The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Cybersecurity In-Depth
Edge Threat Monitor
Graphic data and analysis of emerging cybersecurity attacks, threats, and trends.
Attackers Route Malware Activity Over Popular CDNs
One way to hide malicious activity is to make it look benign by blending in with regular traffic passing through content delivery networks (CDNs) and cloud service providers, according to a Netskope report.
May 05, 2023
One way to hide malicious activity is to make it look benign by blending in with regular traffic passing through content delivery networks (CDNs) and cloud service providers, according to a Netskope report.
by Edge Editors, Dark Reading
May 05, 2023
1 MIN READ
Article
AppSec Making Progress or Spinning Its Wheels?
Software developers and application security specialists estimate they are catching only 60% of vulnerabilities, but other measures indicate better results.
May 02, 2023
Software developers and application security specialists estimate they are catching only 60% of vulnerabilities, but other measures indicate better results.
by Robert Lemos, Contributing Writer, Dark Reading
May 02, 2023
4 MIN READ
Article
Almost Half of Former Employees Say Their Passwords Still Work
It's not hacking if organizations fail to terminate password access after employees leave.
April 07, 2023
It's not hacking if organizations fail to terminate password access after employees leave.
by Dark Reading Staff, Dark Reading
April 07, 2023
1 MIN READ
Article
Evaluating the Cyberwar Set Off by Russian Invasion of Ukraine
Preparation and cooperation helped to mitigate the worst of the digital damage, amid cyber sorties from all sides.
February 24, 2023
Preparation and cooperation helped to mitigate the worst of the digital damage, amid cyber sorties from all sides.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
February 24, 2023
4 MIN READ
Article
Enterprises Need to Do More to Assure Consumers About Privacy
Organizations care about data privacy, but their priorities appear to be different from what their customers think are important.
January 27, 2023
Organizations care about data privacy, but their priorities appear to be different from what their customers think are important.
by Edge Editors, Dark Reading
January 27, 2023
2 MIN READ
Article
Adobe, Apple, Cisco, Microsoft Flaws Make Up Half of KEV Catalog
CISA's Known Exploited Vulnerabilities Catalog has become a valuable repository of vulnerabilities to be patched. A pair of reports analyze the vulnerabilities under attack to understand the kind of threats organizations should be prioritizing.
December 30, 2022
CISA's Known Exploited Vulnerabilities Catalog has become a valuable repository of vulnerabilities to be patched. A pair of reports analyze the vulnerabilities under attack to understand the kind of threats organizations should be prioritizing.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
December 30, 2022
4 MIN READ
Article
Analysis Shows Attackers Favor PowerShell, File Obfuscation
Aiming to give threat hunters a list of popular attack tactics, a cybersecurity team analyzed collections of real-world threat data to find attackers' most popular techniques.
December 14, 2022
Aiming to give threat hunters a list of popular attack tactics, a cybersecurity team analyzed collections of real-world threat data to find attackers' most popular techniques.
by Robert Lemos, Contributing Writer, Dark Reading
December 14, 2022
4 MIN READ
Article
Cybersecurity Drives Improvements in Business Goals
Deloitte's Future of Cyber study highlights the fact that cybersecurity is an essential part of business success and should not be limited to just mitigating IT risks.
December 13, 2022
Deloitte's Future of Cyber study highlights the fact that cybersecurity is an essential part of business success and should not be limited to just mitigating IT risks.
by Edge Editors, Dark Reading
December 13, 2022
3 MIN READ
Article
Concern Over DDoS Attacks Falls Despite Rise in Incidents
Almost a third of respondents in Fastly's "Fight Fire with Fire" survey view data breaches and data loss as the biggest cybersecurity threat.
December 02, 2022
Almost a third of respondents in Fastly's "Fight Fire with Fire" survey view data breaches and data loss as the biggest cybersecurity threat.
by Edge Editors, Dark Reading
December 02, 2022
2 MIN READ
Article
Credential Harvesting Is Retail Industry's Top Threat
Why bother with new tactics and exploits when the old tricks are still effective?
October 07, 2022
Why bother with new tactics and exploits when the old tricks are still effective?
by Edge Editors, Dark Reading
October 07, 2022
2 MIN READ
Article
No Motivation for Quantum Without Regulatory Push
What's it going to take to prod organizations to implement a post-quantum security plan? Legislative pressure.
September 20, 2022
What's it going to take to prod organizations to implement a post-quantum security plan? Legislative pressure.
by Edge Editors, Dark Reading
September 20, 2022
2 MIN READ
Article
Ghost Data Increases Enterprise Business Risk
IT has to get its hands around cloud data sprawl. Another area of focus should be on ghost data, as it expands the organization's cloud attack surface.
September 02, 2022
IT has to get its hands around cloud data sprawl. Another area of focus should be on ghost data, as it expands the organization's cloud attack surface.
by Edge Editors, Dark Reading
September 02, 2022
2 MIN READ
Article
Cybercriminals Weaponizing Ransomware Data for BEC Attacks
Attacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.
August 12, 2022
Attacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.
by Edge Editors, Dark Reading
August 12, 2022
2 MIN READ
Article
What Worries Security Teams About the Cloud?
What issues are cybersecurity professionals concerned about in 2022? You tell us!
August 05, 2022
What issues are cybersecurity professionals concerned about in 2022? You tell us!
by Edge Editors, Dark Reading
August 05, 2022
1 MIN READ
Article
Attackers Have 'Favorite' Vulnerabilities to Exploit
While attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.
July 29, 2022
While attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.
by Edge Editors, Dark Reading
July 29, 2022
2 MIN READ
Article