Dark Reading

FBI: Criminals Using BEC Attacks to Scavenge Food Shipments

12/16/2022
Cybercriminal rats are at play: Several food suppliers and distributors have experienced hundreds of thousands of dollars in losses after fulfilling fraudulently placed orders for food and ingredient shipments.

Organizations Unprepared for Upcoming Data Privacy Regulations

12/16/2022
A comprehensive data privacy program requires involvement from all parts of the business that deal with personal data.

With SASE Definition Still Cloudy, Forum Proposes Standard

12/16/2022
Even without an overarching dictionary of common definitions, the concept of a secure access service edge (SASE) has spread, but a standard could help cloud services work better together.

Iran-Backed Charming Kitten APT Eyes Kinetic Ops, Kidnapping

12/16/2022
The not-so-charming APT's intelligence-gathering initiatives are likely being used by the Iranian state to target kidnapping victims.

Chinese APT Group MirrorFace Interferes in Japanese Elections

12/16/2022
The MirrorFace group has deployed popular malware LodeInfo for spying and data theft against certain members of the Japanese House of Representatives.

Compliance Is Not Enough: How to Manage Your Customer Data

12/16/2022
Effective customer data management helps companies avoid data breaches and the resulting cascade of issues. From validating "clean" data to centralized storage and a data governance strategy, management steps can help keep data safe.

Zero Trust in the Era of Edge

12/16/2022
Accelerating security challenges and the increasing footprint of edge and IoT devices call for zero-trust principles to drive cyber resiliency.

Live From London: Next-Gen Cybersecurity Takes Stage at Black Hat Europe

12/16/2022
Check out our slideshow detailing the emerging cybersecurity trends in cloud, creating a defensible Internet, malware evolution, and more that lit up audiences in London.

NIST Finally Retires SHA-1, Kind Of

12/15/2022
SHA-1 was deprecated in 2011. NIST has set the hashing algorithm's final retirement date to Dec. 31, 2030.

Zero Trust Shouldn’t Be The New Normal

12/15/2022
Zero trust is useful in some situations, but organizations should not be trying to fit zero trust everywhere. In some cases, identity-based networking is an appropriate alternative.

Axonius Bolsters SaaS Management Offering With New Behavioral Analytics and SaaS User-Device Association Capabilities to

12/15/2022
New features bring greater visibility and context into SaaS applications access and activity.

Stolen Data on 80K+ Members of FBI-Run InfraGard Reportedly for Sale on Dark Web Forum

12/15/2022
InfraGard's members include key security decision-makers and stakeholders from all 16 US civilian critical-infrastructure sectors.

Meta Ponies Up $300K Bounty for Zero-Click Mobile RCE Bugs in Facebook

12/15/2022
Facebook's parent company has also expanded bug-bounty payouts to include Oculus and other "metaverse" gadgets for AR/VR.

WatchGuard Threat Lab Report Finds Top Threat Arriving Exclusively Over Encrypted Connections

12/15/2022
New research also analyzes the commoditization of adversary-in-the-middle attacks, JavaScript obfuscation in exploit kits, and a malware family with Gothic Panda ties.

DDoS Attack Platforms Shut Down in Global Law Enforcement Operation

12/15/2022
Sweeping operation took down around 50 popular DDoS platforms, just one of which was used in 30M attacks, Europol says.

Blackmailing MoneyMonger Malware Hides in Flutter Mobile Apps

12/15/2022
Money-lending apps built using the Flutter software development kit hide a predatory spyware threat and highlight a growing trend of using personal data for blackmail.

Data Destruction Policies in the Age of Cloud Computing

12/15/2022
It's time for on-the-record answers to questions about data destruction in cloud environments. Without access, how do you verify data has been destroyed? Do processes meet DoD standards, or do we need to adjust standards to meet reality?

API Flaws in Lego Marketplace Put User Accounts, Data at Risk

12/15/2022
Attackers also could breach internal production data to compromise a corporate network using vulnerabilities found in the BrickLink online platform.

NSA Slices Up 5G Mobile Security Risks

12/14/2022
The feds' mobile service provider guidance details cybersecurity threat vectors associated with 5G network slicing.

Cybereason Warns Global Organizations Against Destructive Ransomware Attacks From Black Basta Gang

12/14/2022
The Royal Ransomware Group has emerged as a threat to companies in 2022 and they have carried out dozens of successful attacks on global companies. Cybereason suggests that companies raise their awareness of this potential pending threat.