1 day 8 hours ago
Decentralized finance lost $1.8 billion to cyberattacks last year — and 80% of those events were the result of vulnerable code, analysts say.
Becky Bracken, Editor, Dark Reading
1 day 9 hours ago
As states address privacy with ad-hoc laws, corporate compliance teams try to balance yet another set of similar but diverging requirements.
Stephen Lawton, Contributing Writer
1 day 10 hours ago
Company to debut its AD capabilities at the 2022 RSA Conference.
1 day 10 hours ago
New analysis reveals basic regulatory password requirements fall far short of providing protection from compromise.
Dark Reading Staff, Dark Reading
1 day 12 hours ago
New features include context-aware, zero-trust data protection on local peripherals and devices.
1 day 12 hours ago
New funding led by global cyber investor Paladin Capital Group, alongside existing investors Columbia Capital and Skylab Capital.
1 day 14 hours ago
Million-dollar crypto heists are becoming more common as the currency starts to go mainstream; prevention and enforcement haven't kept pace.
Steve Forbes, Government Cyber Security Expert, Nominet
2 days 7 hours ago
An analysis from Google TAG shows that Android zero-day exploits were packaged and sold for state-backed surveillance.
Dark Reading Staff, Dark Reading
2 days 7 hours ago
NIST may be on the brink of revealing which post-quantum computing encryption algorithms it is endorsing, solidifying commercial developments like QuProtect.
Jeffrey Schwartz, Contributing Writer
2 days 7 hours ago
The PyPI "pymafka" package is the latest example of growing attacker interest in abusing widely used open source software repositories.
Jai Vijayan, Contributing Writer, Dark Reading
2 days 10 hours ago
Analysts have seen a massive spike in malicious activity by the XorDdos Trojan in the last six months, against Linux cloud and IoT infrastructures .
Dark Reading Staff, Dark Reading
2 days 11 hours ago
A culture of trust, combined with tools designed around employee experience, can work in tandem to help organizations become more resilient and secure.
Daniel Riedel, SVP, Strategic Services, Copado
2 days 14 hours ago
Next I.T. is the sixth and largest acquisition to date for Valeo Networks.
2 days 14 hours ago
IronKey Vault Privacy 80 External SSD safeguards against brute-force attacks and BadUSB with digitally-signed firmware.
2 days 14 hours ago
What subsequent protections do you have in place when your first line of defense goes down?
Gal Diskin, CTO and Co-Founder, Authomize
5 days 8 hours ago
In a new phishing tactic, faux chatbots establish a conversation with victims to guide them to malicious links, researchers say.
Dark Reading Staff, Dark Reading
5 days 9 hours ago
Organizations that deploy updates only after a vulnerability is disclosed apply far fewer updates and do so at a lower cost than those that stay up to date on all of their software, university researchers say.
Jai Vijayan, Contributing Writer, Dark Reading
5 days 10 hours ago
New versions of QKD use separate wavelengths on the same fiber, improving cost and efficiency, but distance is still a challenge.
Lee Sattler, Distinguished Engineer in Product Strategy and Operations, Verizon
5 days 12 hours ago
Two of Microsoft's Patch Tuesday updates need a do-over after causing certificate-based authentication errors.
Dark Reading Staff, Dark Reading
5 days 14 hours ago
To succeed against dynamic cybercriminals, organizations must go multiple steps further and build a learning system that evolves over time to keep up with attacker tactics.
Gunnar Peterson, CISO, Forter
Checked
1 hour 21 minutes ago
Dark Reading: Connecting the Information and Security Community
Subscribe to Dark Reading feed