FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

Cris Thomas: Space Rogue, From L0pht Hacker to IBM Security Influencer

Security Pro File: The old-school hacker traces a path from young hardware tinkerer to senior cybersecurity executive.

1 in 4 CISOs Wants to Say Sayonara to Security

Thanks to burnout and stress, Gartner predicts churn and even departure from profession among half of today's security leaders by 2025.

Is OWASP at Risk of Irrelevance?

A growing group of OWASP members and board leaders are calling for the AppSec group to make big changes to stay apace with modern development.

Exclu Shutdown Underscores Outsized Role Messaging Apps Play in Cybercrime

Apps like Telegram, WhatsApp, and Discord are a hotbed of cybercriminal communication and scams.

What CISOs Can Do About Brand Impersonation Scam Sites

Apply these nine tips to proactively fight fraudulent websites that use your brand to rip people off.

6 Examples of the Evolution of a Scam Site

Examining some key examples of recently found fraud sites that target the lucrative retail shoe industry helps us understand how brand impersonation sites evolve.

Lazarus Group Rises Again, to Gather Intelligence on Energy, Healthcare Firms

An OpSec slip from the North Korean threat group helps researchers attribute what was first suspected as a ransomware attack to nation-state espionage.

Why CISOs Should Care About Brand Impersonation Scam Sites

Enterprises often don't know whose responsibility it is to monitor for spoofed brand sites and scams that steal customers' trust, money, and personally identifiable information.

7 Insights From a Ransomware Negotiator

The rapid maturation and rebranding of ransomware groups calls for relentless preparation and flexibility in response, according to one view from the trenches.

AI and Residual Finger Heat Could Be a Password Cracker's Latest Tools

New research demonstrates the use of thermal camera images of keyboards and screens in concert with AI to correctly guess computer passwords faster and more accurately.

7 IoT Devices That Make Security Pros Cringe

A look at everything from truly dumb smart devices to cool-looking IoT tech with huge cybersecurity and privacy implications.

Container Supply Chain Attacks Cash In on Cryptojacking

Cloud-native threats are costing cloud customer victims money as cryptojackers mine their vulnerable cloud instances.

Time to Quell the Alarm Bells Around Post-Quantum Crypto-Cracking

Quantum computing's impact on cryptography is not a cliff that we'll all be forced to jump off of, according to Deloitte.

Cyberattackers Abuse Facebook Ad Manager in Savvy Credential-Harvesting Campaign

Facebook lead-generation forms are being repurposed to collect passwords and credit card information from unsuspecting Facebook advertisers.

TeslaGun Primed to Blast a New Wave of Backdoor Cyberattacks

What under-the-hood details of newly discovered attack control panel tell us about how the Evil Corp threat group manages its ServHelper backdoor malware campaigns.

Code-Injection Bugs Bite Google, Apache Open Source GitHub Projects

The insecurities exist in CI/CD pipelines and can be used by attackers to subvert modern development and roll out malicious code at deployment.

Abusing Kerberos for Local Privilege Escalation

Upcoming Black Hat USA presentation will examine the implications of Kerberos weaknesses for security on the local machine.

We Have the Tech to Scale Up Open Source Vulnerability Fixes — Now It's Time to Leverage It

Q&A with Jonathan Leitschuh, inaugural HUMAN Dan Kaminsky Fellow, in advance of his upcoming Black Hat USA presentation.

Why Bug-Bounty Programs Are Failing Everyone

In a Black Hat USA talk, Katie Moussouris will discuss why bug-bounty programs are failing in their goals, and what needs to happen next to use bounties in a way that improves security outcomes.

Don't Have a COW: Containers on Windows and Other Container-Escape Research

Several pieces of Black Hat USA research will explore container design weaknesses and escalation of privilege attacks that can lead to container escapes.

Stealthy Cyber-Campaign Ditches Cobalt Strike for Rival 'Brute Ratel' Pen Test Tool

The latest criminal use of a legitimate red-teaming tool helps attackers stay under the radar and better access living-off-the-land binaries.

Identity Access Management Is Set for Exploding Growth, Big Changes — Report

New research says IAM spending will grow on the back of affordable subscription services, spurred by cloud and mobile adoption, IoT, and continued remote working.

Criminals Use Deepfake Videos to Interview for Remote Work

The latest evolution in social engineering could put fraudsters in a position to commit insider threats.

Ransomware Volume Nearly Doubles 2021 Totals in a Single Quarter

Like a hydra, every time one ransomware gang drops out (REvil or Conti), plenty more step up to fill the void (Black Basta).

Only 3% of Open Source Software Bugs Are Actually Attackable, Researchers Say

A new study says 97% of open source vulnerabilities linked to software supply chain risks are not attackable — but is "attackability" the best method for prioritizing bugs?

VPNs Persist Despite Zero-Trust Fervor

Most organizations still rely on virtual private networks for secure remote access.

Are You Hiring Enough Entry-Level Security Pros?

New (ISC)² survey shows employment levels for entry-level cyber pros lag behind every other experience level.

24+ Billion Credentials Circulating on the Dark Web in 2022 — So Far

Username and password combinations offered for sale on the Dark Web by criminals has increased 65% since 2020.

Design Weakness Discovered in Apple M1 Kernel Protections

The proof-of-concept attack from MIT CSAIL researchers undermines the pointer authentication feature used to defend the Apple chip's OS kernel.

How the C-Suite Puts Shoulders Into Zero Trust in 2022

A full 77% of tech executives say they'll increase spending in zero-trust architecture in the coming year.

Gathering Momentum: 3 Steps Forward to Expand SBoM Use

New studies show less than a third of organizations use software bills of materials (SBoMs), but momentum is building to boost that number.

10 No-BS Tips for Building a Diverse and Dynamic Security Team

Advice from women and nonbinary security leaders on creating well-rounded security teams, stronger CISO leadership, and a more resilient industry.

Quanta Servers Caught With 'Pantsdown' BMC Vulnerability

Researchers discover 3-year-old critical firmware vulnerability, running in popular cloud servers used to power hyperscalers and cloud providers alike.

Majority of Kubernetes API Servers Exposed to the Public Internet

Shadowserver Foundation researchers find 380,000 open Kubernetes API servers.

❌