The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Quick Hits
Tesla Whistleblower Leaks 100GB of Data, Revealing Safety Complaints
Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
May 26, 2023
Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
by Dark Reading Staff, Dark Reading
May 26, 2023
1 MIN READ
Article
Lazarus Group Striking Vulnerable Windows IIS Web Servers
The infamous North Korean APT group is using Log4Shell, the 3CX supply chain attack, and other known vectors to breach Microsoft Web servers.
May 25, 2023
The infamous North Korean APT group is using Log4Shell, the 3CX supply chain attack, and other known vectors to breach Microsoft Web servers.
by Dark Reading Staff, Dark Reading
May 25, 2023
1 MIN READ
Article
Netflix's Password-Sharing Ban Offers Security Upsides
The streaming giant is looking to bolster flagging subscription growth and profits, but security researchers say the move offers a perfect opportunity to encourage better password hygiene and account safety.
May 25, 2023
The streaming giant is looking to bolster flagging subscription growth and profits, but security researchers say the move offers a perfect opportunity to encourage better password hygiene and account safety.
by Tara Seals, Managing Editor, News, Dark Reading
May 25, 2023
2 MIN READ
Article
Bank of Ghana Opens SOC to Enable Threat Intelligence Sharing
Bank of Ghana's security operations center will boost visibility into threats and enable threat intelligence sharing, it says.
May 25, 2023
Bank of Ghana's security operations center will boost visibility into threats and enable threat intelligence sharing, it says.
by Dark Reading Staff, Dark Reading
May 25, 2023
1 MIN READ
Article
Threat Actors Compromise Barracuda Email Security Appliances
The company's ESG appliances were breached, but their other services remain unaffected by the compromise.
May 24, 2023
The company's ESG appliances were breached, but their other services remain unaffected by the compromise.
by Dark Reading Staff, Dark Reading
May 24, 2023
1 MIN READ
Article
Israeli Shipping, Logistics Companies Targeted in Watering Hole Attacks
Researchers say the Iranian nation-state actor known as Tortoiseshell could be behind the attacks.
May 24, 2023
Researchers say the Iranian nation-state actor known as Tortoiseshell could be behind the attacks.
by Dan Raywood, Senior Editor, Dark Reading
May 24, 2023
1 MIN READ
Article
FBI: Human Trafficking Rings Force Job Seekers Into Cryptojacking Schemes
Victims of the cybercrime schemes are coerced to participate through violence and having their belongings taken away.
May 23, 2023
Victims of the cybercrime schemes are coerced to participate through violence and having their belongings taken away.
by Dark Reading Staff, Dark Reading
May 23, 2023
1 MIN READ
Article
Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations
The technology conglomerate has until later this year to end its transfer of European user's data across the Atlantic.
May 22, 2023
The technology conglomerate has until later this year to end its transfer of European user's data across the Atlantic.
by Dark Reading Staff, Dark Reading
May 22, 2023
1 MIN READ
Article
Apple Patches 3 Zero-Days Possibly Already Exploited
In an advisory released by the company, Apple revealed patches for three previously unknown bugs it says may already have been used by attackers.
May 19, 2023
In an advisory released by the company, Apple revealed patches for three previously unknown bugs it says may already have been used by attackers.
by Dark Reading Staff, Dark Reading
May 19, 2023
1 MIN READ
Article
Google Debuts Quality Ratings for Security Bug Disclosures
New rules aim to level up the quality of submissions to Google and Android device Vulnerability Reward Program.
May 19, 2023
New rules aim to level up the quality of submissions to Google and Android device Vulnerability Reward Program.
by Becky Bracken, Editor, Dark Reading
May 19, 2023
1 MIN READ
Article
BianLian Cybercrime Group Changes Up Extortion Methods, Warns CISA
CISA urges small and midsized organizations as well as critical infrastructure to implement mitigations immediately to shield themselves from further data exfiltration attacks.
May 17, 2023
CISA urges small and midsized organizations as well as critical infrastructure to implement mitigations immediately to shield themselves from further data exfiltration attacks.
by Dark Reading Staff, Dark Reading
May 17, 2023
1 MIN READ
Article
Houthi-Backed Spyware Effort Targets Yemen Aid Workers
Pro-Houthi OilAlpha uses spoofed Android apps to monitor victims across the Arab peninsula working to bring stability to Yemen.
May 17, 2023
Pro-Houthi OilAlpha uses spoofed Android apps to monitor victims across the Arab peninsula working to bring stability to Yemen.
by Dark Reading Staff, Dark Reading
May 17, 2023
1 MIN READ
Article
Apple Boots a Half-Million Developers From Official App Store
The mobile phone and MacBook giant also rejected nearly 1.7 million app submissions last year in an effort to root out malware and fraud.
May 17, 2023
The mobile phone and MacBook giant also rejected nearly 1.7 million app submissions last year in an effort to root out malware and fraud.
by Tara Seals, Managing Editor, News, Dark Reading
May 17, 2023
2 MIN READ
Article
Russian Ransomware Perp Charged After High-Profile Hive, Babuk & LockBit Hits
LockBit, Babuk, and Hive ransomware used by Russian to target critical US organizations, DOJ says.
May 16, 2023
LockBit, Babuk, and Hive ransomware used by Russian to target critical US organizations, DOJ says.
by Dark Reading Staff, Dark Reading
May 16, 2023
1 MIN READ
Article
Qilin Ransomware Operation Outfits Affiliates With Sleek, Turnkey Cyberattacks
Researchers infiltrate a ransomware operation and discover slick services behind Qilin's Rust-based malware variant.
May 16, 2023
Researchers infiltrate a ransomware operation and discover slick services behind Qilin's Rust-based malware variant.
by Dark Reading Staff, Dark Reading
May 16, 2023
1 MIN READ
Article