
Latest News
Researchers discover a widespread, inexpensive malware variant has been redesigned to target both macOS and Windows devices.
Researchers discover a widespread, inexpensive malware variant has been redesigned to target both macOS and Windows devices.
The issues, affecting kernels dating back to August 2014, allow an unprivileged user to gain root access to the operating system.
The issues, affecting kernels dating back to August 2014, allow an unprivileged user to gain root access to the operating system.
Microsoft has issued a temporary workaround for systems vulnerable to CVE-2021-36934, also known as "HiveNightmare" and "SeriousSAM."
Microsoft has issued a temporary workaround for systems vulnerable to CVE-2021-36934, also known as "HiveNightmare" and "SeriousSAM."
The acquisition is intended to help build out Microsoft's cloud security and identity offerings.
The acquisition is intended to help build out Microsoft's cloud security and identity offerings.
A sneak-peak of some of the main themes at Black Hat USA next month.
A sneak-peak of some of the main themes at Black Hat USA next month.
A separate advisory from the CISA this week resurfaced details of a 2011–2013 Chinese campaign against energy industry targets and warned that same tactics and techniques still remain effective.
A separate advisory from the CISA this week resurfaced details of a 2011–2013 Chinese campaign against energy industry targets and warned that same tactics and techniques still remain effective.
The Network Security Law of the People's Republic of China enforces coordinated disclosure, but also requires that researchers notify the government of vulnerabilities.
The Network Security Law of the People's Republic of China enforces coordinated disclosure, but also requires that researchers notify the government of vulnerabilities.
Today's announcements include a cloud-native intrusion detection system and government-focused offerings that comply with the White House's executive order.
Today's announcements include a cloud-native intrusion detection system and government-focused offerings that comply with the White House's executive order.
Latest Commentary
Why the FBI's Recovery of Colonial Pipeline Ransom Signals Hope for the Future
The "win for the good guys" is a monumental step toward breaking down the business model of ransomware and digital extortion.
Cybersecurity Through the Lens of COVID
Whether you're talking about pandemics or cybersecurity attacks, public health and information security can use the same tactics to build resiliency and avoid catastrophe.
Name That Toon: Buzzard Bestie
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winner with a $25 Amazon gift card.
Big Game Makes Easy Prey for Cybercriminals
By adopting nation-state methods, cybercriminals have moved on from small prey to large targets to rake in millions of dollars with relatively little effort.
Breaking Down the Threat of Going All-In With Microsoft Security
Limit risk by dividing responsibility for infrastructure, tools, and security.
Products & Releases
- Two Sides of the PAM CoinAug 11, 2021
- An Enterprise Guide to Web SecurityAug 10, 2021
Connect with us
Register for a
Subscribe to the
Follow us
Dark Reading Account
Dark Reading newsletter
@DarkReading
Register for a
Dark Reading Account
- Gain full access to resources (events, white paper, webinars, reports, etc.)
- Single sign-on to all Informa products
Subscribe to the
Dark Reading newsletter
Get daily Dark Reading top stories every morning straight into your inbox
Follow us
@DarkReading
Follow us @darkreading to stay up-to-date with the latest news & insider information about events & more