Dark Reading

KnowBe4 Simplifies Compliance Requirements for Healthcare Privacy

09/29/2022
KnowBe4's Compliance Audit Readiness Assessment (CARA) now addresses select requirements from HIPAA Security Rule.

Pathlock Expands SAP Capabilities with Acquisition of Grey Monarch

09/29/2022
Combination of two companies to help SAP customers streamline audit, compliance and control processes.

Ransomware Attacks Continue Increasing: 20% of All Reported Attacks Occurred in the Last 12 Months - New Survey

09/29/2022
Survey of over 2,000 IT pros revealed that a quarter either don't know or don't think Microsoft 365 data can be affected by ransomware.

Why the US Should Help Secure Mexican Infrastructure — and What It Gets in Return

09/29/2022
Call it cross-border enlightened self-interest: As one of the US's premier trade partners and closest neighbors, what's bad for Mexico is bad for the US.

The Country Where You Live Impacts Password Choices

09/29/2022
Literacy, levels of personal freedom, and other macro-social factors help determine how strong average passwords are in a given locale, researchers have found.

Dangerous New Attack Technique Compromising VMware ESXi Hypervisors

09/29/2022
China-based threat actor used poisoned vSphere Installation Bundles to deliver multiple backdoors on systems, security vendor says.

3 Reasons Why BEC Scams Work in Real Estate

09/29/2022
Identity verification could be the key to fighting back and building trust in an industry beset with high-stakes fraud.

(ISC)² Recruits More Than 55,000 Cybersecurity Candidates in First 30 Days of New Programs to Address Workforce Gap

09/29/2022
2,700 cybersecurity career pursuers have already passed the (ISC)2 Certified in Cybersecurity℠ exam, with more than 53,000 more people registered for a free course and exam.

Capital One Phish Showcases Growing Bank-Brand Targeting Trend

09/29/2022
Capital One lures leveraged the bank's new partnership with Authentify, showing that phishers watch the headlines, and take advantage.

Espionage Group Wields Steganographic Backdoor Against Govs, Stock Exchange

09/29/2022
APT group Witchetty (aka LookingFrog) has exploited the ProxyShell and ProxyLogon vulnerabilities to gain initial access and deploy new custom cyber tools against government agencies and a stock exchange.

XSS Flaw in Prevalent Media Imaging Tool Exposes Trove of Patient Data

09/29/2022
Bugs in Canon Medical's Virea View could allow cyberattackers to access several sources of sensitive patient data.

What Lurks in the Shadows of Cloud Security?

09/29/2022
Organizations looking to get ahead in cloud security have gone down the path of deploying CSPM tooling with good results. Still, there’s a clear picture that data security and security operations are next key areas of interest.

Fake Accounts Are Not Your Friends!

09/28/2022
Inflated user bases and fake engagement cause more harm than good, especially when the artificial accounts are based on stolen human identities.

Plug Your Data Leaks: Integrating Data Loss Prevention into Your Security Stack

09/28/2022
The average cost of a data-exposing cybersecurity incident is $4.35 million. If your business can’t avoid to pay, make sure you’ve got a strong data loss prevention practice in place.

Google Quashes 5 High-Severity Bugs With Chrome 106 Update

09/28/2022
External researchers contributed 16 of the 20 security updates included in the new Chrome 106 Stable Channel rollout, including five high-severity bugs.

Sophisticated Covert Cyberattack Campaign Targets Military Contractors

09/28/2022
Malware used in the STEEP#MAVERICK campaign features rarely seen obfuscation, anti-analysis, and evasion capabilities.

Fast Company CMS Hack Raises Security Questions

09/28/2022
The company's website remains offline after hackers used its compromised CMS to send out racist messages.

Container Supply Chain Attacks Cash In on Cryptojacking

09/28/2022
Cloud-native threats are costing cloud customer victims money as cryptojackers mine their vulnerable cloud instances.

Google Cloud DORA: Securing the Supply Chain Begins With Culture

09/28/2022
The team's annual survey finds that the right development culture is better than technical measures when it comes to shoring up software supply chain security practices. An additional benefit: Less burnout.

Phishing Attacks Crushed Records Last Quarter, Driven by Mobile

09/28/2022
Shocking phishing numbers (more than 1 million in a single quarter) are being driven by vishing, smishing, and other lures that target mobile devices.