Dark Reading

What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers

05/10/2022
Microsoft's May 2022 Patch Tuesday contains several bugs in ubiquitous software that could affect millions of machines, researchers warn.

US Pledges to Help Ukraine Keep the Internet and Lights On

05/10/2022
US State Department outlines coordinated government effort to provide Ukraine with cybersecurity intelligence, expertise, and resources amid invasion.

Lincoln College Set to Close After Crippling Cyberattack

05/10/2022
COVID-19 and a December 2021 cyberattack combined to put the future of Abraham Lincoln's namesake college in peril.

Cybercriminals Are Increasingly Exploiting Vulnerabilities in Windows Print Spooler

05/10/2022
Kaspersky researchers discovered that cybercriminals made approximately 65,000 attacks between July 2021 and April 2022.

Arctic Wolf Launches Arctic Wolf Labs Focused on Security Operations Research and Intelligence Reporting

05/10/2022
New research-focused division focused on advancing innovation in the field of security operations.

5-Buck DCRat Malware Foretells a Worrying Cyber Future

05/10/2022
The Dark Crystal remote access Trojan (aka DCRat) breaks a few stereotypes, with coding done by a solo developer, using an obscure Web language and offering it at a frighteningly low price.

Onapsis Announces New Offering to Jumpstart Security for SAP Customers

05/10/2022
Company delivers new vulnerability management offering to help resource-constrained organizations combat increasing attacks on mission-critical SAP applications .

Mastering the New CISO Playbook

05/10/2022
How can you safeguard your organization amid global conflict and uncertainty?

How to Check If Your F5 BIG-IP Device Is Vulnerable

05/09/2022
This Tech Tip walks network administrators through the steps to address the latest critical remote code execution vulnerability (CVE-2022-1388) in F5's BIG-IP management interface.

Joker, Other Fleeceware Surges Back Into Google Play

05/09/2022
The infamous Joker threat is back in Google Play, along with other Trojanized mobile apps that secretly sign Android users up for paid subscription services.

Costa Rica Declares State of Emergency Under Sustained Conti Cyberattacks

05/09/2022
Conti's ransomware attack cripples Costa Rica's Treasury, sparking the US to offer a $15M bounty on the group.

5 Tips to Protect Your Career Against a Narcissist

05/09/2022
When you find yourself the target of a narcissist, familiarize yourself with their tactics and learn how to survive.

NFTs Emerge as the Next Enterprise Attack Vector

05/09/2022
Cybersecurity has to be a top priority as enterprises begin incorporating the use of nonfungible tokens into their business strategies, brand-awareness campaigns, and employee-communication efforts, experts say.

Deloitte Launches Expanded Cloud Security Management Platform

05/09/2022
The CSM by Deloitte platform includes cloud security policy orchestration, cyber predictive analytics, attack surface management, and cyber cloud managed services.

Security Stuff Happens: Where Do You Go From Here?

05/09/2022
Despite what it may feel like when you're in the trenches after a security incident, the world doesn't stop moving. (Part 3 of a series.)

Post-Quantum Cryptography Set to Replace RSA, AES, ECC

05/06/2022
In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges.

Ikea Canada Breach Exposes 95K Customer Records

05/06/2022
An unauthorized employee accessed Ikea's customer database, but it's unclear what the intention was.

What We've Learned in the 12 Months Since the Colonial Pipeline Attack

05/06/2022
The attack may have been "a major wake-up call" about the need for greater resilience in IT environments, but have security teams hit the snooze bar one too many times?

Scammer Infects His Own Machine with Spyware, Reveals True Identity

05/06/2022
An operational slip-up led security researchers to an attacker associated with Nigerian letter scams and malware distribution, after he infected himself with Agent Tesla.

White House Moves to Shore Up US Post-Quantum Cryptography Posture

05/06/2022
Biden's executive order pushes new NIST quantum-cryptography standards and directs federal government to move toward quantum-resistant cybersecurity.