The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat Europe - December 5-8 - Learn More
Black Hat Middle East & Africa - November 15-17 - Learn More
Webinars
From Reactive to Proactive, Changing the Culture on API Security
Aug 24, 2022
Using Identity & Access Management to Improve Cyber Defense
Sep 13, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat Europe - December 5-8 - Learn More
Black Hat Middle East & Africa - November 15-17 - Learn More
Webinars
From Reactive to Proactive, Changing the Culture on API Security
Aug 24, 2022
Using Identity & Access Management to Improve Cyber Defense
Sep 13, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat Europe - December 5-8 - Learn More
Black Hat Middle East & Africa - November 15-17 - Learn More
Webinars
From Reactive to Proactive, Changing the Culture on API Security
Aug 24, 2022
Using Identity & Access Management to Improve Cyber Defense
Sep 13, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Event
Malicious Bots: What Enterprises Need to Know | August 30 Webinar | <REGISTER NOW>
Event
How Supply Chain Attacks Work – And What You Can Do to Stop Them | August 17 Webinar | <REGISTER NOW>
Previous
Next
Cybersecurity In-Depth
Edge Threat Monitor
Graphic data and analysis of emerging cybersecurity attacks, threats, and trends.
Cybercriminals Weaponizing Ransomware Data for BEC Attacks
Attacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.
August 12, 2022
Attacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.
by Edge Editors, Dark Reading
August 12, 2022
3 min read
Article
What Worries Security Teams About the Cloud?
What issues are cybersecurity professionals concerned about in 2022? You tell us!
August 05, 2022
What issues are cybersecurity professionals concerned about in 2022? You tell us!
by Edge Editors, Dark Reading
August 05, 2022
2 min read
Article
Attackers Have 'Favorite' Vulnerabilities to Exploit
While attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.
July 29, 2022
While attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.
by Edge Editors, Dark Reading
July 29, 2022
2 min read
Article
Internet Searches Reveal Surprisingly Prevalent Ransomware
Two mostly defunct threats — WannaCry and NonPetya — top the list of ransomware searches, but does that mean they are still causing problems?
July 13, 2022
Two mostly defunct threats — WannaCry and NonPetya — top the list of ransomware searches, but does that mean they are still causing problems?
by Robert Lemos, Contributing Writer, Dark Reading
July 13, 2022
4 min read
Article
Time Constraints Hamper Security Awareness Programs
Even as more attacks target humans, lack of dedicated staff, relevant skills, and time are making it harder to develop a security-aware and engaged workforce, SANS says.
July 01, 2022
Even as more attacks target humans, lack of dedicated staff, relevant skills, and time are making it harder to develop a security-aware and engaged workforce, SANS says.
by Edge Editors, Dark Reading
July 01, 2022
3 min read
Article
Organizations Battling Phishing Malware, Viruses the Most
Organizations may not frequently encounter malware targeting cloud systems or networking equipment, but the array of malware they do encounter just occasionally is no less disruptive or damaging. That is where the focus needs to be.
June 23, 2022
Organizations may not frequently encounter malware targeting cloud systems or networking equipment, but the array of malware they do encounter just occasionally is no less disruptive or damaging. That is where the focus needs to be.
by Edge Editors, Dark Reading
June 23, 2022
3 min read
Article
Ransomware and Phishing Remain IT's Biggest Concerns
Security teams — who are already fighting off malware challenges — are also facing renewed attacks on cloud assets and remote systems.
June 17, 2022
Security teams — who are already fighting off malware challenges — are also facing renewed attacks on cloud assets and remote systems.
by Edge Editors, Dark Reading
June 17, 2022
3 min read
Article
For Ransomware, Speed Matters
Someone interested in putting together a ransomware campaign has to consider several factors. The LockBit group touts its speed over competing families to attract potential buyers for its ransowmare-as-a-service.
June 03, 2022
Someone interested in putting together a ransomware campaign has to consider several factors. The LockBit group touts its speed over competing families to attract potential buyers for its ransowmare-as-a-service.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
June 03, 2022
4 min read
Article
Most Common Threats in DBIR
Supply chain and ransomware attacks increased dramatically in 2021, which explains why so many data breaches in Verizon's "2022 Data Breach Investigations Report" were grouped as system intrusion.
May 25, 2022
Supply chain and ransomware attacks increased dramatically in 2021, which explains why so many data breaches in Verizon's "2022 Data Breach Investigations Report" were grouped as system intrusion.
by Edge Editors, Dark Reading
May 25, 2022
3 min read
Article
Passwords: Do Actions Speak Louder Than Words?
For most of us, passwords are the most visible security control we deal with on a regular basis, but we are not very good at it.
May 06, 2022
For most of us, passwords are the most visible security control we deal with on a regular basis, but we are not very good at it.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
May 06, 2022
3 min read
Article
IT Teams Worry Staff Lack Cloud-Specific Skills
Security, cost, and reliability top the list of concerns IT teams have about their cloud operations, according to a recent report.
April 28, 2022
Security, cost, and reliability top the list of concerns IT teams have about their cloud operations, according to a recent report.
by Edge Editors, Dark Reading
April 28, 2022
2 min read
Article
Adversaries Look for 'Attackability' When Selecting Targets
A large number of enterprise applications are affected by the vulnerability in Log4j, but adversaries aren't just looking for the most common applications. They are looking for targets that are easier to exploit and/or have the biggest payoff.
April 19, 2022
A large number of enterprise applications are affected by the vulnerability in Log4j, but adversaries aren't just looking for the most common applications. They are looking for targets that are easier to exploit and/or have the biggest payoff.
by Edge Editors, Dark Reading
April 19, 2022
3 min read
Article
Upgrades for Spring Framework Have Stalled
Upgrading and fixing the vulnerability in the Spring Framework doesn't seem to have the same level of urgency or energy as patching the Log4j library did back in December.
April 16, 2022
Upgrading and fixing the vulnerability in the Spring Framework doesn't seem to have the same level of urgency or energy as patching the Log4j library did back in December.
by Edge Editors, Dark Reading
April 16, 2022
4 min read
Article
Precursor Malware Is an Early Warning Sign for Ransomware
Ransomware typically relies on malware downloaders and other delivery mechanisms. Detecting and removing precursor malware improves the odds that a ransomware attack has been blocked.
March 29, 2022
Ransomware typically relies on malware downloaders and other delivery mechanisms. Detecting and removing precursor malware improves the odds that a ransomware attack has been blocked.
by Edge Editors, Dark Reading
March 29, 2022
2 min read
Article
Downloaders Currently the Most Prevalent Android Malware
Of the top 10 Trojans targeting Android devices, downloaders and infostealers accounted for 87% of detections in February, Bitdefender says.
March 24, 2022
Of the top 10 Trojans targeting Android devices, downloaders and infostealers accounted for 87% of detections in February, Bitdefender says.
by Edge Editors, Dark Reading
March 24, 2022
2 min read
Article