9 hours 3 minutes ago
New threat hunting and risk identification service provides organizations with an enterprise-wide baseline of their threat landscape and risk exposure.
9 hours 19 minutes ago
Gartner's security service edge fundamentally changes how companies should be delivering data protection in a cloud and mobile first world.
9 hours 24 minutes ago
A sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.
Jai Vijayan, Contributing Writer, Dark Reading
9 hours 46 minutes ago
Open source software community initiative utilizes blockchain technology.
9 hours 49 minutes ago
Experience Centre features emerging Mastercard products and solutions for securing digital payments on a global scale, including those developed locally in Vancouver.
9 hours 54 minutes ago
Company will detail enhancements to Vulnerability Management, Detection and Response solution next month.
9 hours 59 minutes ago
Corelight Investigator aids threat hunting and investigation through intelligent alert aggregation, built-in queries and scalable search
10 hours 5 minutes ago
Cylance co-founder Ryan Permeh has joined full time as an operating partner.
10 hours 8 minutes ago
According to the findings, vishing attacks have overtaken business email compromise as the second most reported response-based email threat since Q3 2021.
10 hours 13 minutes ago
Google has disclosed a nasty set of six bugs affecting Zoom chat that can be chained together for MitM and RCE attacks, no user interaction required.
Tara Seals, Managing Editor, News, Dark Reading
10 hours 16 minutes ago
This year's finalists tackle such vital security concerns as permissions management, software supply chain vulnerability, and data governance. Winners will be announced June 6.
Karen Spiegelman, Features Editor
10 hours 27 minutes ago
Purporting to publish leaked emails of pro-Brexit leadership in the UK, a new site's operations have been traced to Russian cyber-threat actors, Google says.
Dark Reading Staff, Dark Reading
12 hours 34 minutes ago
Implement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and employees' devices secure.
Alex Lisle, Chief Technology Officer, Kryptowire
12 hours 41 minutes ago
In just one month, the ransomware group's activity rose by 2,100%, a new report finds.
Dark Reading Staff, Dark Reading
15 hours 34 minutes ago
With manufacturing ranking as the fourth most targeted sector, manufacturers that understand their exposure will be able to build the necessary security maturity.
Jordan Kendall, President, Security Compass Advisory
15 hours 53 minutes ago
A DDoS campaign observed by Akamai from actors claiming to be REvil would represent a major pivot in tactics for the gang.
Nathan Eddy, Contributing Writer, Dark Reading
1 day 6 hours ago
Verizon's "2022 Data Breach Investigations Report" repeatedly makes the point that criminals are stealing credentials to carry out their attacks.
Dark Reading Staff, Dark Reading
1 day 6 hours ago
Ransomware has become so efficient, and the underground economy so professional, that traditional monetization of stolen data may be on its way out.
Tara Seals, Managing Editor, News, Dark Reading
1 day 7 hours ago
But there was a substantial drop in the overall number of critical vulnerabilities that the company disclosed last year, new analysis shows.
Jai Vijayan, Contributing Writer, Dark Reading
1 day 8 hours ago
Notable new infection chain uses PDF to embed malicious files, load remote exploits, shellcode encryption, and more, new research shows.
Dark Reading Staff, Dark Reading
Checked
2 hours 17 minutes ago
Dark Reading: Connecting the Information and Security Community
Subscribe to Dark Reading feed