements API Paywall, but Will That Solve Its Enormous Bot Crisis?

Restricting the Twitter API will have implications across Twitter, the broader Internet, and society, experts say. Is there a cybersecurity silver lining, or will threat actors pay to play?

Lessons From the Cold War: How Quality Trumps Quantity in Cybersecurity

High-quality tools and standards remain critical components in cybersecurity efforts even as budgets decline. It's important that staff knows response procedures and their roles, and also communicates well.

CISA Releases Recovery Script for Victims of ESXiArgs Ransomware

The malware has affected thousands of VMware ESXi hypervisors in the last few days.

Jailbreak Trick Breaks ChatGPT Content Safeguards

Jailbreak command creates ChatGPT alter ego DAN, willing to create content outside of its own content restriction controls.

Building Up IAM in a Multicloud World

In the cloud-first world, the security goal is to ensure only qualified users can access information across clouds.

Exclu Shutdown Underscores Outsized Role Messaging Apps Play in Cybercrime

Apps like Telegram, WhatsApp, and Discord are a hotbed of cybercriminal communication and scams.

ActZero Unveils Next-Generation MDR Platform

Latest release gives small and mid-sized enterprises AI-driven analysis tools and unified visibility across IT environments for stronger ransomware protection.

Skybox Security Appoints Cybersecurity Veteran Mordecai Rosen as CEO

Skybox closes $50 million in financing to drive growth of its SaaS-based security platform.

SecuriThings Brings Managed Service Capabilities to Physical Security, With New Managed Service Platform

Platform opens new opportunities for managed service providers to manage, visualize, and secure customer devices from a single pane of glass, including automated maintenance and other operations.

GAO Calls for Action to Protect Cybersecurity of Critical Energy, Communications Networks

Enhanced industrial control systems cybersecurity for energy and communications sector among top recommendations in new GAO cybersecurity assessment.

Gigamon Exits NDR Market, Sells ThreatInsight Business to Fortinet

Omdia has learned that Gigamon sold its ThreatInsight NDR business to Fortinet for approximately $31 million. The deal highlights what may be a pivot point for the NDR market.

Toyota Global Supply Chain Portal Flaw Put Hacker in the Driver's Seat

The automaker closed a hole that allowed a security researcher to gain system administrator access to more than 14,000 corporate and partner accounts and troves of sensitive data.

It Isn't Time to Worry About Quantum Computing Just Yet

Don't let something that's a decade away distract you from today's cyber threats.

Why ChatGPT Isn't a Death Sentence for Cyber Defenders

Generative AI combined with user awareness training creates a security alliance that can let organizations work protected from ChatGPT.

Why Some Cloud Services Vulnerabilities Are So Hard to Fix

Five months after AWS customers were alerted about three vulnerabilities, nearly none had plugged the holes. The reasons why underline a need for change.

How to Optimize Your Cyber Insurance Coverage

From prevention and detection processes to how you handle policy information, having strong cyber insurance coverage can help mitigate cybersecurity attacks.

OpenSSL fixes High Severity data-stealing bug – patch now!

7 memory mismanagements and a timing attack. We explain all the jargon bug terminology in plain English...

❌