1 week 5 days ago
A third piece of malware is uncovered, but there's still plenty of unknowns about the epic attacks purportedly out of Russia.
Kelly Jackson Higgins Executive Editor at Dark Reading
1 week 5 days ago
Security researchers have disclosed a vulnerability they exploited to access more than 100,000 private employee records.
Dark Reading Staff
1 week 5 days ago
Microsoft patched 83 bugs, including a Microsoft Defender zero-day and one publicly known elevation of privilege flaw.
Kelly Sheridan Staff Editor, Dark Reading
1 week 6 days ago
Linking security budgets to breach-protection outcomes helps executives balance spending against risk and earns CISOs greater respect in the C-suite.
Douglas Ferguson Founder & CTO, Pharos Security
1 week 6 days ago
Companies continue to value security operations centers but the economics are increasingly challenging, with high analyst turnover and questions raised over return on investment.
Robert Lemos Contributing Writer
1 week 6 days ago
Demand for secure remote access has skyrocketed during the pandemic. Here Omdia profiles more secure alternatives to virtual private network (VPN) technology.
Rik Turner Principal Analyst, Infrastructure Solutions, Omdia
1 week 6 days ago
It's past time to begin charting insider risk indicators that identify risky behavior and stop it in its tracks.
Mark Wojtasiak VP, Portfolio Marketing, Code42
1 week 6 days ago
The newest Intel Core vPro mobile platform gives PC hardware a direct role in detecting ransomware attacks.
Kelly Sheridan Staff Editor, Dark Reading
1 week 6 days ago
Cloud provider hosting "certain" IT systems attacked, company says.
Dark Reading Staff
1 week 6 days ago
The SolarWinds supply chain compromise won't be the last of its kind. Vendors and enterprises alike must learn and refine their detection efforts to find the next such attack.
Eric Parizo Senior Analyst, Omdia
2 weeks ago
How two traditionally disparate security disciplines can be united.
Seth Rosenblatt Contributing Writer
2 weeks ago
The AEVT decompiler helped researchers analyze a cryptominer campaign that used AppleScript for obfuscation and will help reverse engineers focused on other Mac OS malware.
Robert Lemos Contributing Writer
2 weeks ago
Organizations that focus on optimizing their tools, cutting down on tool sprawl, and taking a strategic approach to transitioning to the cloud are poised for success.
Lamont Orange Chief Information Security Officer at Netskope
2 weeks 2 days ago
Crimes netted him $19 million overall.
Dark Reading Staff
2 weeks 3 days ago
Cisco analyzes the latest version of the LokiBot malware for stealing credentials, finding that its developers have added more misdirection and anti-analysis features.
Robert Lemos Contributing Writer
2 weeks 3 days ago
And the winner of our December cartoon caption contest is ...
John Klossner Cartoonist
2 weeks 3 days ago
The former US cybersecurity official and former Facebook security chief will help SolarWinds respond to its recent attack and improve security.
Dark Reading Staff
2 weeks 3 days ago
Integrating static analysis into the development cycle can prevent coding defects and deliver secure software faster.
Walter Capitani Director, Technical Product Management, GrammaTech
2 weeks 3 days ago
Research reveals APT groups and cybercriminals employ these offensive security tools as often as red teams.
Kelly Sheridan Staff Editor, Dark Reading
2 weeks 3 days ago
CEO Kevin Mandia shared some details on how his company rooted out the major cyberattack campaign affecting US government and corporate networks.
Kelly Jackson Higgins Executive Editor at Dark Reading
Checked
1 week 5 days ago
Dark Reading: Connecting the Information and Security Community
Subscribe to Dark Reading feed