#darkreading

2025-08-29

Are data brokers misbehaving when it comes to compliance with CCPA? Are their actions sinister or simply part of their learning curve? A UCI study looked at these data brokers' actions. Here's my take in #DarkReading

darkreading.com/data-privacy/g

Γ‰ric Freyssinetericfreyss
2025-06-30
Geekmaster πŸ‘½:system76:Geekmaster@ioc.exchange
2025-01-17

I've been saying for decades now - NO SYSTEM IS SAFE FROM #HACKERS! #Mac users have always evangelized that "Macs are more secure, so I don't need antivirus software". Still untrue. Today, #Apple has a larger market share than ever. And while Apple hardware is seen as more secure by design, due in part to their closed eco-system, users are still the weakest link, which means YOU NEED TO PROTECT YOURSELF, FROM YOURSELF. This article from #DarkReading highlights this fact - no system is safe, including Macs.

Install anti-everything software on all your systems and devices. EVERYTHING is at risk. #StayVigalent #CyberSecurity #Hacking #InfoStealers

darkreading.com/threat-intelli

Teddy / Domingo (πŸ‡¨πŸ‡΅/πŸ‡¬πŸ‡§)TeddyTheBest@framapiaf.org
2025-01-09

#darkreading
Zivver, a leader in secure #communications, has published its latest report, shedding light on critical gaps in #email #security practices and their alignment with increasing regulatory requirements 2025
darkreading.com/endpoint-secur

2024-11-22

Hey, my first byline since disability leave is up at Dark Reading! It's about the hiring gap in cybersecurity and where it comes from. Big thanks to @Xavier and @hexamander for helping me with the research. It ended up being pretty involved, but with help from my boss, it found focus. #DarkReading #journalism #TheEdge #HiringGap #JobMarket #SelfPromotion darkreading.com/cybersecurity-

2024-09-22

I thought at first it was just missing a comma, but then the list continued. Whatever the case, it is a

/application-security/gitlab-warns-max-severity-authentication-bypass-bug

Screenshot of partial article text with blue highlight below Dark Reading logo. Text: "Depending on the level of access, an attacker could then steal leak or modify source code, inject malicious code into" - Highlight: "steal leak"
2024-02-16

@ryo @StartpageSearch And where the war reporter (#darkreading.com) is ironically a #Cloudflare site that’s broken for all those on the right side of privacy, and where the archive.org refuge is just a blank page:

web.archive.org/web/2023092120

Without being able to reach the article, I can only guess there’s a healthy dose of #hypocrisy there.

2023-12-12

SMBs often need cyber insurance too, but they don't necessarily have the staff or expertise to qualify for it. Here's what they can do today. Check it out in #DarkReading #cyberinsurance

darkreading.com/cyber-risk/mak

πŸ›‘ H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2023-09-06

Title: "🚨 Critical Vulnerability Unearthed in PHPFusion CMS! 🚨"

Researchers have discovered a critical vulnerability in PHPFusion CMS that could allow remote code execution. No patch is available yet, making it a ticking time bomb for websites using this CMS. πŸ•’πŸ’£

Security researchers at Synopsys have identified two significant vulnerabilities in PHPFusion, an open-source Content Management System (CMS) used by approximately 15 million websites globally.

CVE-2023-2453: A critical authenticated local file inclusion flaw that allows for remote code execution (RCE). To exploit this, an attacker needs to:

  • Authenticate to at least a low-privileged account.
  • Know the vulnerable endpoint.
  • Upload a malicious ".php" file to a known path on the target system.
  • The impact could range from reading arbitrary files to gaining control over the vulnerable server.

CVE-2023-4480: A moderate-severity bug related to an outdated dependency in a Fusion file manager component. To exploit this, an attacker needs administrator or super administrator privileges. The vulnerability allows an attacker to:

  • Read the contents of files on the affected system.
  • Write files to arbitrary locations on the system.
  • Both vulnerabilities affect PHPFusion versions 9.10.30 and earlier. As of now, no patches are available for either flaw. Synopsys attempted multiple channels to contact PHPFusion administrators but received no response.

The vulnerabilities pose a significant risk, especially for small and midsize businesses that commonly use PHPFusion for online forums and community-driven websites. Immediate action is advised for vulnerability management.

πŸ”— Source: Dark Reading by Jai Vijayan

🏷️ Tags: #PHPFusion #CMS #Vulnerability #RemoteCodeExecution #InfoSec #CyberSecurity #DarkReading

deltatux :mapleleaf:deltatux@mstdn.ca
2023-08-01

@Hazzard @grte

Yes, this can actually be done. There's a tool called #MastoFeed that allows you to post RSS content to the fediverse. Some publications like #DarkReading are exploring using MastoFeed to publish their articles.

Their account can be found here: infosec.town/@darkreading

That being said, not sure if a bot account is what people are hoping for if #CBC decides to join the fediverse...

Toshimarutoshimaru
2023-07-21

From Dark Reading:
Poses Significant Threat to Critical Infrastructure
darkreading.com/vulnerabilitie

Organizations running Linux distributions need to prepare to defend their systems against ransomware attacks. Steps to ensure resiliency and basics such as access control reduce major disruptions. ...

Geekmaster πŸ‘½:system76:Geekmaster@ioc.exchange
2022-12-30

@cyberfixation I have a few sources I use:

:finger_point:#Thehackernews :heart_cyber: @thehackernews
:finger_point:#BleepingComputer :heart_cyber: @BleepingComputer
:finger_point:#DarkReading :heart_cyber:
:finger_point:#SCMedia
:finger_point:#DarknetDiaries podcast by @jackrhysider is just fun to listen to
:finger_point:Google's #TAG via RSS
:finger_point:Cisco Talos
:finger_point:US-CERT/CISA @CISAgov :fbi: :cia: :nsa: :nsaverified:
:finger_point:#OSINT via various #Telegram channels
:finger_point:#Politico on their dot-onion site :tor:
:finger_point:VX-Underground @vxunderground
:finger_point:darkfeed.io
:finger_point:and the occasional stroll across the #Darkweb forums I have access to. I don't like to be in the Darkweb for too long. That place can get real sketchy :anonymous: :WeAreNameless: :tor:

Most of the sites I mention have newsletters you can subscribe to, some you can stream via RSS to your favorite reader, others you just need to do the manual work and load up their site (worth it).

Gareth Emslie πŸ‡ΏπŸ‡¦ πŸ‡ͺπŸ‡¦ πŸ‡¨πŸ‡­keyoke_za@hachyderm.io
2022-12-30

Dark Reading's panel of security experts deliver a magnum of bubbly hot takes on what 2023 will look like, featuring evil AIs, WWIII, wild workplace soon-to-be-norms, and more.. darkreading.com/attacks-breach #DarkReading #SecurityExperts #AI #WWIII

Nathan Hamiel :2001:nhamiel@infosec.exchange
2022-12-16

Regarding #Web3 and #Security thoughts for 2023. I don't do the predictions thing (just ask my marketing department), but I did share a few thoughts that will shape the Web3 space in during my keynote at the #BlackHat and #DarkReading Cybersecurity Outlook 2023 conference.

-All of the conditions and challenges present in 2022 will still be there in 2023

-As long as something has value, it will continue to be attacked by nation-states and criminals

-Survival mode isn't the best mode of operation for great security choices

-Look for increased government scrutiny, sanctions, and potential regulations

-The world is not a better place when vulnerable technology is in play

One thing is for sure, 2023 will bring more attacks and more compromises, so it's important to be vigilant.

2022-12-15

DDoS Attack Platforms Shut Down in Global Law Enforcement Operation

Sweeping operation took down around 50 popular DDoS platforms, just one of which was used in 30M attacks, Europol says.

Seven administrators have been arrested, according to Europol's announcement, adding that just one of the services shut down by Operation Power Off was responsible for more than 30 million DDoS attacks.

#DDOS #DarkReading #AttackPlatforms

darkreading.com/attacks-breach

Teddy / Domingo (πŸ‡¨πŸ‡΅/πŸ‡¬πŸ‡§)TeddyTheBest@framapiaf.org
2020-08-07

Where #DarkReading Goes Next. #DarkReading Editor-in-Chief gives a complete rundown of all the #DarkReading #projects you might not even know about, his insight into the future of the #security industry, and how we plan to cover it.
darkreading.com/careers-and-pe

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst