FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ Dark Reading:

Half of Apps Have High-Risk Vulnerabilities Due to Open Source

By: Robert Lemos, Contributing Writer, Dark Reading — February 22nd 2023 at 20:40
Open source software dependencies are affecting the software security of different industries in different ways, with mature industries becoming more selective in their open source usage.

☐ ☆ ✇ Dark Reading:

Phishing Fears Ramp Up on Email, Collaboration Platforms

By: Robert Lemos, Contributing Writer, Dark Reading — February 22nd 2023 at 17:55
It's a banner year for attacks coming through traditional email as well as newer collaboration technologies, such as Slack and Microsoft Teams. What's next?

☐ ☆ ✇ Dark Reading:

Cyberthreats, Regulations Mount for Financial Industry

By: Robert Lemos, Contributing Writer, Dark Reading — February 21st 2023 at 18:45
Nation-state adversaries, new reporting regulations, and a fast-paced threat landscape mean that financial services and technology firms need to bolster their security posture.

☐ ☆ ✇ Dark Reading:

Researchers Create an AI Cyber Defender That Reacts to Attackers

By: Robert Lemos, Contributing Writer, Dark Reading — February 20th 2023 at 14:00
Based on deep reinforcement learning, the system can adapt to defenders' tactics and stop 95% of simulated attacks, according to its developers.

☐ ☆ ✇ Dark Reading:

Cybersecurity Jobs Remain Secure Despite Recession Fears

By: Robert Lemos, Contributing Writer, Dark Reading — February 16th 2023 at 19:34
Only 10% of corporate executives expect to lay off members of cybersecurity teams in 2023, much lower than other areas, as companies protect hard-to-find skill sets.

☐ ☆ ✇ Dark Reading:

ChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally

By: Robert Lemos, Contributing Writer, Dark Reading — February 15th 2023 at 22:50
Incident response triage and software vulnerability discovery are two areas where the large language model has demonstrated success, although false positives are common.

☐ ☆ ✇ Dark Reading:

NIST's New Crypto Standard a Step Forward in IoT Security

By: Robert Lemos, Contributing Writer, Dark Reading — February 15th 2023 at 15:30
The National Institute of Standards and Technology has settled on a standard for encrypting Internet of Things (IoT) communications, but many devices remain vulnerable and unpatched.

☐ ☆ ✇ Dark Reading:

Reddit Hack Shows Limits of MFA, Strengths of Security Training

By: Robert Lemos, Contributing Writer, Dark Reading — February 10th 2023 at 21:36
A tailored spear-phishing attack successfully convinced a Reddit employee to hand over their credentials and their one-time password, but soon after, the same worker notified security.

☐ ☆ ✇ Dark Reading:

MagicWeb Mystery Highlights Nobelium Attacker's Sophistication

By: Robert Lemos, Contributing Writer, Dark Reading — February 10th 2023 at 18:21
The authentication bypass used by the Nobelium group, best known for the supply chain attack on SolarWinds, required a massive, real-time investigation to uncover, Microsoft says.

☐ ☆ ✇ Dark Reading:

Backdoor in Dingo Cryptocurrency Allows Creator to Steal (Nearly) Everything

By: Robert Lemos, Contributing Writer, Dark Reading — February 7th 2023 at 17:44
A tax variable in the software implementing the Dingo Token allows the creators to charge 99% in fees per transaction, essentially stealing funds, an analysis finds.

☐ ☆ ✇ Dark Reading:

Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally

By: Robert Lemos, Contributing Writer, Dark Reading — February 2nd 2023 at 20:53
The Russia-linked LockBit ransomware group claims to be behind the attack that fouled automated transactions for dozens of clients of financial technology firm ION Group.

☐ ☆ ✇ Dark Reading:

Nearly All Firms Have Ties With Breached Third Parties

By: Robert Lemos, Contributing Writer, Dark Reading — February 1st 2023 at 22:12
The average organization does business with 11 third parties, and 98% of organizations do business with a third party who has suffered a breach, an analysis finds.

☐ ☆ ✇ Dark Reading:

Firmware Flaws Could Spell 'Lights Out' for Servers

By: Robert Lemos, Contributing Writer, Dark Reading — January 31st 2023 at 22:35
Five vulnerabilities in the baseboard management controller (BMC) software used by 15 major vendors could allow remote code execution if attackers gain network access.

☐ ☆ ✇ Dark Reading:

Cybercrime Ecosystem Spawns Lucrative Underground Gig Economy

By: Robert Lemos, Contributing Writer, Dark Reading — January 30th 2023 at 21:52
The complex nature of cyberattacks has increased demand for software developers, reverse engineers, and offensive specialists — attracting workers facing financial insecurity.

☐ ☆ ✇ Dark Reading:

Long Con Impersonates Financial Advisers to Target Victims

By: Robert Lemos, Contributing Writer, Dark Reading — January 30th 2023 at 16:45
Cybercriminals are co-opting the identities of legitimate US financial advisers to use them as fodder for relationship scams (aka "pig butchering"), which end with the theft of investments.

☐ ☆ ✇ Dark Reading:

Riot Games Latest Video-Game Maker to Suffer Breach

By: Robert Lemos, Contributing Writer, Dark Reading — January 26th 2023 at 22:25
Highlighting continued attacks on game developers, attackers stole source code from and issued a ransom demand to the maker of League of Legends.

☐ ☆ ✇ Dark Reading:

Companies Struggle With Zero Trust as Attackers Adapt to Get Around It

By: Robert Lemos, Contributing Writer, Dark Reading — January 26th 2023 at 17:36
Only one in 10 enterprises will create a robust zero-trust foundation in the next three years, while more than half of attacks won't even be prevented by it, according to Gartner.

☐ ☆ ✇ Dark Reading:

Microsoft Azure-Based Kerberos Attacks Crack Open Cloud Accounts

By: Robert Lemos, Contributing Writer, Dark Reading — January 25th 2023 at 22:17
Two common attacks against on-premises Kerberos authentication servers — known as Pass the Ticket and Silver Ticket — can be used against Microsoft's Azure AD Kerberos, a security firms says.

☐ ☆ ✇ Dark Reading:

Microsoft to Block Excel Add-ins to Stop Office Exploits

By: Robert Lemos, Contributing Writer, Dark Reading — January 24th 2023 at 15:59
The company will block the configuration files, which interact with Web applications — since threat actors increasingly use the capability to install malicious code.

☐ ☆ ✇ Dark Reading:

EmojiDeploy Attack Chain Targets Misconfigured Azure Service

By: Robert Lemos, Contributing Writer, Dark Reading — January 19th 2023 at 23:14
Multiple misconfigurations in a service that underpins many Azure features could have allowed an attacker to remotely compromise a cloud user's system.

☐ ☆ ✇ Dark Reading:

Vulnerable Historian Servers Imperil OT Networks

By: Robert Lemos, Contributing Writer, Dark Reading — January 18th 2023 at 22:04
These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks.

☐ ☆ ✇ Dark Reading:

Dependency Management Aims to Make Security Easier

By: Robert Lemos, Contributing Writer, Dark Reading — October 11th 2022 at 15:17
Existing software security firms and new startups tackle the tasks of exposing dependencies and helping developers manage their use of open-source components.

☐ ☆ ✇ Dark Reading:

Emotet Rises Again With More Sophistication, Evasion

By: Robert Lemos, Contributing Writer, Dark Reading — October 10th 2022 at 20:35
An analysis of the malware and its infection strategies finds nearly 21,000 minor and 139 major variations on the malware — complexity that helps it dodge analysis.

☐ ☆ ✇ Dark Reading:

Email Defenses Under Siege: Phishing Attacks Dramatically Improve

By: Robert Lemos, Contributing Writer, Dark Reading — October 8th 2022 at 13:00
About 1 in 5 phishing email messages reach workers' inboxes, as attackers get better at dodging Microsoft's platform defenses and defenders run into processing limitations.

☐ ☆ ✇ Dark Reading:

CISA: Multiple APT Groups Infiltrate Defense Organization

By: Robert Lemos, Contributing Writer, Dark Reading — October 5th 2022 at 19:25
Advanced attackers gained access to Microsoft Exchange services, conducted searches of email, and used an open source toolkit to collect data from the network for nearly a year.

☐ ☆ ✇ Dark Reading:

Exposure Management? Understanding the Attacker Takes Center Stage

By: Robert Lemos, Contributing Writer, Dark Reading — October 4th 2022 at 21:48
Announcing its exposure management platform, Tenable joins other companies in offering ways — such as attack surface management — to look at business networks through the eyes of attackers.

☐ ☆ ✇ Dark Reading:

First 72 Hours of Incident Response Critical to Taming Cyberattack Chaos

By: Robert Lemos, Contributing Writer, Dark Reading — October 3rd 2022 at 20:51
Responding to cyberattacks is extraordinarily stressful, but better planning, frequent practice, and the availability of mental health services can help IR professionals, a survey finds.

☐ ☆ ✇ Dark Reading:

Cybercriminals See Allure in BEC Attacks Over Ransomware

By: Robert Lemos, Contributing Writer, Dark Reading — September 30th 2022 at 18:44
While ransomware seems stalled, business email compromise (BEC) attacks continue to make profits from the ProxyShell and Log4j vulnerabilities, nearly doubling in the latest quarter.

☐ ☆ ✇ Dark Reading:

Google Cloud DORA: Securing the Supply Chain Begins With Culture

By: Robert Lemos, Contributing Writer, Dark Reading — September 28th 2022 at 19:47
The team's annual survey finds that the right development culture is better than technical measures when it comes to shoring up software supply chain security practices. An additional benefit: Less burnout.

☐ ☆ ✇ Dark Reading:

Most Attackers Need Less Than 10 Hours to Find Weaknesses

By: Robert Lemos, Contributing Writer, Dark Reading — September 28th 2022 at 10:00
Vulnerable configurations, software flaws, and exposed Web services allow hackers to find exploitable weaknesses in companies' perimeters in just hours, not days.

☐ ☆ ✇ Dark Reading:

Fake Sites Siphon Millions of Dollars in 3-Year Scam

By: Robert Lemos, Contributing Writer, Dark Reading — September 27th 2022 at 12:00
A crime syndicate based in Russia steals millions of dollars from credit card companies using fake dating and porn sites on hundreds of domains to rack up fraudulent charges.

☐ ☆ ✇ Dark Reading:

App Developers Increasingly Targeted via Slack, DevOps Tools

By: Robert Lemos, Contributing Writer, Dark Reading — September 23rd 2022 at 20:19
Slack, Docker, Kubernetes, and other applications that allow developers to collaborate have become the latest vector for software supply chain attacks.

☐ ☆ ✇ Dark Reading:

Microsoft Looks to Enable Practical Zero-Trust Security With Windows 11

By: Robert Lemos, Contributing Writer, Dark Reading — September 23rd 2022 at 13:00
With the update, Microsoft adds features to allow easier deployment of zero-trust capabilities. Considering the 1.3 billion global Windows users, the support could make a difference.

☐ ☆ ✇ Dark Reading:

Data Scientists Dial Back Use of Open Source Code Due to Security Worries

By: Robert Lemos, Contributing Writer, Dark Reading — September 21st 2022 at 18:00
Data scientists, who often choose open source packages without considering security, increasingly face concerns over the unvetted use of those components, new study shows.

☐ ☆ ✇ Dark Reading:

Rockstar Games Confirms 'Grand Theft Auto 6' Breach

By: Robert Lemos, Contributing Writer, Dark Reading — September 19th 2022 at 21:01
The Take-Two Interactive subsidiary acknowledges an attack on its systems, where an attacker downloaded "early development footage for the next Grand Theft Auto" and other assets.

☐ ☆ ✇ Dark Reading:

Note to Security Vendors: Companies Are Picking Favorites

By: Robert Lemos, Contributing Writer, Dark Reading — September 15th 2022 at 20:31
A stunning three-quarters of companies are looking to consolidate their security products this year, up from 29% in 2020, suggesting fiercer competition among cybersecurity vendors.

☐ ☆ ✇ Dark Reading:

Token-Mining Weakness in Microsoft Teams Makes for Perfect Phish

By: Robert Lemos, Contributing Writer, Dark Reading — September 15th 2022 at 13:00
Access tokens for other Teams users can be recovered, allowing attackers to move from a single compromise to the ability to impersonate critical employees, but Microsoft isn't planning to patch.

☐ ☆ ✇ Dark Reading:

Cyberattacks Are Now Increasingly Hands-On, Break Out More Quickly

By: Robert Lemos, Contributing Writer, Dark Reading — September 14th 2022 at 14:00
Interactive intrusion campaigns jumped nearly 50%, while the breakout time between initial access and lateral movement shrank to less than 90 minutes, putting pressure on defenders to react quickly.

☐ ☆ ✇ Dark Reading:

Attackers Can Compromise Most Cloud Data in Just 3 Steps

By: Robert Lemos, Contributing Writer, Dark Reading — September 13th 2022 at 13:00
An analysis of cloud services finds that known vulnerabilities typically open the door for attackers, while insecure cloud architectures allow them to gain access to the crown jewels.

☐ ☆ ✇ Dark Reading:

Microsoft, Cloud Providers Move to Ban Basic Authentication

By: Robert Lemos, Contributing Writer, Dark Reading — September 9th 2022 at 14:29
Microsoft moves ahead with a plan to sunset basic authentication, and other providers are moving — or have moved — to requiring more secure authentication as well. Is your company ready?

☐ ☆ ✇ Dark Reading:

Mysterious 'Worok' Group Launches Spy Effort With Obfuscated Code, Private Tools

By: Robert Lemos, Contributing Writer, Dark Reading — September 6th 2022 at 20:44
The threat actor — whose techniques and procedures do not match known groups — has created custom attack tools, including a program that hides scripts in .PNG images.

☐ ☆ ✇ Dark Reading:

Raspberry Robin Malware Connected to Russian Evil Corp Gang

By: Robert Lemos, Contributing Writer, Dark Reading — September 2nd 2022 at 16:52
Infections attributed to the USB-based worm have taken off, and now evidence links the malware to Dridex and the sanctioned Russian cybercriminal group Evil Corp.

☐ ☆ ✇ Dark Reading:

Skyrocketing IoT Bug Disclosures Put Pressure on Security Teams

By: Robert Lemos, Contributing Writer, Dark Reading — September 1st 2022 at 19:49
The expanding Internet of Things ecosystem is seeing a startling rate of vulnerability disclosures, leaving companies with a greater need for visibility into and patching of IoT devices.

☐ ☆ ✇ Dark Reading:

Google Expands Bug Bounties to Its Open Source Projects

By: Robert Lemos, Contributing Writer, Dark Reading — August 30th 2022 at 13:33
The search engine giant's Vulnerability Rewards Program now covers any Google open source software projects — with a focus on critical software such as Go and Angular.

☐ ☆ ✇ Dark Reading:

Cyber-Insurance Firms Limit Payouts, Risk Obsolescence

By: Robert Lemos, Contributing Writer, Dark Reading — August 29th 2022 at 14:34
Businesses need to re-evaluate their cyber-insurance policies as firms like Lloyd's of London continue to add restrictions, including excluding losses related to state-backed cyberattackers.

☐ ☆ ✇ Dark Reading:

'No-Party' Data Architectures Promise More Control, Better Security

By: Robert Lemos, Contributing Writer, Dark Reading — August 26th 2022 at 14:05
Consumers gain control of their data while companies build better relationships with their customers — but third-party ad-tech firms will likely continue to stand in the way.

☐ ☆ ✇ Dark Reading:

More Bang for the Buck: Cross-Platform Ransomware Is the Next Problem

By: Robert Lemos, Contributing Writer, Dark Reading — August 25th 2022 at 15:13
As cryptocurrency valuations make strikes less lucrative, ransomware gangs like the new RedAlert and Monster groups are modifying their tools to attack across platforms.

☐ ☆ ✇ Dark Reading:

DevSecOps Gains Traction — but Security Still Lags

By: Robert Lemos, Contributing Writer, Dark Reading — August 23rd 2022 at 21:08
Almost half of teams develop and deploy software using a DevSecOps approach, but security remains the top area of investment, a survey finds.

☐ ☆ ✇ Dark Reading:

One-Third of Popular PyPI Packages Mistakenly Flagged as Malicious

By: Robert Lemos, Contributing Writer, Dark Reading — August 23rd 2022 at 16:15
The scans used by the Python Package Index (PyPI) to find malware fail to catch 41% of bad packages, while creating plentiful false positives.

☐ ☆ ✇ Dark Reading:

5 Russia-Linked Groups Target Ukraine in Cyberwar

By: Robert Lemos, Contributing Writer, Dark Reading — August 18th 2022 at 17:17
Information on the attributed cyberattacks conducted since the beginning of the Russia-Ukraine war shows that a handful of groups conducted more than two dozen attacks.

☐ ☆ ✇ Dark Reading:

Which Security Bugs Will Be Exploited? Researchers Create an ML Model to Find Out

By: Robert Lemos, Contributing Writer, Dark Reading — August 18th 2022 at 14:42
How critical is that vulnerability? University researchers are improving predictions of which software flaws will end up with an exploit, a boon for prioritizing patches and estimating risk.

☐ ☆ ✇ Dark Reading:

With Plunge in Value, Cryptocurrency Crimes Decline in 2022

By: Robert Lemos, Contributing Writer, Dark Reading — August 16th 2022 at 14:49
Cybercrime has been funded with cryptocurrency, but the valuation of various digital currencies has dropped by more than two-thirds and cybercriminals are feeling the pinch.

☐ ☆ ✇ Dark Reading:

Software Supply Chain Chalks Up a Security Win With New Crypto Effort

By: Robert Lemos, Contributing Writer, Dark Reading — August 12th 2022 at 16:53
GitHub, the owner of the Node Package Manager (npm), proposes cryptographically linking source code and JavaScript packages in an effort to shore up supply chain security.

☐ ☆ ✇ Dark Reading:

4 Flaws, Other Weaknesses Undermine Cisco ASA Firewalls

By: Robert Lemos, Contributing Writer, Dark Reading — August 11th 2022 at 17:20
More than 1 million instances of firewalls running Cisco Adaptive Security Appliance (ASA) software have four vulnerabilities that undermine its security, a researcher finds.

☐ ☆ ✇ Dark Reading:

Cisco Confirms Data Breach, Hacked Files Leaked

By: Robert Lemos, Contributing Writer, Dark Reading — August 11th 2022 at 15:55
Ransomware gang gained access to the company's VPN in May by convincing an employee to accept a multifactor authentication (MFA) push notification.

☐ ☆ ✇ Dark Reading:

Microsoft Patches Zero-Day Actively Exploited in the Wild

The computing giant issued a massive Patch Tuesday update, including a pair of remote execution flaws in the Microsoft Support Diagnostic Tool (MSDT) after attackers used one of the vulnerabilities in a zero-day exploit.

☐ ☆ ✇ Dark Reading:

Russia-Ukraine Conflict Holds Cyberwar Lessons

Initial attacks used damaging wiper malware and targeted infrastructure, but the most enduring impacts will likely be from disinformation, researchers say. At Black Hat USA, SentinelOne's Juan Andres Guerrero-Saade and Tom Hegel will discuss.

☐ ☆ ✇ Dark Reading:

Stolen Data Gives Attackers Advantage Against Text-Based 2FA

With names, email addresses, and mobile numbers from underground databases, one person in five is at risk of account compromise even with SMS two-factor authentication in place.

☐ ☆ ✇ Dark Reading:

35K Malicious Code Insertions in GitHub: Attack or Bug-Bounty Effort?

In the last month, "Pl0xP" cloned several GitHub repositories, adding malicious code to the forks that would attempt to infect developer systems and steal sensitive files that included software keys.

☐ ☆ ✇ Dark Reading:

Large Language AI Models Have Real Security Benefits

Complex neural networks, including GPT-3, can deliver useful cybersecurity capabilities, such as explaining malware and quickly classifying websites, researchers find.

❌