informa

Latest News

Microsoft Launches Security Program for Nonprofits

A new set of security tools is built to assess risk, provide monitoring and notification if an attack occurs, and train IT pros and users.

A new set of security tools is built to assess risk, provide monitoring and notification if an attack occurs, and train IT pros and users.


Macs Still Targeted Mostly With Adware, Less With Malware

The top 10 categories of digital threats on macOS are all adware programs, with only a sliver of the share of victims affected by actual malware, according to an IT management firm.

The top 10 categories of digital threats on macOS are all adware programs, with only a sliver of the share of victims affected by actual malware, according to an IT management firm.



Microsoft-Signed Rootkit Targets Gaming Environments in China

FiveSys is the second publicly known rootkit since June that attackers have managed to sneak past Microsoft's driver certification process.

FiveSys is the second publicly known rootkit since June that attackers have managed to sneak past Microsoft's driver certification process.


Execs From Now-Defunct GigaTrust Arrested in $50M Fraud Scheme

Email endpoint security-as-a-service company founder and two others indicted in an elaborate financial fraud scheme.

Email endpoint security-as-a-service company founder and two others indicted in an elaborate financial fraud scheme.


Google: Phishing Campaign Targets YouTube Creators

The attackers behind the campaign, which distributes cookie theft malware, are attributed to actors recruited in a Russian-speaking forum.

The attackers behind the campaign, which distributes cookie theft malware, are attributed to actors recruited in a Russian-speaking forum.


JavaScript Packing Found in More Than 25% of Malicious Sites

Obfuscation techniques are extremely prevalent, data shows, but they can't be used as a single indicator of compromise because legitimate websites use them.

Obfuscation techniques are extremely prevalent, data shows, but they can't be used as a single indicator of compromise because legitimate websites use them.


Deepfake Audio Scores $35M in Corporate Heist

A combination of business email compromise and deepfake audio led a branch manager to transfer millions to scammers, in a case that serves as a warning to organizations.

A combination of business email compromise and deepfake audio led a branch manager to transfer millions to scammers, in a case that serves as a warning to organizations.


Penetration Testing in the Cloud Demands a Different Approach

Attackers use a different set of techniques to target the cloud, meaning defenders must think differently when pen testing cloud environments.

Attackers use a different set of techniques to target the cloud, meaning defenders must think differently when pen testing cloud environments.


Connect with us

Register for a
Subscribe to the
Follow us

Dark Reading Account

Dark Reading newsletter

@DarkReading

Register for a

Dark Reading Account

  • Gain full access to resources (events, white paper, webinars, reports, etc.)
  • Single sign-on to all Informa products
REGISTER
Subscribe to the

Dark Reading newsletter

Get daily Dark Reading top stories every morning straight into your inbox

SUBSCRIBE
Follow us

@DarkReading

Follow us @darkreading to stay up-to-date with the latest news & insider information about events & more