Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-05 15:12:00 |
US Based ICOIN Technology Announces Secure Messaging Solution Using Hardware Wallet Encryption (lien direct) |
Pas de details / No more details |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-05 15:11:27 |
Space Race: Defenses Emerge as Satellite-Focused Cyberattacks Ramp Up (lien direct) |
Amid escalating cyber activity, two separate cybersecurity frameworks are targeting the satellite arena, highlighting the ease in attacking the infrastructure and the difficulty in defending it. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-05 15:06:00 |
Netskope Receives $401M In New Funding (lien direct) |
Pas de details / No more details |
|
|
★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-05 15:00:00 |
How to Ensure Cybersecurity Investments Remain a Priority Across Your Organization (lien direct) |
Collaboration across all business units is key to building a robust cybersecurity program. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-05 14:37:00 |
Trend Micro Announces New Subsidiary for 5G Cybersecurity (lien direct) |
Pas de details / No more details |
Prediction
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-04 23:21:00 |
Rackspace: Ransomware Attack Bypassed ProxyNotShell Mitigations (lien direct) |
The hosting provider had not applied Microsoft's new patch due to publicly reported issues with the update. |
Ransomware
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-04 22:01:56 |
Five Guys Data Breach Puts HR Data Under a Heat Lamp (lien direct) |
Job applicants could face a raft of follow-on attacks after cyber intruders accessed their data in an opportunistic attack. |
Data Breach
|
|
★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-04 18:33:00 |
What Are Some Ways to Make APIs More Secure? (lien direct) |
Developers should go beyond the basics to make it harder to exploit the API. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-04 18:27:00 |
Effective and Efficient Automation for Security Teams (lien direct) |
Even very short tasks may be worth automating if you do them frequently. Here's how to decide what to tackle first. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-04 16:29:00 |
CORL Technologies Introduces Proactive Third-Party Incident Response Solution for Healthcare (lien direct) |
Pas de details / No more details |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-04 15:46:00 |
BitRat Malware Gnaws at Victims With Bank Heist Data (lien direct) |
Attackers have compromised a Colombian financial institution and are using a bevy of leaked customer details in further malicious activity to spread an info-gathering remote access Trojan (RAT). |
Malware
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-04 15:00:00 |
Understanding Infrastructure-as-Code Risks in the Cloud (lien direct) |
Improve overall IT administration and establish a framework to identify misconfigurations and automate the process of checking IaC before it makes it into the production environment. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-04 14:25:00 |
Insights On the Mobile Biometrics Global Market To 2028 - Increase In Platforms Using Biometric Authentication Drives Growth (lien direct) |
Pas de details / No more details |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-04 00:51:00 |
2023 Will See Renewed Focus on Quantum Computing (lien direct) |
Adopting post-quantum cryptography is something that has been discussed for years; it's time for organizations to get to work. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-03 21:25:36 |
Cyberattackers Torch Python Machine Learning Project (lien direct) |
The popular PyTorch Python project for data scientists and machine learning developers has become the latest open source project to be targeted with a dependency confusion attack. |
|
|
★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-03 20:20:00 |
C2A Security To Showcase Automotive Cybersecurity DevOps Platform at CES In Las Vegas, January 5-8 (lien direct) |
Pas de details / No more details |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-03 19:03:00 |
WordPress Sites Under Attack from Newly Found Linux Trojan (lien direct) |
Researchers who discovered the backdoor Linux malware say it may have been around for more than three years - and it targets 30+ plugin bugs. |
Malware
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-03 18:58:00 |
Holiday Spirit? LockBit Gives Children\'s Hospital Free Decryptor (lien direct) |
The Russian-speaking cybercrime gang said an affiliate violated its rules against attacks that could lead to bodily harm for medical patients. |
Guideline
Medical
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-03 16:55:17 |
Raspberry Robin Worm Hatches a Highly Complex Upgrade (lien direct) |
The Evil Corp-linked malware family has undergone an evolution, becoming more obfuscated and "several times more complex," as the group behind it tests how far the worm can be spread. |
Malware
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-03 16:43:00 |
Chinese \'RedZei\' Group Batters Victims With Incessant Vishing Effort (lien direct) |
The cybercriminals switch up carriers and SIM cards regularly, making it difficult for either mobile users or telecom companies to block the barrage of malicious calls and voicemails. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-03 16:01:21 |
(Déjà vu) Name That Edge Toon: The Upside Down (lien direct) |
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card. |
|
|
★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-03 15:00:00 |
Are Meta and Twitter Ushering in a New Age of Insider Threats? (lien direct) |
The era of digital trust is broken, and constant vigilance is needed to get things back on track. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2023-01-03 14:00:00 |
Black Hat Flashback: The Day That Dan Kaminsky Saved the Internet (lien direct) |
Dark Reading's Kelly Jackson Higgins explains the enormous legacy left behind by Dan Kaminsky and his seminal "Great DNS Vulnerability" talk at Black Hat 2008. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-30 17:00:00 |
API Security Is the New Black (lien direct) |
API security is so hot right now. |
|
|
★★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-30 15:00:00 |
War and Geopolitical Conflict: The New Battleground for DDoS Attacks (lien direct) |
The effectiveness of attacks largely depends on organizations' distributed denial-of-service defenses. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-30 14:50:00 |
Adobe, Apple, Cisco, Microsoft Flaws Make Up Half of KEV Catalog (lien direct) |
CISA's Known Exploited Vulnerabilities Catalog has become a valuable repository of vulnerabilities to be patched. A pair of reports analyze the vulnerabilities under attack to understand the kind of threats organizations should be prioritizing. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-30 14:00:00 |
Beyond the Obvious: The Boldest Cybersecurity Predictions for 2023 (lien direct) |
Dark Reading's panel of security experts deliver a magnum of bubbly hot takes on what 2023 will look like, featuring evil AIs, WWIII, wild workplace soon-to-be-norms, and more. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-29 19:00:00 |
6 Ways to Protect Your Organization Against LAPSUS$ (lien direct) |
Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-29 17:00:00 |
Extracting Encrypted Credentials From Common Tools (lien direct) |
Attackers are harvesting credentials from compromised systems. Here's how some commonly used tools can enable this. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-29 17:00:00 |
3 Industries, 3 Security Programs (lien direct) |
Security leaders from a media corporation, a commercial real estate company, and an automotive technology company share how they address cyber-risk. |
Guideline
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-29 15:00:00 |
After the Uber Breach: 3 Questions All CISOs Should Ask Themselves (lien direct) |
How CISOs handle the ethical issues around data breaches can make or break their careers. Don't wait until a breach happens to plot the course forward. |
|
Uber
Uber
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-29 14:00:00 |
New Year\'s Surprise: Cybersecurity M&A, Funding Activity Snowballs in Q4 (lien direct) |
Concerns about recessionary trends impacting the cybersecurity sector in 2022 remained largely unfounded in Q4, as investment activity surged after a Q3 slowdown. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-28 17:00:00 |
When CISOs Are Ready to Hunt (lien direct) |
This is what happens when a CISO gets tired of reacting to attacks and goes on the offensive. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-28 17:00:00 |
Healthcare Providers and Hospitals Under Ransomware\'s Siege (lien direct) |
According to the FBI and Internet Crime Complaint Center, 25% of ransomware complaints involve healthcare providers. |
Ransomware
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-28 15:00:00 |
Why Cyber Pros and Forensic Accountants Should Work Together to Mitigate Security Risk (lien direct) |
It's time companies build a multilayered approach to cybersecurity. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-28 14:00:00 |
Will the Crypto Crash Impact Cybersecurity in 2023? Maybe. (lien direct) |
Will the bottom falling out of the cryptocurrency market have a profound impact on cybercriminal tactics and business models? Experts weigh in on what to expect. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-28 05:15:00 |
Securing and Improving User Experience for the Future of Hybrid Work (lien direct) |
Digital transformation initiatives are challenging because IT still has to make sure performance doesn't suffer by making applications available from anywhere. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-27 17:00:00 |
Why Attackers Target GitHub, and How You Can Secure It (lien direct) |
The unfettered collaboration of the GitHub model creates a security headache. Follow these seven principles to help relieve the pain. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-27 17:00:00 |
How to Get the Most Out of UEBA (lien direct) |
Security teams are considering how to get the most out of user entity behavior analytics by taking advantage of its strengths and augmenting its limitations. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-27 15:00:00 |
The Threat of Predictive Policing to Data Privacy and Personal Liberty (lien direct) |
Inaccurate information from data brokers can damage careers and reputations. It's time for US privacy laws to change how law enforcement and legal agencies obtain and act on data. |
Threat
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-27 14:00:00 |
Internet AppSec Remains Abysmal & Requires Sustained Action in 2023 (lien direct) |
A variety of initiatives - such as memory-safe languages and software bills of materials - promise more secure applications, but sustained improvements will require that vendors do much better, researchers agree. |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-23 18:18:27 |
Container Verification Bug Allows Malicious Images to Cloud Up Kubernetes (lien direct) |
A complete bypass of the Kyverno security mechanism for container image imports allows cyberattackers to completely take over a Kubernetes pod to steal data and inject malware. |
|
Uber
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-23 17:39:00 |
LastPass Cops to Massive Breach Including Customer Vault Data (lien direct) |
The follow-on attack from August's source-code breach could fuel future campaigns against LastPass customers. |
|
LastPass
|
★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-23 17:15:00 |
Videoconferencing Worries Grow, With SMBs in Cyberattack Crosshairs (lien direct) |
Securing videoconferencing solutions is just one of many IT security challenges small businesses are facing, often with limited financial and human resources. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-23 15:12:00 |
Google: With Cloud Comes APIs & Security Headaches (lien direct) |
APIs are key to cloud transformation, but two Google surveys find that cyberattacks targeting them are reaching a tipping point, even as general cloud security issues abound. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-23 15:00:00 |
Fool Me Thrice? How to Avoid Double and Triple Ransomware Extortion (lien direct) |
To stay safer, restrict access to data, monitor for breaches in the supply chain, track relevant data that is sold on the Dark Web, and implement best safety practices. |
Ransomware
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-23 00:01:00 |
Security Is a Second-Class Citizen in High-Performance Computing (lien direct) |
Vendors and operators attempt to balance power and security, but right now, power is the highest goal. |
|
|
★★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-23 00:00:00 |
What Kind of Data Gets Stolen When a Developer is Compromised? (lien direct) |
What is the worst that can happen when a developer's machine is compromised? Depending on the developer's position, attackers gain access to nearly everything: SSH keys, credentials, access to CI/CD pipelines and production infrastructure, the works. |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-22 21:23:00 |
New Brand of Security Threats Surface in the Cloud (lien direct) |
Tech Insight report co-produced by Black Hat, Dark Reading, and Omdia examines how cloud security is evolving in a rapid race to beat threat actors to the (cloud) breach. |
Threat
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2022-12-22 21:07:00 |
Inside the Next-Level Fraud Ring Scamming Billions Off Holiday Retailers (lien direct) |
"Largest attack of its kind": A potent Southeast Asian e-commerce fraud ring has declared war on US retailers, targeting billions in goods in just the past month and forcing mules into its scheme. |
|
|
★★★
|