Dark Reading

Nok Nok Labs Unveils S3 Authentication Suite

03/17/2022
Enhancements include support for OpenID Connect as an integration mechanism.

Multiple Automotive Manufacturers Infected With Emotet

03/17/2022
Telemetry from industrial systems security firm Dragos has spotted the malware command-and-control servers communicating with several automotive manufacturer systems.

Cloudflare Announces API Gateway

03/17/2022
Organizations can secure, manage, and monitor all of their APIs in one easy-to-use dashboard.

Titaniam Announces Completion of Product Suite

03/17/2022
The Titaniam Suite includes ransomware and extortion defense capabilities in the form of five products.

Glasswall Launches Freemium Version of its Desktop Content Disarm and Reconstruction App

03/17/2022
Glasswall technology offers proactive protection from file-based cybersecurity threats.

Stopping Russian Cyberattacks at Their Source

03/17/2022
Step up training with cybersecurity drills, teach how to avoid social engineering traps, share open source monitoring tools, and make multifactor authentication the default.

Cut Down on Alert Overload and Leverage Layered Security Measures

03/17/2022
Feeling overwhelmed by the number of alerts? It doesn't have to be that way.

Enhancing DLP With Natural Language Understanding for Better Email Security

03/16/2022
Natural language understanding is well-suited for scanning enterprise email to detect and filter out spam and other malicious content. Armorblox introduces a data loss prevention service to its email security platform using NLU.

How Pen Testing Gains Critical Security Buy-in and Defense Insight

03/16/2022
It's more important than ever for companies to challenge their defenses, learning about new gaps and opportunities for improvement along the way.

4 Critical Capabilities for a SaaS Security Posture Management (SSPM) Solution

03/16/2022
The need for deep visibility and remediation for SaaS security settings is critical. If you're considering a SaaS Security Posture Management solution, here’s a checklist of what to look for.

CSC Unveils 3D Domain Monitoring Solution on DomainSec Platform

03/16/2022
Continuing CSC research indicates over 70% of brand-specific domains are fake.

Microsoft the No. 1 Most-Spoofed Brand in Phishing Attacks

03/16/2022
New Barracuda Networks data shows attackers sent some 3 million emails from around 12,000 pilfered accounts.

What the Newly Signed US Cyber-Incident Law Means for Security

03/16/2022
Bipartisan cybersecurity legislation comes amid increased worries over ransomware, and fears of cyberattacks from Russia in the wake of its invasion of Ukraine.

VPNs Give Russians an End Run Around Censorship

03/16/2022
As the invasion of Ukraine continues, Russian citizens have turned to virtual private networks — boosting demand for the software by 27x — to circumvent the government's blocks on social media and news sites critical of the war.

Russia State-Sponsored Hackers Used Misconfigured MFA to Breach NGO

03/16/2022
FBI and CISA warn of attack on multifactor authentication account to exploit "PrintNightmare" exploit.

Would 'Cyber Geneva Conventions' Defuse Online Aggression?

03/16/2022
International treaties could force nation-states to police bad actors within their borders to avoid penalties.

How Should My Security Analyst Use the MITRE ATT&CK Framework?

03/16/2022
As a curated knowledgebase for adversary behavior, the MITRE ATT&CK framework can guide defenders on how to conduct an investigation and the order of things to look for.

What Kind Of Security Tools Should I Provide My Developers?

03/15/2022
Who says developers don't care about security? Give them the tools to help them build security into their code.

Private Equity Firm Snaps Up RSA Conference

03/15/2022
Crosspoint Capital Partners, along with Clearlake Capital Group and Symphony Technology Group, are setting up RSA Conference as a separate company from RSA Security.

NAS Vendor Says Several of Its Products Likely Contain Linux 'Dirty Pipe' Flaw

03/15/2022
QNAP's disclosure this week is the latest reminder of the potentially wide impact of privilege escalation flaw in the Linux kernel.