Dark Reading

Malwarebytes Expands OneView Platform for MSPs

09/28/2022
Malwarebytes achieves 250% year-over-year MSP partner growth, introduces new modules to enhance protection, detection, and resolution of threats for SMBs.

Most Attackers Need Less Than 10 Hours to Find Weaknesses

09/28/2022
Vulnerable configurations, software flaws, and exposed Web services allow hackers to find exploitable weaknesses in companies' perimeters in just hours, not days.

Lazarus Lures Aspiring Crypto Pros With Fake Exchange Job Postings

09/27/2022
Previously observed using fake Coinbase jobs, the North Korea-sponsored APT has expanded into using Crypo.com gigs as cover to distribute malware.

Amid Sweeping Change, Cyber Defenders Face Escalating Visibility — and Pressure

09/27/2022
Why cyber teams are now front and center for business enablement within organizations, and the significant challenges they face.

FBI Helping Australian Authorities Investigate Massive Optus Data Breach: Reports

09/27/2022
Initial reports suggest a basic security error allowed the attacker to access the company's live customer database via an unauthenticated API.

Microsoft Rolls Out Passwordless Sign-on for Azure Virtual Desktop

09/27/2022
Azure says cloud-native single sign-on with a passwordless option is most-requested new AVD feature in the product's history.

Lessons From the GitHub Cybersecurity Breach

09/27/2022
This Tech Tip outlines three steps security teams should take to protect information stored in Salesforce.

4 Data Security Best Practices You Should Know

09/27/2022
There are numerous strategies to lessen the possibility and effects of a cyberattack, but doing so takes careful planning and targeted action.

Adversaries Continue Cyberattacks with Greater Precision and Innovative Attack Methods According to NETSCOUT Report

09/27/2022
TCP-based, DNS water-torture, and carpet-bombing attacks dominate the DDoS threat landscape, while Ireland, India, Taiwan, and Finland are battered by DDoS attacks resulting from the Russia/Ukraine war.

Netography Upgrades Platform to Provide Scalable, Continuous Network Security and Visibility

09/27/2022
Netography FusionĀ® gives security and cloud operations teams visibility and control of network traffic and context across users, applications, data, and devices.

7 Metrics to Measure the Effectiveness of Your Security Operations

09/27/2022
SOC metrics will allow stakeholders to track the current state of a program and how it's supporting business objectives.

IaC Scanning: A Fantastic, Overlooked Learning Opportunity

09/27/2022
Infrastructure as code can help teams build more consistently in the cloud. But who owns it? Are teams getting the insights they need from your IaC security tool?

BlackCat/ALPHV Gang Adds Wiper Functionality as Ransomware Tactic

09/27/2022
Using its "Exmatter" tool to corrupt rather than encrypt files signals a new direction for financially motivated cybercrime activity, researchers say.

Organizations Finding the Need for New Approaches on the Cybersecurity Front, CompTIA Research Reveals

09/27/2022
Settling for "satisfactory" level of readiness may underestimate growing levels of risk.

Fake Sites Siphon Millions of Dollars in 3-Year Scam

09/27/2022
A crime syndicate based in Russia steals millions of dollars from credit card companies using fake dating and porn sites on hundreds of domains to rack up fraudulent charges.

MITRE's FiGHT Focuses on 5G Networks

09/27/2022
MITRE's new FiGHT framework describes adversary tactics and techniques used against 5G systems and networks.

Despite Recession Jitters, M&A Dominates a Robust Cybersecurity Market

09/26/2022
Funding has been somewhat lower than last year, but investment remains healthy, analysts say, amid thirst for cloud security in particular.

Russia Planning Cyberattacks on Ukraine's Energy Grid

09/26/2022
Ukraine military intelligence says Russia is planning cyberattacks on the country's energy sector, as well as against allies including Poland and the Baltic states.

Cyber Threat Alliance Extends Membership to 6+ Leading Cybersecurity Companies

09/26/2022
CTA now has 36 members headquartered in 11 countries who follow cyber activities across the world, showing cybersecurity industry members realize the value in collaboration.

Samsung Fails Consumers in Preventable Back-to-Back Data Breaches, According to Federal Lawsuit

09/26/2022
Company unnecessarily collected consumers' personal data and failed to safeguard it, suit alleges, leading to two back-to-back data breaches.