8 hours 15 minutes ago
New threat hunting and risk identification service provides organizations with an enterprise-wide baseline of their threat landscape and risk exposure.
8 hours 31 minutes ago
Gartner's security service edge fundamentally changes how companies should be delivering data protection in a cloud and mobile first world.
8 hours 36 minutes ago
A sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.
Jai Vijayan, Contributing Writer, Dark Reading
8 hours 58 minutes ago
Open source software community initiative utilizes blockchain technology.
9 hours 1 minute ago
Experience Centre features emerging Mastercard products and solutions for securing digital payments on a global scale, including those developed locally in Vancouver.
9 hours 6 minutes ago
Company will detail enhancements to Vulnerability Management, Detection and Response solution next month.
9 hours 11 minutes ago
Corelight Investigator aids threat hunting and investigation through intelligent alert aggregation, built-in queries and scalable search
9 hours 17 minutes ago
Cylance co-founder Ryan Permeh has joined full time as an operating partner.
9 hours 20 minutes ago
According to the findings, vishing attacks have overtaken business email compromise as the second most reported response-based email threat since Q3 2021.
9 hours 24 minutes ago
Google has disclosed a nasty set of six bugs affecting Zoom chat that can be chained together for MitM and RCE attacks, no user interaction required.
Tara Seals, Managing Editor, News, Dark Reading
9 hours 28 minutes ago
This year's finalists tackle such vital security concerns as permissions management, software supply chain vulnerability, and data governance. Winners will be announced June 6.
Karen Spiegelman, Features Editor
9 hours 38 minutes ago
Purporting to publish leaked emails of pro-Brexit leadership in the UK, a new site's operations have been traced to Russian cyber-threat actors, Google says.
Dark Reading Staff, Dark Reading
11 hours 45 minutes ago
Implement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and employees' devices secure.
Alex Lisle, Chief Technology Officer, Kryptowire
11 hours 53 minutes ago
In just one month, the ransomware group's activity rose by 2,100%, a new report finds.
Dark Reading Staff, Dark Reading
14 hours 45 minutes ago
With manufacturing ranking as the fourth most targeted sector, manufacturers that understand their exposure will be able to build the necessary security maturity.
Jordan Kendall, President, Security Compass Advisory
15 hours 4 minutes ago
A DDoS campaign observed by Akamai from actors claiming to be REvil would represent a major pivot in tactics for the gang.
Nathan Eddy, Contributing Writer, Dark Reading
1 day 5 hours ago
Verizon's "2022 Data Breach Investigations Report" repeatedly makes the point that criminals are stealing credentials to carry out their attacks.
Dark Reading Staff, Dark Reading
1 day 6 hours ago
Ransomware has become so efficient, and the underground economy so professional, that traditional monetization of stolen data may be on its way out.
Tara Seals, Managing Editor, News, Dark Reading
1 day 7 hours ago
But there was a substantial drop in the overall number of critical vulnerabilities that the company disclosed last year, new analysis shows.
Jai Vijayan, Contributing Writer, Dark Reading
1 day 7 hours ago
Notable new infection chain uses PDF to embed malicious files, load remote exploits, shellcode encryption, and more, new research shows.
Dark Reading Staff, Dark Reading
Checked
1 hour 29 minutes ago
Dark Reading: Connecting the Information and Security Community
Subscribe to Dark Reading feed