The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Event
The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them | Jan 24 Webinar | <REGISTER NOW>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Identity & Access Management
Breaking news, news analysis, and expert commentary on cybersecurity operations, and the tools & technologies for security teams.
Dutchman Detained for Dealing Details of Tens of Millions of People
The accused sold an enormous data set stolen from the Austrian radio and television licensing authority — to an undercover cop.
January 26, 2023
The accused sold an enormous data set stolen from the Austrian radio and television licensing authority — to an undercover cop.
by Dark Reading Staff, Dark Reading
January 26, 2023
1 MIN READ
Article
Microsoft Azure-Based Kerberos Attacks Crack Open Cloud Accounts
Two common attacks against on-premises Kerberos authentication servers — known as Pass the Ticket and Silver Ticket — can be used against Microsoft's Azure AD Kerberos, a security firms says.
January 25, 2023
Two common attacks against on-premises Kerberos authentication servers — known as Pass the Ticket and Silver Ticket — can be used against Microsoft's Azure AD Kerberos, a security firms says.
by Robert Lemos, Contributing Writer, Dark Reading
January 25, 2023
5 MIN READ
Article
Ticketmaster Blames Bots in Taylor Swift 'Eras' Tour Debacle
Ticketmaster testified in the Senate that a cyberattack was to blame for the high-profile Taylor Swift concert sales collapse, but some senators aren't so sure.
January 24, 2023
Ticketmaster testified in the Senate that a cyberattack was to blame for the high-profile Taylor Swift concert sales collapse, but some senators aren't so sure.
by Becky Bracken, Editor, Dark Reading
January 24, 2023
4 MIN READ
Article
Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
A rapid increase in the number of operators in the space — the "locksmiths" of the cyber underground — has made it substantially cheaper for cybercriminals to buy access to target networks.
January 17, 2023
A rapid increase in the number of operators in the space — the "locksmiths" of the cyber underground — has made it substantially cheaper for cybercriminals to buy access to target networks.
by Jai Vijayan, Contributing Writer, Dark Reading
January 17, 2023
4 MIN READ
Article
Secrets Rotation Recommended After CircleCI Security Incident
Companies are being urged to update 0Auth, runner, and project API tokens, along with other secrets stashed with CircleCI.
January 17, 2023
Companies are being urged to update 0Auth, runner, and project API tokens, along with other secrets stashed with CircleCI.
by Dark Reading Staff, Dark Reading
January 17, 2023
1 MIN READ
Article
Norton LifeLock Warns on Password Manager Account Compromises
Password manager accounts may have, ironically, been compromised via simple credential stuffing, thanks to password reuse.
January 13, 2023
Password manager accounts may have, ironically, been compromised via simple credential stuffing, thanks to password reuse.
by Tara Seals, Managing Editor, News, Dark Reading
January 13, 2023
2 MIN READ
Article
LastPass Cops to Massive Breach Including Customer Vault Data
The follow-on attack from August's source-code breach could fuel future campaigns against LastPass customers.
December 23, 2022
The follow-on attack from August's source-code breach could fuel future campaigns against LastPass customers.
by Dark Reading Staff, Dark Reading
December 23, 2022
1 MIN READ
Article
'Blindside' Attack Subverts EDR Platforms From Windows Kernel
The technique loads a nonmonitored and unhooked DLL, and leverages debug techniques that could allow for running arbitrary code.
December 20, 2022
The technique loads a nonmonitored and unhooked DLL, and leverages debug techniques that could allow for running arbitrary code.
by Nathan Eddy, Contributing Writer, Dark Reading
December 20, 2022
4 MIN READ
Article
Cyber Threats Loom as 5B People Prepare to Watch World Cup Final
The 2022 FIFA Men's World Cup final in Qatar will be the most-watched sporting event in history — but will cybercriminals score a hat trick off its state-of-the-art digital footprint?
December 16, 2022
The 2022 FIFA Men's World Cup final in Qatar will be the most-watched sporting event in history — but will cybercriminals score a hat trick off its state-of-the-art digital footprint?
by Tara Seals, Managing Editor, News, Dark Reading
December 16, 2022
9 MIN READ
Article
Uber Breached, Again, After Attackers Compromise Third-Party Cloud
Threat actors leak employee email addresses, corporate reports, and IT asset information on a hacker forum after an attack on an Uber technology partner.
December 13, 2022
Threat actors leak employee email addresses, corporate reports, and IT asset information on a hacker forum after an attack on an Uber technology partner.
by Elizabeth Montalbano, Contributor, Dark Reading
December 13, 2022
5 MIN READ
Article
Bring Your Own Key — A Placebo?
BYOK was envisioned to reduce the risk of using a cloud service provider processing sensitive data, yet there are several deficiencies.
November 28, 2022
BYOK was envisioned to reduce the risk of using a cloud service provider processing sensitive data, yet there are several deficiencies.
by Erez Kalman, Security Architect | CISSP-ISSAP, CISM, CISA, CSSLP, CCSP, CDPSE
November 28, 2022
4 MIN READ
Article
Google Releases YARA Rules to Disrupt Cobalt Strike Abuse
The popular pen-testing tool is often cracked and repurposed by threat actors. Google now has a plan to address that.
November 21, 2022
The popular pen-testing tool is often cracked and repurposed by threat actors. Google now has a plan to address that.
by Karen Spiegelman, Features Editor
November 21, 2022
1 MIN READ
Article
Patch ASAP: Critical Citrix, VMware Bugs Threaten Remote Workspaces With Takeover
Hole-y software alert, Batman: Cybercriminal faves Citrix Gateway and VMware Workspace ONE have authentication-bypass bugs that could offer up total access to attackers.
November 09, 2022
Hole-y software alert, Batman: Cybercriminal faves Citrix Gateway and VMware Workspace ONE have authentication-bypass bugs that could offer up total access to attackers.
by Tara Seals, Managing Editor, News, Dark Reading
November 09, 2022
3 MIN READ
Article
A Better Way to Resist Identity-Based Cyber Threats
New approaches to identity access management are indispensable.
November 09, 2022
New approaches to identity access management are indispensable.
by Marcus Bartram, General Partner, Telstra Ventures
November 09, 2022
4 MIN READ
Article
Thoma Bravo to Acquire ForgeRock in $2.3B Deal
This marks the third identity and access management (IAM) company acquired by Thoma Bravo in just the past few months.
October 12, 2022
This marks the third identity and access management (IAM) company acquired by Thoma Bravo in just the past few months.
by Dark Reading Staff, Dark Reading
October 12, 2022
1 MIN READ
Article