Dark Reading:
Microsoft Uses Machine Learning to Predict Attackers' Next Steps
Researchers build a model to attribute attacks to specific groups based on tactics, techniques and procedures, and then figure out their next move.
New Malware Downloader Spotted in Targeted Campaigns
Saint Bot is being used to drop stealers on compromised systems but could be used to deliver any malware.
Wake Up and Smell the JavaScript
The SolarWinds attack showed the true meaning of a supply chain breach. And it's the canary in the coal mine for sensitive data on the Web.
Omdia Research Spotlight: XDR
Few emerging cybersecurity market segments are garnering more attention than XDR. Here, Omdia highlights its recent research on XDR.
Unofficial Android App Store APKPure Infected With Malware
The APKPure app store was infected with malware that can download Trojans to other Android devices, researchers report.
CISA Launches New Threat Detection Dashboard
Aviary is a new dashboard that works with CISA's Sparrow threat detection tool.
Battle for the Endpoint
How to build a new cyber strategy for 2021 and beyond.
8 Security & Privacy Apps to Share With Family and Friends
Mobile apps to recommend to the people in your life who want to improve their online security and privacy.
Women Are Facing an Economic Crisis & the Cybersecurity Industry Can Help
Investing in women's cybersecurity careers can bring enormous benefits and help undo some of the significant economic damage wrought by the pandemic.
Zoom Joins Microsoft Teams on List of Enterprise Tools Hacked at Pwn2Own
White-hat hacking event shows yet again why there's no such thing as foolproof security against modern attacks.
Fraudsters Use HTML Legos to Evade Detection in Phishing Attack
Criminals stitch pieces of HTML together and hide them in JavaScript files, researchers report.
600K Payment Card Records Leaked After Swarmshop Breach
A leaked database also contains the nicknames, hashed passwords, contact details, and activity history of Swarmshop admins, sellers, and buyers.
Handcuffs Over AI: Solving Security Challenges With Law Enforcement
We've tried everything else ... now it's time to make the prospect of getting caught -- and punished -- a real deterrent to cybercrime.
SecOps and DevOps: From Cooperation to Automation
Omdia Principal Analyst Eric Parizo discusses the major obstacles SecOps organizations face as they seek to build ties with DevOps teams, and offers a programmatic approach to help create a path toward DevSecOps.
Did 4 Major Ransomware Groups Truly Form a Cartel£
An analysis of well-known extortion groups and their cryptocurrency transactions reveals the answer.
Voice-Changing Software Found on APT Attackers' Server
Security researchers believe the presence of Morph Vox Pro could indicate APT-C-23 has new plans for their phishing campaigns.
Cring Ransomware Used in Attacks on European Industrial Firms
Attackers exploited a vulnerability in Fortigate VPN servers to gain access to target networks, researchers report.
Fortune 500 Security Shows Progress and Pitfalls
Fortune 500 companies have improved on email security and vulnerability disclosure programs but struggle in asset management and high-risk services.
Rethinking Cyberattack Response: Prevention & Preparedness
The SolarWinds incident is the starkest reminder yet that complacency can exact a terrible price.
5 Ways to Transform Your Phishing Defenses Right Now
By transforming how you approach phishing, you can break the phishing kill chain and meaningfully reduce your business risk.
Feed Fetched by RSS Dog.