Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Slideshows

Latest Content
Page 1 / 2   >   >>
7 Modern-Day Cybersecurity Realities
Slideshows  |  4/30/2021  | 
Security pros may be working with a false sense of security. We explore seven places where old methods and techniques have to change to keep their organizations safe.
10 Free Security Tools at Black Hat Asia 2021
Slideshows  |  4/22/2021  | 
Researchers are set to demonstrate a plethora of tools for conducting pen tests, vulnerability assessments, data forensics, and a wide range of other use cases.
8 Security & Privacy Apps to Share With Family and Friends
Slideshows  |  4/9/2021  | 
Mobile apps to recommend to the people in your life who want to improve their online security and privacy.
7 Security Strategies as Employees Return to the Office
Slideshows  |  4/1/2021  | 
More sooner than later, employees will be making their way back to the office. Here's how security pros can plan for the next new normal.
6 Tips for Limiting Damage From Third-Party Attacks
Slideshows  |  3/25/2021  | 
The ability to protect your organization from third-party attacks will become increasingly critical as attackers try to maximize the effectiveness of their malicious campaigns.
7 Tips to Secure the Enterprise Against Tax Scams
Slideshows  |  3/17/2021  | 
Tax season is yet another opportunity for fraudsters to target your company. Here's how to keep everyone in the organization on their toes.
Microsoft Exchange Server Attacks: 9 Lessons for Defenders
Slideshows  |  3/12/2021  | 
Experts share their guidance for organizations running on-premise Exchange servers in the wake of rapidly spreading attacks.
5 Ways Social Engineers Crack Into Human Beings
Slideshows  |  3/5/2021  | 
These common human traits are the basic ingredients in the con-man's recipe for trickery.
8 Ways Ransomware Operators Target Your Network
Slideshows  |  2/22/2021  | 
Security researchers explore how criminals are expanding their arsenals with new, more subtle, and more effective ransomware attack techniques.
How to Run a Successful Penetration Test
Slideshows  |  2/18/2021  | 
These seven tips will help ensure a penetration test improves your organization's overall security posture.
7 Things We Know So Far About the SolarWinds Attacks
Slideshows  |  2/11/2021  | 
Two months after the news first broke, many questions remain about the sophisticated cyber-espionage campaign.
6 Cybersecurity Start-Up Trends to Track
Slideshows  |  2/1/2021  | 
The pandemic took a bite out of funding deals, but cybersecurity start-up land fared better than many other industries.
How to Better Secure Your Microsoft 365 Environment
Slideshows  |  1/25/2021  | 
Security experts offer Microsoft 365 security guidance as more attackers target enterprise cloud environments.
7 Steps to Secure a WordPress Site
Slideshows  |  1/21/2021  | 
Many companies operate under the assumption that their WordPress sites are secure -- and that couldn't be anything further from the truth.
6 Open Source Tools for Your Security Team
Slideshows  |  1/6/2021  | 
Open source tools can be great additions to your cloud security arsenal. Here are a half-dozen to get you started.
CISO New Year's Resolutions for 2021
Slideshows  |  1/4/2021  | 
Six resolutions for forward-looking cyber-risk leaders.
5 Key Takeaways From the SolarWinds Breach
Slideshows  |  12/18/2020  | 
New details continue to emerge each day, and there may be many more lessons to learn from what could be among the largest cyberattacks ever.
7 Security Tips for Gamers
Slideshows  |  12/11/2020  | 
Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.
2020 Cybersecurity Holiday Gift Guide for Kids
Slideshows  |  12/1/2020  | 
Grab some wrapping paper: These STEM toys and games are sure to spark creativity and hone coding and logic skills among a future generation of cybersecurity pros.
10 Undergraduate Security Degree Programs to Explore
Slideshows  |  11/23/2020  | 
Colleges and universities are ramping up cybersecurity education with a wider range of degree programs and more resources for students to build their infosec careers.
7 Cool Cyberattack and Audit Tools to be Highlighted at Black Hat Europe
Slideshows  |  11/12/2020  | 
Platforms, open source tools, and other toolkits for penetration testers and other security practitioners will be showcased at this week's virtual event.
7 Online Shopping Tips for the Holidays
Slideshows  |  11/9/2020  | 
The holidays are right around the corner, and that means plenty of online shopping. These tips will help keep you safe.
6 Cybersecurity Lessons From 2020
Slideshows  |  11/3/2020  | 
The COVID-19 pandemic exposed new weaknesses in enterprise cybersecurity preparedness.
6 Ways Passwords Fail Basic Security Tests
Slideshows  |  10/28/2020  | 
New data shows humans still struggle with password creation and management.
7 Tips for Choosing Security Metrics That Matter
Slideshows  |  10/19/2020  | 
Experts weigh in on picking metrics that demonstrate how the security team is handling operational efficiency and reducing risk.
A 7-Step Cybersecurity Plan for Healthcare Organizations
Slideshows  |  10/12/2020  | 
With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations.
6 Best Practices for Using Open Source Software Safely
Slideshows  |  10/6/2020  | 
Open source software is critical yet potentially dangerous. Here are ways to minimize the risk.
3 Months for the Cybercrime Books
Slideshows  |  10/2/2020  | 
From July through September, US law enforcement handed down major indictments or sanctions against foreign threat groups at least six times.
9 Tips to Prepare for the Future of Cloud & Network Security
Slideshows  |  9/28/2020  | 
Cloud and network security analysts outline trends and priorities businesses should keep top of mind as they grow more reliant on cloud.
12 Bare-Minimum Benchmarks for AppSec Initiatives
Slideshows  |  9/23/2020  | 
The newly published Building Security in Maturity Model provides the software security basics organizations should cover to keep up with their peers.
6 Lessons IT Security Can Learn From DevOps
Slideshows  |  9/10/2020  | 
DevOps has taken over enterprise software development. The discipline has lessons for IT security -- here are a quick half-dozen.
Post-COVID-19 Security Spending Update
Slideshows  |  9/8/2020  | 
Security spending growth will slow in 2020, but purse strings are looser than for other areas of IT.
5 Tips for Triaging Risk from Exposed Credentials
Slideshows  |  9/2/2020  | 
Not all exposed usernames and passwords present a threat. Here's how to quickly identify the ones that do.
Ransomware Red Flags: 7 Signs You're About to Get Hit
Slideshows  |  8/28/2020  | 
Caught off guard by a ransomware attack? Security experts say the warning signs were there all along.
6 Signs Your Supply Chain Risk Just Shot Up
Slideshows  |  8/26/2020  | 
Risk levels are not steady states. Here are six indications that the danger posed by your supply chain is headed in the wrong direction.
10 Resume and Interview Tips from Security Pros
Slideshows  |  8/19/2020  | 
Experts from the DEF CON Career Hacking Village explain how job seekers can build a resume and rock an interview.
7 Ways to Keep Your Remote Workforce Safe
Slideshows  |  8/14/2020  | 
These tips will help you chart a course for a security strategy that just may become part of the normal way organizations will function over the next several years.
17 Essential Stats About the State of Consumer Privacy
Slideshows  |  8/11/2020  | 
These illuminating numbers offer a glimpse into current consumer attitudes and enterprise readiness for protecting their customers' personal data.
11 Hot Startups to Watch at Black Hat USA
Slideshows  |  8/3/2020  | 
A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.
11 Security Tools to Expect at the Black Hat USA 2020 Arsenal Virtual Event
Slideshows  |  7/29/2020  | 
More than 130 security researchers and developers are ready to showcase their work.
7 Summer Travel Security Tips
Slideshows  |  7/25/2020  | 
With staying safe during the pandemic high priority, it's easy to let your guard down about the security of the devices you take along your travels.
8 Cybersecurity Themes to Expect at Black Hat USA 2020
Slideshows  |  7/23/2020  | 
Here are the trends and topics that'll capture the limelight at this year's virtual event.
8 Signs of a Smartphone Hack
Slideshows  |  7/16/2020  | 
A rapidly dwindling battery life or sudden spike in data usage could indicate your iOS or Android device has been compromised.
6 Tips for Getting the Most from Nessus
Slideshows  |  7/9/2020  | 
Books have been written on using the powerful network-discovery and vulnerability-scanning tool. These tips will help get you started.
7 IoT Tips for Home Users
Slideshows  |  7/2/2020  | 
Whether for business or pleasure, you're on your own once you walk into the house with a new Internet of Things device. Here's how to keep everyone secure.
7 Tips for Effective Deception
Slideshows  |  6/25/2020  | 
The right decoys can frustrate attackers and help detect threats more quickly.
Cloud Threats and Priorities as We Head Into the Second Half of 2020
Slideshows  |  6/22/2020  | 
With millions working from home and relying on the cloud, security leaders are under increasing pressure to keep their enterprises breach-free.
7 Tips for Employers Navigating Remote Recruitment
Slideshows  |  6/17/2020  | 
Hiring experts explain how companies should approach recruitment when employers and candidates are working remotely.
7 Must-Haves for a Rockin' Red Team
Slideshows  |  6/12/2020  | 
Follow these tips for running red-team exercises that will deliver added insight into your operations.
What Usability Means to Security Pros
Slideshows  |  6/4/2020  | 
The last thing cybersecurity executives and practitioners need are even more tools that are difficult to operate. Here's what they look for when assessing new tools.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32089
PUBLISHED: 2021-05-11
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered on Zebra (formerly Motorola Solutions) Fixed RFID Reader FX9500 devices. An unauthenticated attacker can upload arbitrary files to the filesystem that can then be accessed through the web interface. This can lead to information disclosure and c...
CVE-2020-24586
PUBLISHED: 2021-05-11
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted us...
CVE-2020-24587
PUBLISHED: 2021-05-11
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and...
CVE-2020-24588
PUBLISHED: 2021-05-11
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802....
CVE-2020-26139
PUBLISHED: 2021-05-11
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and...