Dark Reading

Building Guardrails for Autonomic Security

07/18/2022
AI's potential for automating security has promise, but there are miles to go in establishing decision-making boundaries.

Watch Out for User Impersonation in Low-Code/No-Code Apps

07/18/2022
How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.

Netwrix Auditor Bug Could Lead to Active Directory Domain Compromise

07/15/2022
IT asset tracker and auditor software has a critical issue with insecure object deserialization that could allow threat actors to execute code, researchers say.

What Are the Risks of Employees Going on a 'Hybrid Holiday'?

07/15/2022
As more employees plan on taking longer holidays and working remotely from the destination for part of that time, organizations have to consider the risks. Like Wi-Fi networks.

How Attackers Could Dupe Developers into Downloading Malicious Code From GitHub

07/15/2022
Developers need to be cautious about whom they trust on GitHub because it's easy to establish fake credibility on the platform, security vendor warns.

Ex-CIA Programmer Found Guilty of Stealing Vault 7 Data, Giving It to Wikileaks

07/15/2022
Joshua Schulte has been convicted for his role in the Vault 7 Wikileaks data dump that exposed invasive US cyber intelligence tactics.

Sandworm APT Trolls Researchers on Its Trail as It Targets Ukraine

07/15/2022
Researchers who helped thwart the Russian nation-state group's recent attack on Ukraine's power supply will disclose at Black Hat USA what they found while reverse-engineering the powerful Industroyer2 malware used by the powerful hacking team.

How Hackers Create Fake Personas for Social Engineering

07/15/2022
And some ways to up your game for identifying fabricated online profiles of people who don't exist.

Bishop Fox Secures $75 Million in Growth Funding From Carrick Capital Partners

07/14/2022
Offensive security leader continues to defy market and economic trends with record growth and recognized innovation.

DHS Review Board Deems Log4j an 'Endemic' Cyber Threat

07/14/2022
Vulnerability will remain a "significant" threat for years to come and highlighted the need for more public and private sector support for open source software ecosystem, Cyber Safety Review Board says.

New Phishing Kit Hijacks WordPress Sites for PayPal Scam

07/14/2022
Attackers use scam security checks to steal victims' government documents, photos, banking information, and email passwords, researchers warn.

Scribe Security Releases Code Integrity Validator Alongside Github Security Open Source Project

07/14/2022
Developers can now rest assured that the code they are using, as well as their GitHub accounts, are safe.

AEI HorizonX Ventures Joins Shift5 Series B Funding Round

07/14/2022
Investment bolsters Shift5’s traction within commercial aerospace and defense industries.

Data of Nearly 2M Patients Exposed in Ransomware Attack on Healthcare Debt Collection Firm

07/14/2022
Professional Finance Company (PFC) was hit in February 2022 by a ransomware attack.

Is Cryptocurrency's Crash Causing Headaches for Ransomware Gangs?

07/14/2022
Bitcoin is down more than 70% from its highs late last year, causing disruptions for cybercriminals and the underground exchanges that fuel the dark markets.

Virtual CISOs Are the Best Defense Against Accelerating Cyber-Risks

07/14/2022
A poor, permanent hire can be a very expensive error, whereas a mis-hire on a virtual CISO can be rapidly corrected.

The Next Generation of Threat Detection Will Require Both Human and Machine Expertise

07/14/2022
To be truly effective, threat detection and response need to combine the strengths of people and technology.

Data Breaches Linked to Ransomware Declined in Q2 2022

07/14/2022
Phishing retained its place as the top root cause of data compromises, according to new data from the Identity Theft Resource Center (ITRC).

Researchers Devise New Speculative Execution Attacks Against Some Intel, AMD CPUs

07/13/2022
"Retbleed" bypasses a commonly used mechanism for protecting against a certain kind of side-channel attack.

CyberRatings.org Issues AAA Rating on Forcepoint's Cloud Network Firewall

07/13/2022
Forcepoint's test results are second in a series of publications on this new technology.