Dark Reading

Zero Trust in the Era of Edge

12/16/2022
Accelerating security challenges and the increasing footprint of edge and IoT devices call for zero-trust principles to drive cyber resiliency.

Live From London: Next-Gen Cybersecurity Takes Stage at Black Hat Europe

12/16/2022
Check out our slideshow detailing the emerging cybersecurity trends in cloud, creating a defensible Internet, malware evolution, and more that lit up audiences in London.

NIST Finally Retires SHA-1, Kind Of

12/15/2022
SHA-1 was deprecated in 2011. NIST has set the hashing algorithm's final retirement date to Dec. 31, 2030.

Zero Trust Shouldn’t Be The New Normal

12/15/2022
Zero trust is useful in some situations, but organizations should not be trying to fit zero trust everywhere. In some cases, identity-based networking is an appropriate alternative.

Axonius Bolsters SaaS Management Offering With New Behavioral Analytics and SaaS User-Device Association Capabilities to

12/15/2022
New features bring greater visibility and context into SaaS applications access and activity.

Stolen Data on 80K+ Members of FBI-Run InfraGard Reportedly for Sale on Dark Web Forum

12/15/2022
InfraGard's members include key security decision-makers and stakeholders from all 16 US civilian critical-infrastructure sectors.

Meta Ponies Up $300K Bounty for Zero-Click Mobile RCE Bugs in Facebook

12/15/2022
Facebook's parent company has also expanded bug-bounty payouts to include Oculus and other "metaverse" gadgets for AR/VR.

WatchGuard Threat Lab Report Finds Top Threat Arriving Exclusively Over Encrypted Connections

12/15/2022
New research also analyzes the commoditization of adversary-in-the-middle attacks, JavaScript obfuscation in exploit kits, and a malware family with Gothic Panda ties.

DDoS Attack Platforms Shut Down in Global Law Enforcement Operation

12/15/2022
Sweeping operation took down around 50 popular DDoS platforms, just one of which was used in 30M attacks, Europol says.

Blackmailing MoneyMonger Malware Hides in Flutter Mobile Apps

12/15/2022
Money-lending apps built using the Flutter software development kit hide a predatory spyware threat and highlight a growing trend of using personal data for blackmail.

Data Destruction Policies in the Age of Cloud Computing

12/15/2022
It's time for on-the-record answers to questions about data destruction in cloud environments. Without access, how do you verify data has been destroyed? Do processes meet DoD standards, or do we need to adjust standards to meet reality?

API Flaws in Lego Marketplace Put User Accounts, Data at Risk

12/15/2022
Attackers also could breach internal production data to compromise a corporate network using vulnerabilities found in the BrickLink online platform.

NSA Slices Up 5G Mobile Security Risks

12/14/2022
The feds' mobile service provider guidance details cybersecurity threat vectors associated with 5G network slicing.

Cybereason Warns Global Organizations Against Destructive Ransomware Attacks From Black Basta Gang

12/14/2022
The Royal Ransomware Group has emerged as a threat to companies in 2022 and they have carried out dozens of successful attacks on global companies. Cybereason suggests that companies raise their awareness of this potential pending threat.

Microsoft-Signed Malicious Drivers Usher In EDR-Killers, Ransomware

12/14/2022
Malicious Windows drivers signed as legit by Microsoft have been spotted as part of a toolkit used to kill off security processes in post-exploitation cyber activity.

CSAF Is the Future of Vulnerability Management

12/14/2022
Version 2.0 of the Common Security Advisory Framework will enable organizations to automate vulnerability remediation.

Apple Zero-Day Actively Exploited on iPhone 15

12/14/2022
Without many details, Apple patches a vulnerability that has been exploited in the wild to execute code.

Proofpoint Nabs Illusive, Signaling a Sunset for Deception Tech

12/14/2022
Former pure-play deception startup Illusive attracts Proofpoint with its repositioned platform focusing on identity threat detection and response (ITDR).

Automated Cybercampaign Creates Masses of Bogus Software Building Blocks

12/14/2022
The proliferation of automated cyberattacks against npm, NuGet, and PyPI underscores the growing sophistication of threat actors and the threats to open source software supply chains.

How Our Behavioral Bad Habits Are a Community Trait and Security Problem

12/14/2022
Learn to think three moves ahead of hackers so you're playing chess, not checkers. Instead of reacting to opponents' moves, be strategic, and disrupt expected patterns of vulnerability.