Cybersecurity News


Black Hat 2020: Scaling Mail-In Voting Spawns Broad Challenges

Black Hat 2020: Scaling Mail-In Voting Spawns Broad Challenges Voting Village security celeb Matt Blaze delves into the logistics of scaling up mail-in voting ahead of November's election.
05 August 2020

SynerComm Reboots a Security Staple with 'Continuous' Pen Testing

SPONSORED CONTENT: Penetration testing has evolved well beyond a couple guys you hire to try and break into your network, according to SynerComm's Brian Judd. In addition to a service that offers round-the-clock pen testing, SynerComm also provides purple team testing, effectively splitting the difference with red- and blue-team exercises.
05 August 2020

Pen Testers Share the Inside Story of Their Arrest and Exoneration

Coalfire's Gary De Mercurio and Justin Wynn share the inside story of their infamous arrest last year while conducting a contracted red team engagement in an Iowa courthouse - and what it took to clear their names.
05 August 2020

Black Hat: When penetration testing earns you a felony arrest record

Coalfire takes us through the story of security professionals arrested at a courthouse while conducting tests on behalf of the state.
05 August 2020

Porn Clip Disrupts Virtual Court Hearing for Alleged Twitter Hacker

Perhaps fittingly, a Web-streamed court hearing for the 17-year-old alleged mastermind of the July 15 mass hack against Twitter was cut short this morning after mischief makers injected a pornographic video clip into the proceeding.
05 August 2020

Synopsys: Why Security-Minded Companies Are Transitioning to DevSecOps

SPONSORED: For too long, developers have had to weigh the tradeoffs between software security and feature development. But as DevSecOps continues to gain momentum over application security, organizations realize that adopting security in software development needn't be a drag on productivity, says Tim Mackey from the Synopsys Cybersecurity Research Center.
05 August 2020

Black Hat 2020: Open-Source AI to Spur Wave of ‘Synthetic Media’ Attacks

Black Hat 2020: Open-Source AI to Spur Wave of ‘Synthetic Media’ Attacks The explosion of open-source AI models are lowering the barrier of entry for bad actors to create fake video, audio and images - and Facebook, Twitter and other platforms aren't ready.
05 August 2020

HealthScare: Prioritizing Medical AppSec Research

Seth Fogie, information security director at Penn Medicine, explains which healthcare app vulnerabilities really matter in the day-to-day business of providing patient care.
05 August 2020

A Most Personal Threat: Implantable Medical Devices

Alan Michaels, director of the Electronic Systems Lab at the Virginia Tech Hume Center, explains why implanted medical devices could pose a threat to secure communication facilities.
05 August 2020

How An Electronic Medical Record System Flaw Exacerbated the Opioid Crisis

Mitch Parker, CISO of Indiana University Health, explains how healthcare appsec vulnerabilities and abuse can go undetected in small medical centers -- at great cost.
05 August 2020

A Paramedic's Guide to Cybersecurity: Video

In this video segment, the Dark Reading News Desk speaks to several guests about healthcare cybersecurity. We begin with Rich Mogull, infosec pro and paramedic, for a discussion about what lessons cybersecurity can learn from emergency medical services and the parallels that already exist.
05 August 2020

Voatz Delivers Multilayered Security to Protect Electronic Voting

SPONSORED CONTENT: While electronic voting has been plagued by fears of tampering or fraud, Voatz is looking to make the process more transparent and auditable, according to company founder Nimit Sawhney. He offers learning points from three recent pilots that highlight how governments can improve the integrity and better protect the voting process and its data.
05 August 2020

Voatz Delivers Multi-Layered Security to Protect Electronic Voting

SPONSORED CONTENT: While electronic voting has been plagued by fears of tampering or fraud, Voatz is looking to make the process more transparent and auditable, according to company founder Nimit Sawhney. He offers learning points from three recent pilots that highlight how governments can improve the integrity and better protect the voting process and its data.
05 August 2020

Russian Election Interference: What's Next?

Nate Beach-Westmoreland gives a look back at the past 10 years of Russian election interference and disinformation campaigns. What can we learn from the past and what should we expect as the 2020 US presidential election approaches?
05 August 2020

Black Hat: How hackers gain root access to SAP enterprise servers through SolMan

Researchers demonstrated how the SAP Solution Manager could provide a bridge to full server access.
05 August 2020

Building Cybersecurity Strategies in Sub-Saharan Africa

Evelyn Kilel and Laura Tich of Shehacks Ke discuss how they are working to build cybersecurity strategies that suit the needs and capabilities of developing nations.
05 August 2020

Twitter patches Android app to prevent exploitation of bug that can grant access to DMs

Actual bug resided in the Android 8 and Android 9 operating systems. Twitter updated its Android app to prevent exploitation.
05 August 2020

Attack of the Clone: Next-Gen Social Engineering

NeoEYED CTO Tamaghna Basu tells us how he created an AI bot to mimic him, how it could be used in social engineering attacks, and what the experience taught him about the value of true human connections.
05 August 2020

3 Tips for Securing Open Source Software

Maintaining myriad open source components can be tough. Here's how teams can begin to address open source security and continue to innovate.
05 August 2020

CISA Offers Tool for Career Navigation

The new Cyber Career Pathways Tool helps individuals understand the roles in cybersecurity and how to prepare for them.
05 August 2020