Dark Reading: Attacks/Breaches
7 Recent Wins Against Cybercrime
Fri, 24 May 2019 09:00:00 EDT
The increasing number of successful law enforcement actions and prosecutions suggest that cybercriminals have plenty of reason to be looking over their shoulders.
To Manage Security Risk, Manage Data First
Thu, 23 May 2019 19:00:00 EDT
At Interop 2019, IT and security experts urged attendees to focus on data asset management as a means of mitigating risk.
Moody's Downgrade of Equifax: A Wake-up Call to Boards
Thu, 23 May 2019 18:20:00 EDT
The event provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.
FEC Gives Green Light for Free Cybersecurity Help in Federal Elections
Thu, 23 May 2019 16:15:00 EDT
Official opinion issued by the Federal Election Commission to nonprofit Defending Digital Campaigns is good news for free and reduced-cost security offerings to political candidates and committees.
Google's Origin & the Danger of Link Sharing
Thu, 23 May 2019 14:30:00 EDT
How the act of sharing links to files stored in a public cloud puts organizations at risk, and what security teams can do to safeguard data and PII.
Microsoft Opens Defender ATP for Mac to Public Preview
Thu, 23 May 2019 14:00:00 EDT
Users of the security platform who have preview features enabled can access Defender ATP for Mac via the Security Center onboarding section.
Russian Nation-State Hacking Unit's Tools Get More Fancy
Thu, 23 May 2019 13:35:00 EDT
APT28/Fancy Bear has expanded its repertoire to more than 30 commands for infecting systems, executing code, and reconnaissance, researchers have found.
Incident Response: 3 Easy Traps & How to Avoid Them
Thu, 23 May 2019 10:30:00 EDT
Sage legal advice about navigating a data breach from a troubleshooting cybersecurity outside counsel.
Alphabet's Chronicle Explores Code-Signing Abuse in the Wild
Wed, 22 May 2019 19:15:00 EDT
A new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security.
New Software Skims Credit Card Info From Online Credit Card Transactions
Wed, 22 May 2019 18:30:00 EDT
The new exploit builds a fake frame around legitimate portions of an online commerce website.
Baltimore Email, Other Systems Still Offline from May 7 Ransomware Attack
Wed, 22 May 2019 14:45:00 EDT
The city's mayor says there's no 'exact timeline on when all systems will be restored.'
DDoS Attacks Up in Q1 After Months of Steady Decline
Wed, 22 May 2019 14:15:00 EDT
Sudden surge suggests that new actors have stepped up to the plate to replace the old operators.
The 3 Cybersecurity Rules of Trust
Wed, 22 May 2019 10:30:00 EDT
Every day, keeping anything secure requires being smart about trust. The rules of trust will keep you and your data safer.
What You Need to Know About Zero Trust Security
Wed, 22 May 2019 08:30:00 EDT
The zero trust model might be the answer to a world in which perimeters are made to be breached. Is it right for your organization?
Satan Ransomware Adds More Evil Tricks
Tue, 21 May 2019 19:00:00 EDT
The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully.
To Narrow the Cyber Skills Gap with Attackers, Cut the Red Tape
Tue, 21 May 2019 14:30:00 EDT
Attackers are getting further ahead, and entrenched corporate rules shoulder much of the blame.
KnowBe4 Focuses on Security Culture with CLTRe Acquisition
Tue, 21 May 2019 13:30:00 EDT
The acquisition solidifies KnowBe4's European presence and shows a focus on building and measuring security culture.
Old Threats Are New Again
Tue, 21 May 2019 10:00:00 EDT
They may look familiar to you, and that isn't a coincidence. New threats are often just small twists on old ones.
TeamViewer Admits Breach from 2016
Mon, 20 May 2019 17:30:00 EDT
The company says it stopped the attack launched by a Chinese hacking group.
New Trickbot Variant Uses URL Redirection to Spread
Mon, 20 May 2019 17:00:00 EDT
Switch in tactic is the latest attempt by operators of the prolific banking Trojan to slip past detection mechanisms.