Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

'Haozi' Gang Sells Turnkey Phishing Tools to Amateurs

The phishing operation is using Telegram groups to sell a phishing-as-a-service kit with customer service, a mascot, and infrastructure that requires little technical knowledge to install.

DARKReading
Certified Randomness Uses Quantum Cryptography to Make Stronger Keys

Researchers are using quantum computers to generate keys that are truly random to strengthen data encryption.

Hundreds of Web Apps Have Full Access to Microsoft OneDrive Files

Researchers at Oasis Security say the problem has to do with OneDrive File Picker having overly broad permissions.

#web#microsoft
CISA Issues SOAR, SIEM Implementation Guidance

Among the recommendations, organizations should conduct thorough testing and manage costs, which can be hefty, before implementing the platforms.

Implementing Secure by Design Principles for AI

Harnessing AI's full transformative potential safely and securely requires more than an incremental enhancement of existing cybersecurity practices. A Secure by Design approach represents the best path forward.

Cellcom Restores Regional Mobile Services After Cyberattack

Customers in parts of Wisconsin and Michigan could not make calls or send text messages for nearly a week after an incident on May 14, and service is still intermittent in some areas.

Why Take9 Won't Improve Cybersecurity

The latest cybersecurity awareness campaign asks users to pause for nine seconds before clicking — but this approach misplaces responsibility and ignores the real problems of system design.

Have Your Say: Dark Reading Seeks Your Input

Dark Reading is offering its readers the opportunity to tell us how we're doing via a new survey.

Zscaler Announces Deal to Acquire Red Canary

The August acquisition will bring together Red Canary's extensive integration ecosystem with Zscaler's cloud transaction data to deliver an AI-powered security operations platform.

Indian Police Arrest Cybercrime Gang Copycats of Myanmar Biz Model

The region offers attractive conditions: a large pool of tech workers, economic disparity, and weak enforcement of cybercrime laws — all of which attract businesses legitimate and shady.