Dark Reading

Cyberattackers Double Down on Bypassing MFA

03/01/2023
As companies increasingly adopt MFA, cybercriminals are developing a variety of strategies to steal credentials and gain access to high-value accounts anyway.

CISOs Share Their 3 Top Challenges for Cybersecurity Management

02/28/2023
The biggest dilemmas in running a modern cybersecurity team are not all about software, said CISOs from HSBC, Citi, and Sepio.

Google Adds Client-Side Encryption to Gmail, Calendar

02/28/2023
The data protection capability is now available across multiple Workspace applications: Gmail, Calendar, Drive, Docs, Slides, Sheets, and Meet.

Hoxhunt Launches Human Risk Management Platform

02/28/2023
Platform uniquely designed to facilitate automated compliance, security behavior change.

LastPass DevOps Engineer Targeted for Cloud Decryption Keys in Latest Breach Revelation

02/28/2023
The adversaries obtained a decryption key to a LastPass database containing multifactor authentication and federation information as well as customer vault data, company says.

Exfiltrator-22: The Newest Post-Exploitation Toolkit Nipping at Cobalt Strike's Heels

02/28/2023
The framework-as-a-service signals an intensification of the cat-and-mouse game between defenders detecting lateral movement, and cybercriminals looking to go unnoticed.

US Marshals Ransomware Hit Is 'Major' Incident

02/28/2023
Unknown attackers made off with a raft of PII, the Justice Department says — but witnesses in the protection program are still safe.

WannaCry Hero & Kronos Malware Author Named Cybrary Fellow

02/28/2023
Marcus Hutchins, who set up a "kill switch" that stopped WannaCry's spread, later pled guilty to creating the infamous Kronos banking malware.

Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist

02/28/2023
The opportunistic "SCARLETEEL" attack on a firm's Amazon Web Services account turns into targeted data theft after the intruder uses an overpermissioned service to jump into cloud system.

China's BlackFly Targets Materials Sector in 'Relentless' Quest for IP

02/28/2023
Separate attacks on two subsidiaries of an Asian conglomerate reflect a surge of cyber-espionage activity in the region in the last 12 months.

The DoJ Disruption of the Hive Ransomware Group Is a Short-Lived Win

02/28/2023
The war on critical infrastructure demands a better security strategy.

Attackers Were on Network for 2 Years, News Corp Says

02/27/2023
The publisher of the Wall Street Journal, New York Post, and several other publications had last year disclosed a breach it said was the work of a state-backed actor likely working for China.

Wiz Reaches $10B Valuation With Consolidated Cloud Security Platform

02/27/2023
Cloud security vendor Wiz has raised $900 million since its founding in 2020.

Vouched Raises $6.3M to Expand AI Identity Verification Offering to Telemedicine and Healthcare

02/27/2023
Vouched now covers more than 85% of the global population, as demand accelerates for its platform to securely automate KYC and KYP compliance to better serve patients and drive revenue.

How to Reduce Code Risk Using Pipelineless Security

02/27/2023
The exposure and exploitation of hardcoded secrets continues to drive software supply chain attacks. One solution: zero new hardcoded secrets.

All CVEs Are Not Created Equal

02/27/2023
Vulnerabilities impact each industry differently, so each sector needs to think about its defenses and vulnerability management differently.

Palo Alto Announces Zero-Trust Security Solution for OT

02/27/2023
New Zero Trust OT Security solution secures critical infrastructure without additional sensors.

Edgio Strengthens Security Offering With WAAP Enhancements and DDoS Scrubbing Solution

02/27/2023
Upgrades boost Edgio's ability to mitigate sophisticated threats and safeguard applications and data.

How the Ukraine War Opened a Fault Line in Cybercrime, Possibly Forever

02/27/2023
Infighting, conscription, emigration. The war in Ukraine has pitted cybercriminals against one another like no other event before it.

As Social Engineering Attacks Skyrocket, Evaluate Your Security Education Plan

02/27/2023
Build a playbook for employees on how to handle suspicious communications, use mail filters, and screen and verify unfamiliar calls to bolster a defensive social engineering security strategy.