Dark Reading

Quantum Key Distribution for a Post-Quantum World

05/20/2022
New versions of QKD use separate wavelengths on the same fiber, improving cost and efficiency, but distance is still a challenge.

Microsoft Rushes a Fix After May Patch Tuesday Breaks Authentication

05/20/2022
Two of Microsoft's Patch Tuesday updates need a do-over after causing certificate-based authentication errors.

Authentication Is Static, Yet Attackers Are Dynamic: Filling the Critical Gap

05/20/2022
To succeed against dynamic cybercriminals, organizations must go multiple steps further and build a learning system that evolves over time to keep up with attacker tactics.

New Open Source Project Brings Consistent Identity Access to Multicloud

05/20/2022
Hexa and IDQL allow organizations using cloud platforms such as Microsoft Azure, Amazon Web Services, and Google Cloud Platform to apply consistent access policy across all applications, regardless of environment.

More Than 1,000 Cybersecurity Career Pursuers Complete the (ISC)² Entry-Level Cybersecurity Certification Pilot Exam

05/19/2022
New professional certification program establishes a pathway into the workforce for students and career changers by demonstrating their foundational knowledge, skills and abilities to employers.

Deadbolt Ransomware Targeting QNAP NAS Devices

05/19/2022
QNAP is urging customers of its NAS products to update QTS and avoid exposing the devices to the Internet.

Pro-Russian Information Operations Escalate in Ukraine War

05/19/2022
In the three months since the war started, Russian operatives and those allied with the nation's interests have unleashed a deluge of disinformation and fake news to try and sow fear and confusion in Ukraine, security vendor says.

DoJ Won't Charge 'Good Faith' Security Researchers

05/19/2022
Revised policy means security analysts won't be charged under the Computer Fraud and Abuse Act.

Dig Exits Stealth With $11M for Cloud Data Detection and Response Solution

05/19/2022
CrowdStrike and CyberArk invest in Dig's seed round, which was led by Team8, alongside Merlin Ventures and chairs of MongoDB and Exabeam.

6 Scary Tactics Used in Mobile App Attacks

05/19/2022
Mobile attacks have been going on for many years, but the threat is rapidly evolving as more sophisticated malware families with novel features enter the scene.

Phishing Attacks for Initial Access Surged 54% in Q1

05/19/2022
For the first time in a year, security incidents involving email compromises surpassed ransomware incidents, a new analysis shows.

MITRE Creates Framework for Supply Chain Security

05/18/2022
System of Trust includes data-driven metrics for evaluating the integrity of software, services, and suppliers.

CISA to Federal Agencies: Patch VMware Products Now or Take Them Offline

05/18/2022
Last month attackers quickly reverse-engineered VMware patches to launch RCE attacks. CISA warns it's going to happen again.

How Pwn2Own Made Bug Hunting a Real Sport

05/18/2022
From a scrappy contest where hackers tried to win laptops, Pwn2Own has grown into a premier event that has helped normalize bug hunting.

Lacework Integrates Kubernetes Features to Enhance Security Across Multi-Cloud Environments

05/18/2022
Polygraph Data Platform adds Kubernetes audit log monitoring, integration with Kubernetes admission controller, and Infrastructure as Code (IaC) security to help seamlessly integrate security into developer workflows.

CISA: Unpatched F5 BIG-IP Devices Under Active Attack

05/18/2022
Publicly released proof-of-concept exploits are supercharging attacks against unpatched systems, CISA warns.

The Industry Must Better Secure Open Source Code From Threat Actors

05/18/2022
Build security in up front to secure open source code at the foundational level. Apply security controls, have engineering teams test, do code review, and use attacker-centric behavioral analytics to mitigate threats.

Microsoft Flags Attack Targeting SQL Servers With Novel Approach

05/18/2022
Attackers appear to have found a way around PowerShell monitoring by using a default utility instead.

2022: The Year Zero Trust Becomes Mainstream

05/18/2022
It has never been more important for organizations of all sizes to prioritize securing their users and their infrastructure secrets with zero-trust network access.

How Threat Actors Are a Click Away From Becoming Quasi-APTs

05/18/2022
As demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.