A series of business email compromise campaigns has been targeting executives of more than 1,000 companies, most recently in the US and Canada.
from Dark Reading: https://ift.tt/2XHeoSC
via IFTTT
A series of business email compromise campaigns has been targeting executives of more than 1,000 companies, most recently in the US and Canada.
from Dark Reading: https://ift.tt/2XHeoSC
via IFTTT
Vigilance and ongoing training combined with an integrated security framework are key aspects of a successful strategy in the fight against the latest crop of pandemic opportunists.
from Dark Reading: https://ift.tt/2XCUOql
via IFTTT
Google Project Zero researcher Maddie Stone explains the importance of identifying flaws exploited in the wild and techniques used to do it.
from Dark Reading: https://ift.tt/30zYsn5
via IFTTT
Approaches based on questionnaires and self-evaluation are not always a good indicator of how well a user can mitigate social engineering threats.
from Dark Reading: https://ift.tt/3fIsqJX
via IFTTT
DHS CISA’s Christopher Krebs and Georgetown University’s Matt Blaze at Black Hat USA give the lowdown on where things stand so far and what still needs to happen before Nov. 3 to protect the integrity of the US presidential election.
from Dark Reading: https://ift.tt/33y0plA
via IFTTT
Dark Reading Editor-in-Chief gives a complete rundown of all the Dark Reading projects you might not even know about, his insight into the future of the security industry, and how we plan to cover it.
from Dark Reading: https://ift.tt/3kkxG9V
via IFTTT
Cornell researcher Paul Grubbs discusses how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages.
from Dark Reading: https://ift.tt/31sC3Y0
via IFTTT
Security engineer Dylan Ayrey and Cruise senior infrastructure security engineer Allison Donovan describe fundamental weaknesses in GCP identity management that enable privilege escalation and lateral movement.
from Dark Reading: https://ift.tt/3ilR9FD
via IFTTT
From Russia’s “best-in-class” efforts at widening social divides in Western democracies to China’s blunt attacks on dissidents, information operations are becoming a greater threat, says a Stanford researcher.
from Dark Reading: https://ift.tt/3fx9f5v
via IFTTT
Mandiant incident response managers Josh Madeley and Doug Bienstock describe how thoroughly Microsoft 365 (formerly known as Office 365) extends into corporate networks, describe both sophisticated and simple attacks they’ve detected, and suggest mitigations as businesses rely more heavily on the cloud.
from Dark Reading: https://ift.tt/3gzUa4p
via IFTTT