Dark Reading

Is Cryptocurrency's Crash Causing Headaches for Ransomware Gangs?

07/14/2022
Bitcoin is down more than 70% from its highs late last year, causing disruptions for cybercriminals and the underground exchanges that fuel the dark markets.

Virtual CISOs Are the Best Defense Against Accelerating Cyber-Risks

07/14/2022
A poor, permanent hire can be a very expensive error, whereas a mis-hire on a virtual CISO can be rapidly corrected.

The Next Generation of Threat Detection Will Require Both Human and Machine Expertise

07/14/2022
To be truly effective, threat detection and response need to combine the strengths of people and technology.

Data Breaches Linked to Ransomware Declined in Q2 2022

07/14/2022
Phishing retained its place as the top root cause of data compromises, according to new data from the Identity Theft Resource Center (ITRC).

Researchers Devise New Speculative Execution Attacks Against Some Intel, AMD CPUs

07/13/2022
"Retbleed" bypasses a commonly used mechanism for protecting against a certain kind of side-channel attack.

CyberRatings.org Issues AAA Rating on Forcepoint's Cloud Network Firewall

07/13/2022
Forcepoint's test results are second in a series of publications on this new technology.

Report: Financial Institutions Overly Complacent About Current Authentication Methods

07/13/2022
New research report finds most financial organizations have experienced a breach due to an authentication weakness, yet only a third took action

Mozilla: EU's eIDAS Proposal Attracts Growing Criticism

07/13/2022
In the wrong hands, the changes could enable state-sponsored internet surveillance says Mozilla's Chief Security Officer

MacOS Bug Could Let Malicious Code Break Out of Application Sandbox

07/13/2022
Microsoft reveals now-fixed flaw in Apple's App Sandbox controls could allow attackers to escalate device privileges and deploy malware.

The 3 Critical Elements You Need for Vulnerability Management Today

07/13/2022
Most organizations are flying blind when remediating vulnerabilities. We lack the tooling to secure software fast enough. We need a new approach to vulnerability management now.

Internet Searches Reveal Surprisingly Prevalent Ransomware

07/13/2022
Two mostly defunct threats — WannaCry and NonPetya — top the list of ransomware searches, but does that mean they are still causing problems?

3 Golden Rules of Modern Third-Party Risk Management

07/13/2022
It's time to expand the approach of TPRM solutions so risk management is more effective in the digital world.

Survey: Small Cybersecurity Teams Face Greater Risk from Attacks than Larger Enterprises

07/13/2022
Cynet CISO survey reveals lack of staff, skills, and resources driving smaller teams to outsource security with advanced tools, technologies, and services.

Microsoft: 10,000 Orgs Targeted in Phishing Attack That Bypasses Multifactor Authentication

07/13/2022
The massive phishing campaign does not exploit a vulnerability in MFA. Instead, it spoofs an Office 365 authentication page to steal credentials.

US Government and QuSecure Orchestrate First-Ever Post-Quantum Encryption Communication over a Government Network

07/13/2022
QuSecure’s QuProtect leverages unique post-quantum cryptographic algorithm on government legacy systems to achieve world’s first and only post-quantum resilient channel within a government facility.

New Research Reveals 93% of Organizations Surveyed Have Had Failed IIoT/OT Security Projects

07/13/2022
Barracuda research finds organizations are struggling to protect operational technology and getting breached as a result.

Keep Humans in the Loop in SOC Operations

07/13/2022
Machine learning and automation can help free up security pros for higher-value tasks.

Exostar Empowers SMBs with Enhanced, Low-Cost, Easy-to-Use Microsoft 365 and CMMC 2.0 Solutions

07/13/2022
Upgrades to the Exostar platform promote secure, compliant collaboration and handling of controlled unclassified information.

QuickBooks Vishing Scam Targets Small Businesses

07/13/2022
Businesses receive an invoice via email with a credit card charge and are asked to call a fake number and hand over personal information to receive a refund.