Mideast & Africa News
Cloud Email Filtering Bypass Attack Works 80% of the Time
Cloud Email Filtering Bypass Attack Works 80% of the Time
A majority of enterprises that employ cloud-based email spam filtering services are potentially at risk, thanks to a rampant tendency to misconfigure them.
Latest Commentary
CEO, Information Security Forum
Field CTO & VP of Worldwide Solution Architecture, ngrok
Managing Director for EMEA North, Qualys
Senior Director of Dark Ops, ZeroFox
Associate Director of Cyber Advisory, Cybersecurity Practice, S-RM
Chief Solutions Officer, AppViewX
Deep Reading
See More Dark Reading ResearchFor many CISOs, "materiality" remains an ambiguous term. Even so, they need to be able to discuss materiality and risk with their boards.
All-or-nothing security policies strain resources by aiming for perfection. We need a better way to assess progress.
Amazon Web Services CISO Chris Betz explains why generative AI is both a time-saving tool and a double-edged sword.
Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.
Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.
You don't have to stop using SSH keys to stay safe. This Tech Tip explains how to protect your system against CVE-2023-48795.
The startup's AI-powered data-streaming platform separates security analytics from compliance data.
The operating system, DBOS, natively uses a relational database to reduce cost, ease application development, and maintain cybersecurity and integrity.
The international body isn't doing enough to protect details on dissidents and activists gathered by peacekeeping operations, particularly across Central Africa.
The malicious actor used Slack channels as an exfiltration point to upload the stolen data.
Government, manufacturing, and the energy industry are the top targets of advanced, persistent threat actors, with phishing attacks and remote exploits the most common vectors.
Breaking cybersecurity news, news analysis, commentary, and other content from around the world.
Partner Perspectives
More Partner PerspectivesPress Releases
See allBlack Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024