informa
/

Latest News

Incident Responders Explore Microsoft 365 Attacks in the Wild

Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.

Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.


Prophet Spider Exploits WebLogic CVEs to Enable Ransomware Attacks

The group target unpatched Oracle WebLogic servers to gain access that they later hand off to third parties who deploy ransomware.

The group target unpatched Oracle WebLogic servers to gain access that they later hand off to third parties who deploy ransomware.



VC Firm Advanced Technology Ventures Hit with Ransomware

The venture capital firm believes the attack affected personal data belonging to individual investors in ATV funds.

The venture capital firm believes the attack affected personal data belonging to individual investors in ATV funds.


Researchers Find Significant Vulnerabilities in macOS Privacy Protections

Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.

Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.


As Attackers Circle, Federal Agencies Fail to Improve Cybersecurity

Despite being the frequent target of nation-state and criminal actors, nearly every US government agency gets a "C" or "D" for data security, according to a new Senate report.

Despite being the frequent target of nation-state and criminal actors, nearly every US government agency gets a "C" or "D" for data security, according to a new Senate report.


A New Approach to Securing Authentication Systems' Core Secrets

Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.

Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.


Organizations Still Struggle to Hire & Retain Infosec Employees: Report

Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.

Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.


NSA & CISA Publish Kubernetes Security Guidance

Kubernetes is frequently targeted for data theft, computational power theft, or denial of service, the agencies say in a joint advisory.

Kubernetes is frequently targeted for data theft, computational power theft, or denial of service, the agencies say in a joint advisory.


Mandalay Bay / Las Vegas + Virtual

July 31 - August 5, 2021

Connect with us

Register for a
Subscribe to the
Follow us

Dark Reading Account

Dark Reading newsletter

@DarkReading

Register for a

Dark Reading Account

  • Gain full access to resources (events, white paper, webinars, reports, etc.)
  • Single sign-on to all Informa products

REGISTER
Subscribe to the

Dark Reading newsletter

Get daily Dark Reading top stories every morning straight into your inbox

SUBSCRIBE
Follow us

@DarkReading

Follow us @darkreading to stay up-to-date with the latest news & insider information about events & more