FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

To Safeguard Critical Infrastructure, Go Back to Basics

CISA's recently released cybersecurity performance goals can help lower risk and thwart the impact of cyberattacks.

87% of Container Images in Production Have Critical or High-Severity Vulnerabilities

At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.

Student Medical Records Exposed After LAUSD Breach

"Hundreds" of special education students' psych records have turned up on the Dark Web. School records like these are covered by FERPA, not HIPAA, so parents have little recourse.

Pirated Final Cut Pro for macOS Offers Stealth Malware Delivery

The number of people who have made the weaponized software available for sharing via torrent suggests that many unsuspecting victims may have downloaded the XMRig coin miner.

Generative AI Changes Everything We Know About Cyberattacks

Generative AI is heating up everywhere and fundamentally changing everything we know about how cybercriminals develop and deploy attacks.

Cyberattack on Dole Causes Temporary Salad Shortage

The produce company said it suffered a ransomware attack earlier this month.

Linux Foundation Europe Announces Formation of OpenWallet Foundation

Diverse ecosystem of global technology, finance, and university leaders join as first OpenWallet Foundation Members, many more expected.

UL Solutions Issues Automotive Cybersecurity Assurance Program Certificate to LG Innotek

Through its Cybersecurity Assurance Program, UL Solutions is helping the automotive industry advance cybersecurity management systems for connected vehicle technologies.

Hydrochasma Threat Group Bombards Targets With Slew of Commodity Malware, Tools

A previously unidentified threat group uses open source malware and phishing to conduct cyber-espionage on shipping and medical labs associated with COVID-19 treatments and vaccines.

Unanswered Questions Cloud the Recent Targeting of an Asian Research Org

A novel threat group, utilizing new malware, is out in the wild. But the who, what, where, and why are yet to be determined, and there's evidence of a false-flag operation.

Wiper Malware Surges Ahead, Spiking 53% in 3 Months

Cybercriminals and hacktivists have joined state-backed actors in using sabotage-bent malware in destructive attacks, new report shows.

Vault Vision Launches One Click Passwordless Logins With Passkey User Authentication

Eliminate passwords in user authentication workflow with Vault Vision's passkey features like facial recognition, fingerprint and pin verification on all modern devices.

Cris Thomas: Space Rogue, From L0pht Hacker to IBM Security Influencer

Security Pro File: The old-school hacker traces a path from young hardware tinkerer to senior cybersecurity executive.

Metomic Raises $20 Million to Protect Sensitive Data in SaaS Applications

As a data security solution focused solely on SaaS ecosystems, Metomic will use the Series A funding round to expand into the U.S.

Why Are My Employees Integrating With So Many Unsanctioned SaaS Apps?

Before adopting SaaS apps, companies should set security guardrails to vet new vendors and check security integration for misconfiguration risks.

(ISC)² Opens Security Congress 2023 Call for Presentations

(ISC)2 members and cybersecurity professionals worldwide are encouraged to share their expertise, best practices and experiences with their peers and career hopefuls.

Top Takeaways From CloudNativeSecurityCon 2023

CloudNativeSecurityCon North America 2023 was a vendor-neutral cloud-native security conference. Here's why it was important.

This Will Be the Year of the SBOM, for Better or for Worse

Sharing attestations on software supply chain data that are formed into a policy will give us a framework to interpret risk and develop compliance directives.

UL Solutions Advances Automotive Safety and Security

A combined team of UL Solutions safety science experts will address automotive cybersecurity, functional safety, automated driving and software development processes to help customers bring safer, more secure innovations to market.

Scammers Mimic ChatGPT to Steal Business Credentials

Hackers will take anything newsworthy and turn it against you, including the world's most advanced AI-enabled chatbot.

Entitle Brings Fine-Grained Cloud Permissions Management Out of Stealth

The platform uses no-code policy workflows to automate the provisioning and revoking of permissions.

Half of Apps Have High-Risk Vulnerabilities Due to Open Source

Open source software dependencies are affecting the software security of different industries in different ways, with mature industries becoming more selective in their open source usage.

1 in 4 CISOs Wants to Say Sayonara to Security

Thanks to burnout and stress, Gartner predicts churn and even departure from profession among half of today's security leaders by 2025.

US Military Emails Exposed via Cloud Account

A DoD email server hosted in the cloud (and now secured) had no password protection in place for at least two weeks.

Headwinds Don't Have to Be a Drag on Your Security Effectiveness

Despite increased threats, an uncertain economy, and increasing automation, your organization can still thrive.

Phishing Fears Ramp Up on Email, Collaboration Platforms

It's a banner year for attacks coming through traditional email as well as newer collaboration technologies, such as Slack and Microsoft Teams. What's next?

Google Delivers Record-Breaking $12M in Bug Bounties

Google's Android and Chrome Vulnerability Reward Programs (VRPs) in particular saw hundreds of valid reports and payouts for security vulnerabilities discovered by ethical hackers.

Trend Micro Acquires SOC Technology Expert Anlyz

Technology tuck-in enhances industry's broadest XDR security platform.

Exploit Code Released for Critical Fortinet RCE Bug

Organizations are urged to update to the latest versions of FortiNAC to patch a flaw that allows unauthenticated attackers to write arbitrary files on the system.

7 Tips for Mitigating Cyber-Risks to Your Corporate Social Media

How to stay safe, even when tech-savvy admins can't tell the difference between a scam and the truth.

4 Tips to Guard Against DDoS Attacks

Attackers are now using multiple types of distributed denial-of-service (DDoS) attacks to take down sites. Here are some ways to defend and protect.

How to Stop Attackers That Target Healthcare Imaging Data

Attribute-based encryption could help keep sensitive metadata off of the Dark Web.

Scrut Automation Raises Funding of $7.5M, Led by MassMutual Ventures, Lightspeed, and Endiya Partners

With the fresh capital, Scrut aims to focus on simplifying risk management and infosec compliance for cloud-native SaaS, Fintech, and Healthtech companies

Malwarebytes Expands Platform With New Application Block Capabilities

Latest threat prevention module helps resource-strapped security teams block unsafe, untrusted or vulnerable applications.

Analysts Slam Twitter's Decision to Disable SMS-Based 2FA

Making the option available only to paid subscribers — while also claiming SMS authentication is broken — doesn't make sense, some say. Is it a cash grab?

Cyberthreats, Regulations Mount for Financial Industry

Nation-state adversaries, new reporting regulations, and a fast-paced threat landscape mean that financial services and technology firms need to bolster their security posture.

Name That Toon: Join the Club

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

Coinbase Crypto Exchange Ensnared in 'Oktapus'-Related Smishing Attack

Some employees' personal data was leaked, but the company responded swiftly to a socially engineered incident that gained access to legitimate employee login credentials.

Third-Party Providers Create Identity and Access Control Challenges for Fintech Apps

Fintech has drastically shifted the financial services industry toward digital technologies and, in so doing, has introduced a variety of new risks.

Israel's Top Tech University Targeted by DarkBit Ransomware

An Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send a political message — and maybe something more.

Insider Threats Don't Mean Insiders Are Threatening

By implementing tools that enable internal users to do their jobs efficiently and securely, companies reduce insider threat risk by building insider trust.

Modern Software: What's Really Inside?

Open source has changed the software game from build or buy to assemble with care.

Despite Breach, LastPass Demonstrates the Power of Password Management

What's scarier than keeping all of your passwords in one place and having that place raided by hackers? Maybe reusing insecure passwords.

Researchers Create an AI Cyber Defender That Reacts to Attackers

Based on deep reinforcement learning, the system can adapt to defenders' tactics and stop 95% of simulated attacks, according to its developers.

Majority of Ransomware Attacks Last Year Exploited Old Bugs

New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access to data theft.

Is OWASP at Risk of Irrelevance?

A growing group of OWASP members and board leaders are calling for the AppSec group to make big changes to stay apace with modern development.

Check Point Boosts AppSec Focus With CNAPP Enhancements

Established network security players are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains.

Novel Spy Group Targets Telecoms in 'Precision-Targeted' Cyberattacks

The primary victims so far have been employees of telcos in the Middle East, who were hit with custom backdoors via the cloud, in a likely precursor to a broader attack.

Google Translate Helps BEC Groups Scam Companies in Any Language

BEC gangs Midnight Hedgehog and Mandarin Capybara show how online marketing and translation tools are making it easy for these threat groups to scale internationally.

Inglis Retires as National Cyber Director Ahead of Biden's Cybersecurity EO

The long-time NSA and cyber specialist says he's exiting the public sector.

Not Stoked: Burton Snowboards' Online Orders Disrupted After Cyberattack

The snow sports specialist is investigating to see what caused the operations-disrupting "cyber incident."

Massive GoAnywhere RCE Exploit: Everything You Need to Know

Weeks after an exploit was first announced in a popular cloud-based file transfer service, could some organizations still be vulnerable? The answer is yes.

AppSec Threats Deserve Their Own Incident Response Plan

With a rearranging of priorities and good incident response plans, organizations can be ready to face the future of software attacks.

Encrypted Traffic, Once Thought Safe, Now Responsible For Most Cyberthreats

It's a classic attacker move: Use security protections against those who deploy them. But organizations can still defuse and prevent these encrypted attacks.

❌