Dark Reading

Google Discovers New Rowhammer Attack Technique

05/26/2021
Researchers publish the details of a new Rowhammer vulnerability called "Half-Double" that exploits increasingly smaller DRAM chips.

Zscaler Buys Deception Technology Startup

05/26/2021
ZScaler's CEO says Smokescreen Technologies' capabilities will be integrated with Zscaler's ZIA and ZPA products.

Cisco: Reduced Complexity in the SOC Improves Enterprise Security

05/26/2021
SPONSORED: WATCH NOW -- All it took was a global pandemic and a shift to working from home to expose security operations centers' open secret: Too much software, systems, and data to filter. Dug Song, chief strategy officer of Cisco Secure, makes a strong case for why reducing that complexity is the only tenable way forward for security professionals.

Bug Bounties and the Cobra Effect

05/26/2021
Are bug bounty programs allowing software companies to skirt their responsibility to make better, more secure products from the get-go?

How Are Cyber Insurance Companies Assessing Ransomware Risk?

05/26/2021
From limiting claims payments to tying payments to policyholders' actions, the cyber insurance industry is in "a very dynamic place right now," says Corvus Insurance CEO Phil Edmundson.

Devo: SIEM Continues to Evolve with Tech Trends and Emerging Threats

05/26/2021
SPONSORED: WATCH NOW -- Some organizations split the difference with a hybrid of premises- and cloud-based SIEM, says Ted Julian, senior VP of product at Devo. As security data volumes continue to increase, SIEM's evolution will only continue.

Messaging Apps: The Latest Hotbed in the Fraud Ecosystem

05/26/2021
Telegram and other secure messaging apps have become a haven for professional criminals to wreak havoc and turn a profit.

New Iranian Threat Actor Using Ransomware, Wipers in Destructive Attacks

05/26/2021
The Agrius group's focus appears to be Israel and the Middle East.

Orange: Your Leaky Security is Coming from Inside the House!

05/26/2021
SPONSORED: Your home WiFi router may be screaming fast, but it's also a major point of vulnerability in this work-from-home era, says Charl van der Walt, head of security research at Orange Cyberdefense. And while Zero Trust offers some relief, he offers up some how-to advice to ensure it's properly deployed.

Cloud Compromise Costs Organizations $6.2M Per Year

05/25/2021
Organizations reported an average of 19 cloud-based compromises in the past year, but most don't evaluate the security of SaaS apps before deployment.

Rise in Opportunistic Hacks and Info-Sharing Imperil Industrial Networks

05/25/2021
Security researchers at Mandiant have seen an increasing wave of relatively simplistic attacks involving ICS systems - and attackers sharing their finds with one another - since 2020.

Russia Profiting from Massive Hydra Cybercrime Marketplace

05/25/2021
An analysis of Bitcoin transactions from the Hydra marketplace show that the operators are locking sellers into Russian exchanges, likely fueling profits for local actors.

MacOS Zero-Day Let Attackers Bypass Privacy Preferences

05/25/2021
Apple has released security patches for vulnerabilities in macOS and tvOS that reports indicate have been exploited in the wild.

Axis Fosters Work-From-Home Momentum with Zero Trust Network Access

05/25/2021
SPONSORED: Watch now -- VPN and VDI, while still useful, lack the hardened security required to keep users secure. That's created an opening for Zero Trust network access.

Russian Sentenced to 30 Months for Running Criminal Website

05/25/2021
FBI says sales from illicit online shop deer.io exceeded $17 million

Your Network's Smallest Cracks Are Now Its Biggest Threats

05/25/2021
Bad actors have flipped the script by concentrating more on low-risk threats. Here's how to address the threat and the tactics.

Uptycs Offers Resilience Formula to Boost Business Continuity

05/25/2021
SPONSORED CONTENT: Breaches and data loss are inevitable, but customers can bounce back more readily with some planning and foresight, says Ganesh Pai, CEO and founder of Uptycs. He suggests a trajectory for customers looking to improve their own resilience, starting with proactiveness, followed by reactivity, then predictive capabilities and better protection.

The Makings of a Better Cybersecurity Hire

05/25/2021
Experience counts, but as one CISO has learned, don't overlook a creative, motivated candidate just because their background doesn't match the job description.

The Adversary Within: Preventing Disaster From Insider Threats

05/25/2021
Insiders are in a position of trust, and their elevated permissions provide opportunities to cause serious harm to critical business applications and processes.

Businesses Boost Security Budgets. Where Will the Money Go?

05/25/2021
Most organizations plan to spend more on security, leaders say in a report that explores their toughest challenges, post-breach costs, and spending priorities.