FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ WeLiveSecurity

Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe

By: Editor — July 14th 2023 at 15:30

Here's how cybercriminals have adjusted their tactics in response to Microsoft's stricter security policies and other interesting findings from ESET's new Threat Report

The post Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Emotet: sold or on vacation? – Week in security with Tony Anscombe

By: Editor — July 7th 2023 at 11:00

Originally a banking trojan, Emotet later evolved into a full-blown botnet and went on to become one of the most dangerous cyberthreats worldwide

The post Emotet: sold or on vacation? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

By: Editor — June 30th 2023 at 13:15

The growing use of synthetic media and difficulties in distinguishing between real and fake content raises a slew of legal and ethical questions

The post The good, the bad and the ugly of AI – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What to know about the MOVEit hack – Week in security with Tony Anscombe

By: Editor — June 23rd 2023 at 13:30

The US government has now announced a bounty of $10 million for intel linking the Cl0p ransomware gang to a foreign government

The post What to know about the MOVEit hack – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Is a RAT stealing your files? – Week in security with Tony Anscombe

By: Editor — June 16th 2023 at 15:20

Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other shenanigans?

The post Is a RAT stealing your files? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

By: Editor — June 9th 2023 at 12:30

A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities

The post Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

API security in the spotlight – Week in security with Tony Anscombe

By: Editor — June 2nd 2023 at 12:30

Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought.

The post API security in the spotlight – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

By: Editor — May 26th 2023 at 14:15

ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool

The post How an innocuous app morphed into a trojan – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The real cost of a free lunch – Week in security with Tony Anscombe

By: Editor — May 19th 2023 at 12:30

Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for

The post The real cost of a free lunch – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Key findings from ESET’s new APT Activity Report – Week in security with Tony Anscombe

By: Editor — May 12th 2023 at 15:15

What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?

The post Key findings from ESET’s new APT Activity Report – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

APTs target MSP access to customer networks – Week in security with Tony Anscombe

By: Editor — May 5th 2023 at 14:00

The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers

The post APTs target MSP access to customer networks – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

By: Editor — April 28th 2023 at 14:30

The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated

The post What was hot at RSA Conference 2023? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

By: Editor — April 21st 2023 at 10:00

Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks

The post Did you mistakenly sell your network access? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Hunting down BlackLotus – Week in security with Tony Anscombe

By: Editor — April 14th 2023 at 11:00

Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers

The post Hunting down BlackLotus – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What are the cybersecurity concerns of SMBs by sector?

By: Editor — April 12th 2023 at 09:30

Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured

The post What are the cybersecurity concerns of SMBs by sector? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Steer clear of tax scams – Week in security with Tony Anscombe

By: Editor — April 6th 2023 at 14:15

In a rush to file your taxes? Watch out for cybercriminals preying on stressed taxpayers as Tax Day looms large on the horizon.

The post Steer clear of tax scams – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Avoiding data backup failures – Week in security with Tony Anscombe

By: Editor — March 31st 2023 at 13:00

Today is World Backup Day, but maybe we also need a "did you test your backups" day?

The post Avoiding data backup failures – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Highlights from TikTok CEO’s Congress grilling – Week in security with Tony Anscombe

By: Editor — March 24th 2023 at 15:50

Here are some of the key moments from the five hours of Shou Zi Chew's testimony and other interesting news on the data privacy front

The post Highlights from TikTok CEO’s Congress grilling – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Banking turmoil opens opportunities for fraud – Week in security with Tony Anscombe

By: Editor — March 17th 2023 at 15:30

Scammers are looking to cash in on the chaos that has set in following the startling meltdowns of Silicon Valley Bank and Signature Bank and the crisis at Credit Suisse

The post Banking turmoil opens opportunities for fraud – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

APT hackers set a honeytrap to ensnare victims – Week in security with Tony Anscombe

By: Editor — March 10th 2023 at 14:00

A request to move an online conversation to a supposedly more secure platform may not be as well-meaning as it sounds

The post APT hackers set a honeytrap to ensnare victims – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ Dark Reading:

Entitle Brings Fine-Grained Cloud Permissions Management Out of Stealth

By: Karen Spiegelman, Features Editor — February 22nd 2023 at 20:30
The platform uses no-code policy workflows to automate the provisioning and revoking of permissions.

☐ ☆ ✇ Dark Reading:

Google Delivers Record-Breaking $12M in Bug Bounties

By: Tara Seals, Managing Editor, News, Dark Reading — February 22nd 2023 at 17:50
Google's Android and Chrome Vulnerability Reward Programs (VRPs) in particular saw hundreds of valid reports and payouts for security vulnerabilities discovered by ethical hackers.

☐ ☆ ✇ Dark Reading:

Google Translate Helps BEC Groups Scam Companies in Any Language

By: Becky Bracken, Editor, Dark Reading — February 17th 2023 at 21:00
BEC gangs Midnight Hedgehog and Mandarin Capybara show how online marketing and translation tools are making it easy for these threat groups to scale internationally.

☐ ☆ ✇ Dark Reading:

Descope Handles Authentication So Developers Don't Have To

Developers don't have to build authentication and user management from scratch, and can devote their energies to the core functions of the application, instead.

☐ ☆ ✇ Dark Reading:

OT Network Security Myths Busted in a Pair of Hacks

How newly exposed security weaknesses in industrial wireless, cloud-based interfaces, and nested PLCs serve as a wake-up call for hardening the physical process control layer of the OT network.

☐ ☆ ✇ Dark Reading:

Dark Web Revenue Down Dramatically After Hydra's Demise

By: Becky Bracken, Editor, Dark Reading — February 13th 2023 at 22:51
Competitor markets working to replace Hydra's money-laundering services for cybercriminals.

☐ ☆ ✇ Dark Reading:

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

By: Tara Seals, Managing Editor, News, Dark Reading — February 10th 2023 at 19:25
The US Treasury Department linked the notorious cybercrime gang to Russian Intelligence Services because cyberattacks that disrupted hospitals and other critical infrastructure align with Russian state interests.

☐ ☆ ✇ Dark Reading:

Building Up IAM in a Multicloud World

By: Karen Spiegelman, Features Editor — February 8th 2023 at 21:37
In the cloud-first world, the security goal is to ensure only qualified users can access information across clouds.

☐ ☆ ✇ Dark Reading:

Why Some Cloud Services Vulnerabilities Are So Hard to Fix

By: Karen Spiegelman, Features Editor — February 8th 2023 at 13:00
Five months after AWS customers were alerted about three vulnerabilities, nearly none had plugged the holes. The reasons why underline a need for change.

☐ ☆ ✇ Dark Reading:

Crypto Drainers Are Ready to Ransack Investor Wallets

By: Becky Bracken, Editor, Dark Reading — February 6th 2023 at 22:20
Cryptocurrency drainers are the latest hot ticket being used in a string of lucrative cyberattacks aimed at virtual currency investors.

☐ ☆ ✇ Dark Reading:

Critical VMware RCE Vulnerabilities Targeted by Public Exploit Code

Security vulnerabilities in VMware's vRealize Log Insight platform can be chained together to offer a cybercriminals a gaping hole to access corporate crown jewels.

☐ ☆ ✇ Dark Reading:

10M JD Sports Customers' Info Exposed in Data Breach

By: Becky Bracken, Editor, Dark Reading — January 30th 2023 at 21:17
UK sportswear retailer asks exposed customers to stay "vigilant" against phishing attempts following cyberattack.

☐ ☆ ✇ Dark Reading:

Enterprises Need to Do More to Assure Consumers About Privacy

By: Edge Editors, Dark Reading — January 27th 2023 at 22:00
Organizations care about data privacy, but their priorities appear to be different from what their customers think are important.

☐ ☆ ✇ Dark Reading:

Why Most Companies Still Don’t Know What’s on Their Network

By: Terry Sweeney, Contributing Editor — January 27th 2023 at 21:00
Chris Kirsch, CEO of runZero, sits down with Dark Reading’sTerry Sweeney for a Fast Chat on the importance of asset discovery.

☐ ☆ ✇ Dark Reading:

A Child's Garden of Cybersecurity

By: Karen Spiegelman, Features Editor — January 26th 2023 at 22:02
Whether you dream of your child becoming a CISO or just want them to improve their security hygiene, consider this roundup of literary geekery.

☐ ☆ ✇ Dark Reading:

Hive Ransomware Gang Loses Its Honeycomb, Thanks to DoJ

The US Department of Justice hacked into Hive's infrastructure, made off with hundreds of decryptors, and seized the gang's operations.

☐ ☆ ✇ Dark Reading:

Ticketmaster Blames Bots in Taylor Swift 'Eras' Tour Debacle

By: Becky Bracken, Editor, Dark Reading — January 24th 2023 at 22:02
Ticketmaster testified in the Senate that a cyberattack was to blame for the high-profile Taylor Swift concert sales collapse, but some senators aren't so sure.

☐ ☆ ✇ Dark Reading:

T-Mobile Breached Again, This Time Exposing 37M Customers' Data

By: Becky Bracken, Editor, Dark Reading — January 20th 2023 at 21:37
This time around, weak API security allowed a threat actor to access account information, the mobile phone giant reported.

☐ ☆ ✇ Dark Reading:

Compromised Zendesk Employee Credentials Lead to Breach

By: Becky Bracken, Editor, Dark Reading — January 20th 2023 at 21:10
Zendesk has alerted customers to a successful SMS phishing campaign that has exposed "service data," but details remain scarce.

☐ ☆ ✇ Dark Reading:

GPT Emerges as Key AI Tech for Security Vendors

Orca Security is one of the companies integrating conversational AI technology into its products.

☐ ☆ ✇ Dark Reading:

PayPal Breach Exposed PII of Nearly 35K Accounts

By: Becky Bracken, Editor, Dark Reading — January 20th 2023 at 00:20
The credential-stuffing attack, likely fueled by password reuse, yielded personal identifiable information that can be used to verify the authenticity of previously stolen data.

☐ ☆ ✇ Dark Reading:

Microsoft Addresses Zero-Days, but Exchange Server Exploit Chain Remains Unpatched

The computing giant didn't fix ProxyNotLogon in October's Patch Tuesday, but it disclosed a rare 10-out-of-10 bug and patched two other zero-days, including one being exploited.

☐ ☆ ✇ Dark Reading:

High-Value Targets: String of Aussie Telco Breaches Continues

By: Becky Bracken, Editor, Dark Reading — October 11th 2022 at 14:01
Australian IT services provider Dialog has announced a breach, making it the third telecom company in the area compromised in less than a month.

☐ ☆ ✇ Dark Reading:

Credential Harvesting Is Retail Industry's Top Threat

By: Edge Editors, Dark Reading — October 7th 2022 at 22:52
Why bother with new tactics and exploits when the old tricks are still effective?

☐ ☆ ✇ Dark Reading:

Hackers Have It Out for Microsoft Email Defenses

Cybercriminals are focusing more and more on crafting special email attacks that evade Microsoft Defender and Office security.

☐ ☆ ✇ Dark Reading:

Relentless Russian Cyberattacks on Ukraine Raise Important Policy Questions

Microsoft cybersecurity executive John Hewie explained cyberwar developments and what they mean for Western democratic policy going forward.

☐ ☆ ✇ Dark Reading:

Growing Reliance on Cloud Brings New Security Challenges

With organizations expanding their cloud operations, cloud security is imperative to protect applications and data.

☐ ☆ ✇ Dark Reading:

The Insecurities of Cybersecurity Success

By: Edge Editors, Dark Reading — October 4th 2022 at 22:35
Becoming a big wheel doesn't have to cost your happiness, but grind culture makes that likely.

☐ ☆ ✇ Dark Reading:

Vice Society Publishes LA Public School Student Data, Psych Evals

By: Becky Bracken, Editor, Dark Reading — October 3rd 2022 at 20:21
After a flat refusal to pay the ransom, Los Angeles Unified School District's stolen data has been dumped on the Dark Web by a ransomware gang.

☐ ☆ ✇ Dark Reading:

LA School District Ransomware Attackers Now Threaten to Leak Stolen Data

By: Becky Bracken, Editor, Dark Reading — September 30th 2022 at 20:31
Weeks after it breached the Los Angeles Unified School District, the Vice Society ransomware group is threatening to leak the stolen data, unless they get paid.

☐ ☆ ✇ Dark Reading:

Microsoft Confirms Pair of Blindsiding Exchange Zero-Days, No Patch Yet

By: Tara Seals, Managing Editor, News, Dark Reading — September 30th 2022 at 16:24
The "ProxyNotShell" security vulnerabilities can be chained for remote code execution and total takeover of corporate email platforms.

☐ ☆ ✇ Dark Reading:

The Country Where You Live Impacts Password Choices

By: Tara Seals, Managing Editor, News, Dark Reading — September 29th 2022 at 20:32
Literacy, levels of personal freedom, and other macro-social factors help determine how strong average passwords are in a given locale, researchers have found.

☐ ☆ ✇ Dark Reading:

Capital One Phish Showcases Growing Bank-Brand Targeting Trend

By: Becky Bracken, Editor, Dark Reading — September 29th 2022 at 14:42
Capital One lures leveraged the bank's new partnership with Authentify, showing that phishers watch the headlines, and take advantage.

☐ ☆ ✇ Dark Reading:

XSS Flaw in Prevalent Media Imaging Tool Exposes Trove of Patient Data

By: Becky Bracken, Editor, Dark Reading — September 29th 2022 at 13:37
Bugs in Canon Medical's Virea View could allow cyberattackers to access several sources of sensitive patient data.

☐ ☆ ✇ Dark Reading:

Fast Company CMS Hack Raises Security Questions

By: Tara Seals, Managing Editor, News, Dark Reading — September 28th 2022 at 20:12
The company's website remains offline after hackers used its compromised CMS to send out racist messages.

☐ ☆ ✇ Dark Reading:

Lazarus Lures Aspiring Crypto Pros With Fake Exchange Job Postings

By: Becky Bracken, Editor, Dark Reading — September 27th 2022 at 21:40
Previously observed using fake Coinbase jobs, the North Korea-sponsored APT has expanded into using Crypo.com gigs as cover to distribute malware.

☐ ☆ ✇ Dark Reading:

Amid Sweeping Change, Cyber Defenders Face Escalating Visibility — and Pressure

By: Tara Seals, Managing Editor, News, Dark Reading — September 27th 2022 at 21:27
Why cyber teams are now front and center for business enablement within organizations, and the significant challenges they face.

☐ ☆ ✇ Dark Reading:

Russia Planning Cyberattacks on Ukraine's Energy Grid

By: Becky Bracken, Editor, Dark Reading — September 26th 2022 at 18:32
Ukraine military intelligence says Russia is planning cyberattacks on the country's energy sector, as well as against allies including Poland and the Baltic states.

☐ ☆ ✇ Dark Reading:

How Quantum Physics Leads to Decrypting Common Algorithms

By: Karen Spiegelman, Features Editor — September 26th 2022 at 14:00
YouTuber minutephysics explains how Shor's algorithm builds on existing formulae like Euclid's algorithm and Fourier transforms to leverage quantum superpositioning and break encryption.

☐ ☆ ✇ Dark Reading:

Malicious Apps With Millions of Downloads Found in Apple App Store, Google Play

By: Becky Bracken, Editor, Dark Reading — September 23rd 2022 at 20:04
The ongoing ad fraud campaign can be traced back to 2019, but recently expanded into the iOS ecosystem, researchers say.

❌