Dark Reading

Microsoft Disrupts Large-Scale BEC Campaign Across Web Services

06/15/2021
Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.

Security Experts Scrutinize Apple, Amazon IoT Networks

06/15/2021
Both companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices worries some security researchers.

Andariel Group Targets South Korean Entities in New Campaign

06/15/2021
Andariel, designated as a sub-group of the Lazarus Group APT, has historically targeted South Korean organzations.

Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities

06/15/2021
Terbium Labs' products and services will become part of Deloitte's Detect & Respond lineup, the company confirms.

What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain

06/15/2021
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.

How President Biden Can Better Defend the US From Russian Hacks

06/15/2021
Wilson Center cybersecurity expert Meg King pinpoints five ambitious steps the administration should take, including a comprehensive national data breach notification protocol.

How Does the Government Buy Its Cybersecurity?

06/15/2021
The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.

VPN Attacks Surged in First Quarter

06/14/2021
But volume of malware, botnet, and other exploit activity declined because of the Emotet botnet takedown.

Cyber Analytics Database Exposed 5 Billion Records Online

06/14/2021
In an ironic twist, Cognyte's data alerts customers to third-party data exposures.

Google Workspace Adds Client-Side Encryption

06/14/2021
Users given control over encryption keys, Google says.

New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'

06/14/2021
Best practices guide encompasses integrity, hardening, resilience, and monitoring of PLCs in industrial networks.

Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work

06/14/2021
We lack reliable, representative, actionable data about ransomware's actual scope, scale, and impact. The Ransom Incident Response Network could change that.

Name That Toon: Sight Unseen

06/14/2021
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

Colonial Pipeline Cyberattack Proves a Single Password Isn't Enough

06/14/2021
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar -- but a focus on credentials is vital.

Trickbot Investigation Shows Details of Massive Cybercrime Effort

06/11/2021
Nearly a score of cybercriminals allegedly worked together to create the Trickbot malware and deploy it against more than a million users, an unsealed indictment claims.

McDonald's Data Breach Exposed Business & Customer Data

06/11/2021
An investigation has revealed company data has been breached in the United States, South Korea, and Taiwan.

Details Emerge on How Gaming Giant EA Was Hacked

06/11/2021
Hacking group stole source code to FIFA 21 and the company's Frostbite engine.

Many Mobile Apps Intentionally Using Insecure Connections for Sending Data

06/11/2021
A new analysis of iOS and Android apps released to Apple's and Google's app stores over the past five years found many to be deliberately breaking HTTPS protections.

Secure Access Trade-offs for DevSecOps Teams

06/11/2021
Thanks to recent advancements in access technologies, everyone can apply identity-based authentication and authorization and zero-trust principles for their computing resources.

New Ransomware Group Claiming Connection to REvil Gang Surfaces

06/10/2021
'Prometheus' is the latest example of how the ransomware-as-a-service model is letting new gangs scale up operations quickly.