The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Event
The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them | Jan 24 Webinar | <REGISTER NOW>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Authentication
Breaking news, news analysis, and expert commentary on endpoint security, including tools & technologies.
Convincing, Malicious Google Ads Look to Lift Password Manager Logins
Users searching for Bitwarden and 1Password's Web vaults on Google have recently reported seeing paid ads with links to cleverly spoofed sites for stealing credentials to their password vaults.
January 30, 2023
Users searching for Bitwarden and 1Password's Web vaults on Google have recently reported seeing paid ads with links to cleverly spoofed sites for stealing credentials to their password vaults.
by Jai Vijayan, Contributing Writer, Dark Reading
January 30, 2023
4 MIN READ
Article
Microsoft Azure-Based Kerberos Attacks Crack Open Cloud Accounts
Two common attacks against on-premises Kerberos authentication servers — known as Pass the Ticket and Silver Ticket — can be used against Microsoft's Azure AD Kerberos, a security firms says.
January 25, 2023
Two common attacks against on-premises Kerberos authentication servers — known as Pass the Ticket and Silver Ticket — can be used against Microsoft's Azure AD Kerberos, a security firms says.
by Robert Lemos, Contributing Writer, Dark Reading
January 25, 2023
5 MIN READ
Article
GoTo Encrypted Backups Stolen in LastPass Breach
Encrypted backups for several GoTo remote work tools were exfiltrated from LastPass, along with encryption keys.
January 25, 2023
Encrypted backups for several GoTo remote work tools were exfiltrated from LastPass, along with encryption keys.
by Dark Reading Staff, Dark Reading
January 25, 2023
1 MIN READ
Article
Compromised Zendesk Employee Credentials Lead to Breach
Zendesk has alerted customers to a successful SMS phishing campaign that has exposed "service data," but details remain scarce.
January 20, 2023
Zendesk has alerted customers to a successful SMS phishing campaign that has exposed "service data," but details remain scarce.
by Becky Bracken, Editor, Dark Reading
January 20, 2023
1 MIN READ
Article
Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
A rapid increase in the number of operators in the space — the "locksmiths" of the cyber underground — has made it substantially cheaper for cybercriminals to buy access to target networks.
January 17, 2023
A rapid increase in the number of operators in the space — the "locksmiths" of the cyber underground — has made it substantially cheaper for cybercriminals to buy access to target networks.
by Jai Vijayan, Contributing Writer, Dark Reading
January 17, 2023
4 MIN READ
Article
Norton LifeLock Warns on Password Manager Account Compromises
Password manager accounts may have, ironically, been compromised via simple credential stuffing, thanks to password reuse.
January 13, 2023
Password manager accounts may have, ironically, been compromised via simple credential stuffing, thanks to password reuse.
by Tara Seals, Managing Editor, News, Dark Reading
January 13, 2023
2 MIN READ
Article
Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available
Unpatched Cisco bugs, tracked as CVE-2023-20025 and CVE-2023-20026, allow lateral movement, data theft, and malware infestations.
January 12, 2023
Unpatched Cisco bugs, tracked as CVE-2023-20025 and CVE-2023-20026, allow lateral movement, data theft, and malware infestations.
by Tara Seals, Managing Editor, News, Dark Reading
January 12, 2023
3 MIN READ
Article
Black Hat Flashback: The Deadly Consequences of Weak Medical Device Security
Hacking to kill: Dark Reading's Fahmida Y. Rashid reflects on the monumental Black Hat 2011 moment when Jay Radcliffe showed how to hack his insulin pump.
January 10, 2023
Hacking to kill: Dark Reading's Fahmida Y. Rashid reflects on the monumental Black Hat 2011 moment when Jay Radcliffe showed how to hack his insulin pump.
by Becky Bracken, Editor, Dark Reading
January 10, 2023
1 MIN READ
Video
'Copyright Infringement' Lure Used for Facebook Credential Harvesting
Business users receive a message from Facebook warning their accounts will be permanently suspended for using photos illegally if they don't appeal within 24 hours, leading victims to a credential-harvesting page instead.
January 09, 2023
Business users receive a message from Facebook warning their accounts will be permanently suspended for using photos illegally if they don't appeal within 24 hours, leading victims to a credential-harvesting page instead.
by Nathan Eddy, Contributing Writer, Dark Reading
January 09, 2023
3 MIN READ
Article
Five Guys Data Breach Puts HR Data Under a Heat Lamp
Job applicants could face a raft of follow-on attacks after cyber intruders accessed their data in an opportunistic attack.
January 04, 2023
Job applicants could face a raft of follow-on attacks after cyber intruders accessed their data in an opportunistic attack.
by Tara Seals, Managing Editor, News, Dark Reading
January 04, 2023
6 MIN READ
Article
LastPass Cops to Massive Breach Including Customer Vault Data
The follow-on attack from August's source-code breach could fuel future campaigns against LastPass customers.
December 23, 2022
The follow-on attack from August's source-code breach could fuel future campaigns against LastPass customers.
by Dark Reading Staff, Dark Reading
December 23, 2022
1 MIN READ
Article
Godfather Banking Trojan Masquerades as Legitimate Google Play App
The malware has resurfaced, using an icon and name similar to the legitimate Google Play app MYT Music, a popular app with more than 10 million downloads.
December 21, 2022
The malware has resurfaced, using an icon and name similar to the legitimate Google Play app MYT Music, a popular app with more than 10 million downloads.
by Elizabeth Montalbano, Contributor, Dark Reading
December 21, 2022
4 MIN READ
Article
Raspberry Robin Worm Targets Telcos & Governments
With 10 layers of obfuscation and fake payloads, the Raspberry Robin worm is nesting its way deep into organizations.
December 20, 2022
With 10 layers of obfuscation and fake payloads, the Raspberry Robin worm is nesting its way deep into organizations.
by Dark Reading Staff, Dark Reading
December 20, 2022
1 MIN READ
Article
Coming to a SOC Near You: New Browsers, 'Posture' Management, Virtual Assistants
Startups are coalescing around effective data loss prevention, reducing data attack surfaces, and viable AI automation.
December 20, 2022
Startups are coalescing around effective data loss prevention, reducing data attack surfaces, and viable AI automation.
by Paul Shomo, Cybersecurity Analyst
December 20, 2022
4 MIN READ
Article
Automated Cyber Campaign Creates Masses of Bogus Software Building Blocks
The proliferation of automated cyberattacks against npm, NuGet, and PyPI underscores the growing sophistication of threat actors and the threats to open source software supply chains.
December 14, 2022
The proliferation of automated cyberattacks against npm, NuGet, and PyPI underscores the growing sophistication of threat actors and the threats to open source software supply chains.
by Nathan Eddy, Contributing Writer, Dark Reading
December 14, 2022
3 MIN READ
Article