The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Insider Threats
Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools & technologies.
7 Tips for Mitigating Cyber-Risks to Your Corporate Social Media
How to stay safe, even when tech-savvy admins can't tell the difference between a scam and the truth.
February 22, 2023
How to stay safe, even when tech-savvy admins can't tell the difference between a scam and the truth.
by Anna Larkina, Web Content Analysis Expert, Kaspersky
February 22, 2023
4 MIN READ
Article
Israel's Top Tech University Targeted by DarkBit Ransomware
An Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send a political message — and maybe something more.
February 21, 2023
An Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send a political message — and maybe something more.
by Nathan Eddy, Contributing Writer, Dark Reading
February 21, 2023
4 MIN READ
Article
Insider Threats Don't Mean Insiders Are Threatening
By implementing tools that enable internal users to do their jobs efficiently and securely, companies reduce insider threat risk by building insider trust.
February 21, 2023
By implementing tools that enable internal users to do their jobs efficiently and securely, companies reduce insider threat risk by building insider trust.
by Szilveszter Szebeni, Co-Founder & CISO, Tresorit
February 21, 2023
5 MIN READ
Article
The Threat from Within: 71% of Business Leaders Surveyed Think Next Cybersecurity Breach Will Come from the Inside
January 30, 2023
January 30, 2023
3 MIN READ
Article
Hunting Insider Threats on the Dark Web
Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.
January 23, 2023
Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.
by Jim Simpson, Director of Threat Intelligence, Searchlight Cyber
January 23, 2023
4 MIN READ
Article
Cybersecurity and the Myth of Quiet Quitting
People are working harder than ever, but they're not happy about it — and the insider threat is all too real.
January 18, 2023
People are working harder than ever, but they're not happy about it — and the insider threat is all too real.
by Lynsey Wolf, Global i3 Investigations Team Lead, DTEX
January 18, 2023
4 MIN READ
Article
Are Meta and Twitter Ushering in a New Age of Insider Threats?
The era of digital trust is broken, and constant vigilance is needed to get things back on track.
January 03, 2023
The era of digital trust is broken, and constant vigilance is needed to get things back on track.
by Ian McShane, Vice President of Strategy, Arctic Wolf
January 03, 2023
4 MIN READ
Article
Popular WAFs Subverted by JSON Bypass
Web application firewalls from AWS, Cloudflare, F5, Imperva, and Palo Alto Networks are vulnerable to a database attack using the popular JavaScript Object Notation (JSON) format.
December 12, 2022
Web application firewalls from AWS, Cloudflare, F5, Imperva, and Palo Alto Networks are vulnerable to a database attack using the popular JavaScript Object Notation (JSON) format.
by Robert Lemos, Contributing Writer, Dark Reading
December 12, 2022
3 MIN READ
Article
What We Really Mean When We Talk About ‘Cybersecurity’
A lack of precision in our terminology leads to misunderstandings and confusion about the activities we engage in, the information we share, and the expectations we hold.
November 09, 2022
A lack of precision in our terminology leads to misunderstandings and confusion about the activities we engage in, the information we share, and the expectations we hold.
by Sounil Yu, CISO and Head of Research, JupiterOne
November 09, 2022
5 MIN READ
Article
Beyond the Pen Test: How to Protect Against Sophisticated Cybercriminals
Why are we still doing perfunctory penetration testing when we can be emulating realistic threats and stress-testing the systems most at risk?
November 07, 2022
Why are we still doing perfunctory penetration testing when we can be emulating realistic threats and stress-testing the systems most at risk?
by Cameron Over, Partner, National Cyber & Privacy Lead, CrossCountry Consulting
November 07, 2022
4 MIN READ
Article
W4SP Stealer Stings Python Developers in Supply Chain Attack
Threat actors continue to push malicious Python packages to the popular PyPI service, striking with typosquatting, authentic sounding file names, and hidden imports to fool developers and steal their information.
November 04, 2022
Threat actors continue to push malicious Python packages to the popular PyPI service, striking with typosquatting, authentic sounding file names, and hidden imports to fool developers and steal their information.
by Robert Lemos, Contributing Writer, Dark Reading
November 04, 2022
3 MIN READ
Article
Dropbox Code Repositories Stolen in Cyberattack on GitHub-Based Developers
An attack campaign using phishing attacks gives threat actors access to internal Dropbox code repositories, the latest in a series of attacks targeting developers through their GitHub accounts.
November 02, 2022
An attack campaign using phishing attacks gives threat actors access to internal Dropbox code repositories, the latest in a series of attacks targeting developers through their GitHub accounts.
by Robert Lemos, Contributing Writer, Dark Reading
November 02, 2022
4 MIN READ
Article
Cybersecurity Risks & Stats This Spooky Season
From ransomware to remote workers to cyber-extortion gangs to Fred in shipping who clicks on the wrong link, cybersecurity concerns can keep you awake this season and all seasons.
October 25, 2022
From ransomware to remote workers to cyber-extortion gangs to Fred in shipping who clicks on the wrong link, cybersecurity concerns can keep you awake this season and all seasons.
by Paul Martini, Co-Founder, CEO, and Co-Chair, iboss
October 25, 2022
4 MIN READ
Article
Atlassian Vulnerabilities Highlight Criticality of Cloud Services
Two flaws in the popular developer cloud platform show how weaknesses in authorization functions and SaaS flaws can put cloud apps at risk.
October 24, 2022
Two flaws in the popular developer cloud platform show how weaknesses in authorization functions and SaaS flaws can put cloud apps at risk.
by Robert Lemos, Contributing Writer, Dark Reading
October 24, 2022
3 MIN READ
Article
CISA Offers Free RedEye Analytics Tool for Red Teams
The tool helps red teams manage their activities, analyze the data from their campaigns, create reports, and better present results to organizations.
October 18, 2022
The tool helps red teams manage their activities, analyze the data from their campaigns, create reports, and better present results to organizations.
by Robert Lemos, Contributing Writer, Dark Reading
October 18, 2022
5 MIN READ
Article