The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Building & Maintaining an Effective Remote Access Strategy | August 2 Webinar | <REGISTER NOW>
Event
Building & Maintaining Security at the Network Edge | July 28 Webinar | <REGISTER NOW>
Event
How Ransomware Works - And What You Can Do to Stop It | July 14 Webinar | <REGISTER NOW>
Previous
Next
Authentication
Breaking news, news analysis, and expert commentary on endpoint security, including tools & technologies.
ICYMI: A Microsoft Warning, Follina, Atlassian, and More
Dark Reading's digest of the other don't-miss stories of the week, including YouTube account takeovers and a sad commentary on cyber-pro hopelessness.
July 01, 2022
Dark Reading's digest of the other don't-miss stories of the week, including YouTube account takeovers and a sad commentary on cyber-pro hopelessness.
by Tara Seals, Managing Editor, News, Dark Reading
July 01, 2022
6 min read
Article
DragonForce Malaysia Releases LPE Exploit, Threatens Ransomware
The hacktivist group is ramping up its activities and ready to assault governments and businesses with escalating capabilities.
July 01, 2022
The hacktivist group is ramping up its activities and ready to assault governments and businesses with escalating capabilities.
by Nathan Eddy, Contributing Writer, Dark Reading
July 01, 2022
6 min read
Article
Microsoft Going Big on Identity with the Launch of Entra
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Microsoft has a new response.
July 01, 2022
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Microsoft has a new response.
by Don Tait, Senior Analyst, Omdia
July 01, 2022
7 min read
Article
Facebook Business Pages Targeted via Chatbot in Data-Harvesting Campaign
The clever, interactive phishing campaign is a sign of increasingly complex social-engineering attacks, researchers warn.
June 28, 2022
The clever, interactive phishing campaign is a sign of increasingly complex social-engineering attacks, researchers warn.
by Tara Seals, Managing Editor, News, Dark Reading
June 28, 2022
7 min read
Article
MetaMask Crypto-Wallet Theft Skates Past Microsoft 365 Security
The credential-phishing attack leverages social engineering and brand impersonation techniques to lead users to a spoofed MetaMask verification page.
June 23, 2022
The credential-phishing attack leverages social engineering and brand impersonation techniques to lead users to a spoofed MetaMask verification page.
by Nathan Eddy, Contributing Writer, Dark Reading
June 23, 2022
3 min read
Article
GitHub's MFA Plans Should Spur Rest of Industry to Raise the Bar
We as industry leaders should be building on what individual platforms like GitHub are doing in two critical ways: demanding third parties improve security and creating more interoperable architectures.
June 22, 2022
We as industry leaders should be building on what individual platforms like GitHub are doing in two critical ways: demanding third parties improve security and creating more interoperable architectures.
by Chris Niggel, Regional CSO, Americas, Okta
June 22, 2022
5 min read
Article
Feds Take Down Russian 'RSOCKS' Botnet
RSOCKS commandeered millions of devices in order to offer proxy services used to mask malicious traffic.
June 20, 2022
RSOCKS commandeered millions of devices in order to offer proxy services used to mask malicious traffic.
by Dark Reading Staff, Dark Reading
June 20, 2022
2 min read
Article
24+ Billion Credentials Circulating on the Dark Web in 2022 — So Far
Username and password combinations offered for sale on the Dark Web by criminals has increased 65% since 2020.
June 15, 2022
Username and password combinations offered for sale on the Dark Web by criminals has increased 65% since 2020.
by Ericka Chickowski, Contributing Writer, Dark Reading
June 15, 2022
4 min read
Article
Understanding and Mitigating Single Sign-on Risk
SSO's one-to-many architecture is both a big advantage and a weakness.
June 14, 2022
SSO's one-to-many architecture is both a big advantage and a weakness.
by Javed Shah, Vice President of Product Management, 1Kosmos
June 14, 2022
4 min read
Article
In a Quickly Evolving Landscape, CISOs Shift Their 2022 Priorities
Cloud migration, DevSecOps, cyber insurance, and more have emerged as important motivators for cybersecurity investment and focus.
June 10, 2022
Cloud migration, DevSecOps, cyber insurance, and more have emerged as important motivators for cybersecurity investment and focus.
by Tara Seals, Managing Editor, News, Dark Reading
June 10, 2022
6 min read
Article
How the C-Suite Puts Shoulders Into Zero Trust in 2022
A full 77% of tech executives say they'll increase spending in zero-trust architecture in the coming year.
June 07, 2022
A full 77% of tech executives say they'll increase spending in zero-trust architecture in the coming year.
by Ericka Chickowski, Contributing Writer, Dark Reading
June 07, 2022
4 min read
Article
12K Misconfigured Elasticsearch Buckets Ravaged by Extortionists
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.
June 01, 2022
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.
by Tara Seals, Managing Editor, News, Dark Reading
June 01, 2022
2 min read
Article
Authentication Is Static, Yet Attackers Are Dynamic: Filling the Critical Gap
To succeed against dynamic cybercriminals, organizations must go multiple steps further and build a learning system that evolves over time to keep up with attacker tactics.
May 20, 2022
To succeed against dynamic cybercriminals, organizations must go multiple steps further and build a learning system that evolves over time to keep up with attacker tactics.
by Gunnar Peterson, CISO, Forter
May 20, 2022
5 min read
Article
Me, My Digital Self, and I: Why Identity Is the Foundation of a Decentralized Future
A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.
May 16, 2022
A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.
by Richard Searle, Vice President of Confidential Computing, Fortanix
May 16, 2022
5 min read
Article
Heroku: Cyberattacker Used Stolen OAuth Tokens to Steal Customer Account Credentials
The same attack that allowed a threat actor to steal data from private Heroku GitHub repositories also resulted in the compromise of customer credentials, the company now says.
May 05, 2022
The same attack that allowed a threat actor to steal data from private Heroku GitHub repositories also resulted in the compromise of customer credentials, the company now says.
by Jai Vijayan, Contributing Writer
May 05, 2022
4 min read
Article