Skip to main content

Dark Reading: Cybersecurity News and Commentary

Critical OAS bugs open industrial systems to takeover.

Views expressed in this cybersecurity-cyber crime update are those of the reporters and correspondents.

Accessed on 29 May 2022, 1452 UTC.

Content supplied by "DarkReading.com."

Source:  https://www.darkreading.com/

Please click link or scroll down to read your selections.

Thanks for joining us today.

Russ Roberts

https://www.hawaiicybersecurityjournal.net

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security)

Latest News

Critical OAS Bugs Open Industrial Systems to Takeover

The most serious flaw gives attackers a way to remotely execute code on systems that many organizations use to move data in critical ICS environments, security vendor says.


Space Force Expands Cyber Defense Operations

Space Force's Delta 6 cyber-defense group adds squadrons, updates legacy Satellite Control Network.



Scammer Behind $568M International Cybercrime Syndicate Gets 4 Years

The 14th defendant behind The Infraud Organization contraband marketplace has been sentenced, this time for one count of racketeering.


New Chaos Malware Variant Ditches Wiper for Encryption

The Chaos ransomware-builder was known for creating destructor malware that overwrote files and made them unrecoverable -- but the new Yashma version finally generates binaries that can encrypt files of all sizes.


ChromeLoader Malware Hijacks Browsers With ISO Files

The malware’s abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.


Microsoft Unveils Dev Box, a Workstation-as-a-Service

Microsoft Dev Box will make it easier for developers and hybrid teams to get up and running with workstations already preconfigured with required applications and tools.


Broadcom Snaps Up VMware in $61B Deal

Massive merger will put Broadcom's Symantec and VMware's Carbon Black under one roof.


Lacework Announces Layoffs, Restructuring

The cloud-security company blames "seismic" market shifts for shakeup.


Latest Commentary

Physical Security Teams' Impact Is Far-Reaching

Here's how physical security teams can integrate with the business to identify better solutions to security problems.

Tom Kopecky photo

May 27, 2022


The FDA's New Cybersecurity Guidance for Medical Devices Reminds Us That Safety & Security Go Hand in Hand

The new draft guidance on premarket submissions incorporates quality system regulations and doubles down on a life-cycle approach to product security.

Roman Kesler

May 26, 2022



Act Now: Leveraging PCI Compliance to Improve Security

Let the threat landscape guide your company's timeline for complying with new data security standards for credit cards. Use the phase-in time to improve security overall — security as a process — not just comply with new standards.

Tim Erlin

May 26, 2022


Spring Cleaning Checklist for Keeping Your Devices Safe at Work

Implement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and employees' devices secure.

Alex Lisle

May 25, 2022


Industry 4.0 Points Up Need for Improved Security for Manufacturers

With manufacturing ranking as the fourth most targeted sector, manufacturers that understand their exposure will be able to build the necessary security maturity.

Photo of Jordan Kendall

May 25, 2022


Comments

Popular posts from this blog

Cyber War News Today

The Lazarus Heist:  North Korea's Global Cyber War. Views expressed in this cybersecurity, cyber crime, and cyber war update are those of the reporters and correspondents. Accessed on 15 July 2022, 2102 UTC. Content provided by "Cyber War News Today" via EIN Presswire. Source: https://cyberwar.einnews.com/news/cyber-war-news?n=2&code=FA9GNesSTpp2rjO1&utm_source=NewsletterNews&utm_medium=email&utm_campaign=Cyber+War+News&utm_content=navig Please click link or scroll down to read your selections. Thanks for joining us today. Russ Roberts https://www.hawaiicybersecurityjournal.net https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security) CYBER WAR NEWS MONITORING Get by    Email    •     RSS Published on  09:50 GMT Episode 32: The Lazarus Heist: Inside North Korea’s Global Cyber War This has included the exploitation of central banks, cryptocurrency exchanges, Hollywood film studios and the UK’s National He

PCMag SecurityWatch

Why you should use a password manager. Views expressed in this cybersecurity-cyber crime update are those of the reporters and correspondents.  Accessed on 03 May 2022, 2106 UTC. Content provided by email subscription to "PCMag SecurityWatch." Source: https://mail.google.com/mail/u/0/?tab=rm&ogbl#inbox/FMfcgzGpFgxgqfdbDVRXPKwQddxlxSNs Please click link or scroll down to read your selections. Thanks for joining us today. Russ Roberts https://hawaiicybersecurityjournal.blogspot.com https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security) A Plea for Password Management Best Practices In just about every SecurityWatch newsletter, I manage to shoehorn in encouragement for readers to use a  password manager . I mean, why not? There are  free password managers , and many of the paid versions are inexpensive. Adding an extra step to your online routine can be a pain, but the benefits of keeping complex and unique passwords in an e

The Hacker News Daily Updates

Cryptocurrency miners target Dockers, AWS, and Alibaba Cloud. Views expressed in this cybersecurity-cyber crime update are those of the reporters and correspondents. Accessed on 22 April 2022, 2145 UTC. Content provided by email subscription to "The Hacker News Daily Updates." Source: https://mail.google.com/mail/u/0/#inbox/FMfcgzGpFWVTmXkJpMdqVkbnDPJwrjfp Please click link or scroll down to read your selections. Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.blogspot.com). The Hacker News Daily Updates Security Orchestration Dummies Understaffed security teams struggle to execute standard processes across products in the face of rising alert volumes. Security orchestration has rapidly emerged to fill in these industry gaps by providing general-purpose workflow automation and oversight across security products. Download Now Sponsored LATEST NEWS Apr 22, 2022 Researcher Releases PoC for Recent Java Cryptographic Vulnerability A proof-of-conce