The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Think Like an Attacker: Understanding Cybercriminals & Nation-State Threat Actor | Nov 16 Virtual Event <REGISTER NOW>
Event
Tips for A Streamlined Transition to Zero Trust | Sept 28 LIVE Webinar <REGISTER NOW>
Event
The Evolution of the Vulnerability Landscape in 2023 | Sept 27 LIVE Webinar <REGISTER NOW>
Previous
Next
Authentication
Breaking news, news analysis, and expert commentary on endpoint security, including tools & technologies.
BBTok Banking Trojan Impersonates 40+ Banks to Hijack Victim Accounts
Attackers use convincing fake website interfaces and sophisticated geo-fencing to target users exclusively in Mexico and Brazil with a new variant of the malware.
September 21, 2023
Attackers use convincing fake website interfaces and sophisticated geo-fencing to target users exclusively in Mexico and Brazil with a new variant of the malware.
by Elizabeth Montalbano, Contributor, Dark Reading
September 21, 2023
4 MIN READ
Article
Yubico Goes Public
The Swedish maker of Yubikeys has merged with special purpose acquisition company ACQ Bure.
September 20, 2023
The Swedish maker of Yubikeys has merged with special purpose acquisition company ACQ Bure.
by Dark Reading Staff, Dark Reading
September 20, 2023
1 MIN READ
Article
How Choosing Authentication Is a Business-Critical Decision
MFA may go a long way in improving password security, but it's not foolproof.
September 20, 2023
MFA may go a long way in improving password security, but it's not foolproof.
by Kevin Reed, CISO, Acronis
September 20, 2023
4 MIN READ
Article
Critical Security Bug Opens Cisco BroadWorks to Complete Takeover
Cyberattackers could exploit CVE-2023-20238 to carry out a variety of nefarious deeds, from data theft and code execution to phishing, fraud, and DoS.
September 08, 2023
Cyberattackers could exploit CVE-2023-20238 to carry out a variety of nefarious deeds, from data theft and code execution to phishing, fraud, and DoS.
by Tara Seals, Managing Editor, News, Dark Reading
September 08, 2023
1 MIN READ
Article
In Airbnb, Cybercriminals Find a Comfortable Home for Fraud
The popular travel rental site is an ideal destination for cybercrooks bent on taking over accounts and bookings.
August 30, 2023
The popular travel rental site is an ideal destination for cybercrooks bent on taking over accounts and bookings.
by Dark Reading Staff, Dark Reading
August 30, 2023
1 MIN READ
Article
Kroll's Crypto Breach Highlights SIM-Swapping Risk
Information was exposed on hundreds of crypto-related bankruptcy claimants in proceedings involving FTX, Genesis, and BlockFI.
August 29, 2023
Information was exposed on hundreds of crypto-related bankruptcy claimants in proceedings involving FTX, Genesis, and BlockFI.
by Jai Vijayan, Contributing Writer, Dark Reading
August 29, 2023
3 MIN READ
Article
LinkedIn Suffers 'Significant' Wave of Account Hacks
Users report losing access to their accounts, with some being pressured into paying a ransom to get back in or else face permanent account deletion.
August 17, 2023
Users report losing access to their accounts, with some being pressured into paying a ransom to get back in or else face permanent account deletion.
by Elizabeth Montalbano, Contributor, Dark Reading
August 17, 2023
4 MIN READ
Article
Tesla Jailbreak Unlocks Theft of In-Car Paid Features
Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs.
August 02, 2023
Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs.
by Tara Seals, Managing Editor, News, Dark Reading
August 02, 2023
5 MIN READ
Article
Canon Inkjet Printers at Risk for Third-Party Compromise via Wi-Fi
Nearly 200 models are affected by vulnerability that may give wireless access to unauthorized third parties.
August 01, 2023
Nearly 200 models are affected by vulnerability that may give wireless access to unauthorized third parties.
by Dark Reading Staff, Dark Reading
August 01, 2023
1 MIN READ
Article
Choose the Best Biometrics Authentication for Your Use Case
Voice, face, and vein recognition each have its pros and cons. Here's what CISOs need to know.
July 28, 2023
Voice, face, and vein recognition each have its pros and cons. Here's what CISOs need to know.
by Evan Schuman, Contributing Writer, Dark Reading
July 28, 2023
4 MIN READ
Article
3 Ways AI Could Improve Authentication
As companies navigate how to protect themselves from the onslaught of increasingly sophisticated fraud threats, artificial intelligence will be a critical piece of next-gen authentication.
July 19, 2023
As companies navigate how to protect themselves from the onslaught of increasingly sophisticated fraud threats, artificial intelligence will be a critical piece of next-gen authentication.
by Blair Cohen, Founder & President, AuthenticID
July 19, 2023
4 MIN READ
Article
Cisco Flags Critical SD-WAN Vulnerability
A flaw in the REST API of Cisco's SD_WAN vManage software could allow remote, unauthenticated attackers to perform data exfiltration.
July 14, 2023
A flaw in the REST API of Cisco's SD_WAN vManage software could allow remote, unauthenticated attackers to perform data exfiltration.
by Dark Reading Staff, Dark Reading
July 14, 2023
1 MIN READ
Article
11M HCA Healthcare Patients Impacted by Data Breach
The hackers posted up for sale stolen HCA Healthcare data on Dark Web forum.
July 11, 2023
The hackers posted up for sale stolen HCA Healthcare data on Dark Web forum.
by Dark Reading Staff, Dark Reading
July 11, 2023
1 MIN READ
Article
Patchless Cisco Flaw Breaks Cloud Encryption for ACI Traffic
Vulnerable Nexus 9000 Series Fabric Switches in ACI mode should be disabled, Cisco advises.
July 06, 2023
Vulnerable Nexus 9000 Series Fabric Switches in ACI mode should be disabled, Cisco advises.
by Becky Bracken, Editor, Dark Reading
July 06, 2023
2 MIN READ
Article
Azure AD 'Log in With Microsoft' Authentication Bypass Affects Thousands
The "nOAuth" attack allows cross-platform spoofing and full account takeovers, and enterprises need to remediate the issue immediately, researchers warn.
June 22, 2023
The "nOAuth" attack allows cross-platform spoofing and full account takeovers, and enterprises need to remediate the issue immediately, researchers warn.
by Tara Seals, Managing Editor, News, Dark Reading
June 22, 2023
6 MIN READ
Article