The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Event
The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them | Jan 24 Webinar | <REGISTER NOW>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Attacks/Breaches
Breaking news, news analysis, and expert commentary on cyberattacks and data breaches, as well as the tools, technologies, and practices for defense.
How Noob Website Hackers Can Become Persistent Threats
An academic analysis of website defacement behavior by 241 new hackers shows there are four clear trajectories they can take in future, researchers say.
January 27, 2023
An academic analysis of website defacement behavior by 241 new hackers shows there are four clear trajectories they can take in future, researchers say.
by Jai Vijayan, Contributing Writer, Dark Reading
January 27, 2023
4 MIN READ
Article
Riot Games Latest Video-Game Maker to Suffer Breach
Highlighting continued attacks on game developers, attackers stole source code from and issued a ransom demand to the maker of League of Legends.
January 26, 2023
Highlighting continued attacks on game developers, attackers stole source code from and issued a ransom demand to the maker of League of Legends.
by Robert Lemos, Contributing Writer, Dark Reading
January 26, 2023
4 MIN READ
Article
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Hackers don't need a key to get past your defenses if they can essentially teleport using RMMs, warns CISA and the NSA.
January 26, 2023
Hackers don't need a key to get past your defenses if they can essentially teleport using RMMs, warns CISA and the NSA.
by Nate Nelson, Contributing Writer, Dark Reading
January 26, 2023
4 MIN READ
Article
Dutchman Detained for Dealing Details of Tens of Millions of People
The accused sold an enormous data set stolen from the Austrian radio and television licensing authority — to an undercover cop.
January 26, 2023
The accused sold an enormous data set stolen from the Austrian radio and television licensing authority — to an undercover cop.
by Dark Reading Staff, Dark Reading
January 26, 2023
1 MIN READ
Article
German Government, Airports, Banks Hit With Killnet DDoS Attacks
After Berlin pledged tanks for Ukraine, some German websites were knocked offline temporarily by Killnet DDoS attacks.
January 26, 2023
After Berlin pledged tanks for Ukraine, some German websites were knocked offline temporarily by Killnet DDoS attacks.
by Dark Reading Staff, Dark Reading
January 26, 2023
1 MIN READ
Article
7 Insights From a Ransomware Negotiator
The rapid maturation and rebranding of ransomware groups calls for relentless preparation and flexibility in response, according to one view from the trenches.
January 26, 2023
The rapid maturation and rebranding of ransomware groups calls for relentless preparation and flexibility in response, according to one view from the trenches.
by Ericka Chickowski, Contributing Writer, Dark Reading
January 26, 2023
7 MIN READ
Article
Zacks Investment Research Hack Exposes Data for 820K Customers
Zacks Elite sign-ups for the period 1999–2005 were accessed, including name, address, email address, phone number, and the password associated with Zacks.com.
January 25, 2023
Zacks Elite sign-ups for the period 1999–2005 were accessed, including name, address, email address, phone number, and the password associated with Zacks.com.
by Dark Reading Staff, Dark Reading
January 25, 2023
1 MIN READ
Article
Healthcare Remains Top Target in 2022 ITRC Breach Report
January 25, 2023
January 25, 2023
2 MIN READ
Article
GoTo Encrypted Backups Stolen in LastPass Breach
Encrypted backups for several GoTo remote work tools were exfiltrated from LastPass, along with encryption keys.
January 25, 2023
Encrypted backups for several GoTo remote work tools were exfiltrated from LastPass, along with encryption keys.
by Dark Reading Staff, Dark Reading
January 25, 2023
1 MIN READ
Article
Log4j Vulnerabilities Are Here to Stay — Are You Prepared?
Don't make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the vulnerability is on a potential attack path to a critical asset.
January 25, 2023
Don't make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the vulnerability is on a potential attack path to a critical asset.
by Zur Ulianitzky, Head of Security Research, XM Cyber
January 25, 2023
5 MIN READ
Article
BD Publishes 2022 Cybersecurity Annual Report
January 25, 2023
January 25, 2023
2 MIN READ
Article
Cybersecurity Budgets Increase for Retail & Hospitality Industry
Despite economic headwinds and layoffs in other areas, most retail and hospitality CISOs expect to add staff in 2023, according to a new report.
January 25, 2023
Despite economic headwinds and layoffs in other areas, most retail and hospitality CISOs expect to add staff in 2023, according to a new report.
January 25, 2023
2 MIN READ
Article
BlackBerry's Inaugural Quarterly Threat Intelligence Report Reveals Threat Actors Launch One Malicious Threat Every Minute
Report identifies 1.75m cyberattacks were stopped by BlackBerry in the last 90 days.
January 25, 2023
Report identifies 1.75m cyberattacks were stopped by BlackBerry in the last 90 days.
January 25, 2023
3 MIN READ
Article
Ticketmaster Blames Bots in Taylor Swift 'Eras' Tour Debacle
Ticketmaster testified in the Senate that a cyberattack was to blame for the high-profile Taylor Swift concert sales collapse, but some senators aren't so sure.
January 24, 2023
Ticketmaster testified in the Senate that a cyberattack was to blame for the high-profile Taylor Swift concert sales collapse, but some senators aren't so sure.
by Becky Bracken, Editor, Dark Reading
January 24, 2023
4 MIN READ
Article
Fenix24 Releases White Paper Proposing New Cyber Incident Response Paradigm
Restoration teams must be part of a collaborative, initial response team to address costly downtime.
January 24, 2023
Restoration teams must be part of a collaborative, initial response team to address costly downtime.
January 24, 2023
2 MIN READ
Article