Name That Edge Toon: Out for the Count
Come up with a clever cybersecurity-related caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
https://www.darkreading.com/edge-articles/name-that-edge-out-for-the-count
Middle East's 5G Acceleration May Pose Serious Security Issues
Telcos across the Middle East are rapidly rolling out 5G networks. Will this accelerated adoption lead to higher security vulnerabilities?
https://www.darkreading.com/dr-global/middle-easts-5g-acceleration-may-pose-serious-security-issues
Meet Your New Cybersecurity Auditor: Your Insurer
As cyber insurance gets more expensive and competitive, security decision-makers have actionable opportunities to strengthen their cyber defenses.
https://www.darkreading.com/risk/meet-your-new-cybersecurity-auditor-your-insurer
Sky's the Limit, but What About API Security? Challenges in the Cloud-First Era
APIs enable cloud transformation but bring security risks, demanding robust, adaptive strategies to safeguard data and operations.
Keep Your Organization's APIs Protected This Holiday Season
Understanding API security risks isn't just a good idea — it's a business imperative. A single API breach can lead to financial losses and reputational damage.
To Improve Cyber Defenses, Practice for Disaster
Trained teams can implement and test security measures and protocols to prevent and mitigate cyber breaches.
https://www.darkreading.com/edge/to-improve-cyber-defenses-practice-for-disaster
Critical Atlassian Bug Exploit Now Available; Immediate Patching Needed
In-the-wild exploit activity from dozens of cyberattacker networks is ramping up for the security vulnerability in Confluence, tracked as CVE-2023-22518.
https://www.darkreading.com/attacks-breaches/critical-atlassian-bug-exploit-immediate-patching
Ace Hardware Still Reeling From Weeklong Cyberattack
Cyberattackers downed a quarter of the hardware giant's entire IT apparatus. Now, before the company can recover, they're going after individual branches.
https://www.darkreading.com/attacks-breaches/ace-hardware-still-reeling-from-weeklong-cyberattack
Okta Customer Support Breach Exposed Data on 134 Companies
1Password, BeyondTrust, and Cloudflare were among five customers directly targeted with stolen Okta session tokens, the company's CSO says.
'KandyKorn' macOS Malware Lures Crypto Engineers
Posing as fellow engineers, the North Korean state-sponsored cybercrime group Lazarus tricked crypto-exchange developers into downloading the hard-to-detect malware.
https://www.darkreading.com/endpoint/kandykorn-macos-malware-lures-crypto-engineers
Somebody Just Killed the Mozi Botnet
The once great botnet was nearly entirely eliminated in August. Why, who did it, and what comes next remain unclear.
https://www.darkreading.com/ics-ot/somebody-just-killed-mozi-botnet
Spyware Designed for Telegram Mods Also Targets WhatsApp Add-Ons
Researchers discovered spyware designed to steal from Android devices and from Telegram mods can also reach WhatsApp users.
Ransomware Readiness Assessments: One Size Doesn't Fit All
Tailored ransomware readiness assessments help organizations develop comprehensive response plans that minimize damage and restore operations quickly.
https://www.darkreading.com/operations/ransomware-readiness-assessments-one-size-doesnt-fit-all
Considerations for Managing Digital Sovereignty: The Executive Perspective
Business leaders must frequently balance the advantages of cloud computing and the free flow of data across geographic borders with the need to abide by local laws and regulations.
Oracle Enables MFA by Default on Oracle Cloud
Mandatory multifactor authentication is just the latest in Oracle's commitment to have security built-in by default into Oracle Cloud Infrastructure.
https://www.darkreading.com/dr-tech/oracle-enables-mfa-by-default-on-oracle-cloud
Okta Data Compromised Through Third-Party Vendor
After 1Password, MGM, and Caesars, yet more cybersecurity woes mount for the identity and access management company.
https://www.darkreading.com/remote-workforce/okta-employee-data-exposed-third-party-vendor
How Do We Truly Make Security 'Everyone's Responsibility'?
When everybody is responsible for a task, sometimes nobody takes ownership. Here are three steps to distribute cybersecurity throughout your organization.
Attackers Target Max-Severity Apache ActiveMQ Bug to Drop Ransomware
More than 3,000 systems are exposed and vulnerable to attack on the Internet.
Upgraded Kazuar Backdoor Offers Stealthy Power
The obscure Kazuar backdoor used by Russian attack group Turla has resurfaced, and it's more dangerous than ever.
https://www.darkreading.com/endpoint/upgraded-kazuar-backdoor-offers-stealthy-power
Saudi Aramco CEO Warns of New Threat of Generative AI
Oil executive Amin H. Nasser calls for global cooperation and international standards to combat the dark side of artificial intelligence.
https://www.darkreading.com/dr-global/saudi-aramco-ceo-warns-of-new-threat-of-generative-ai