The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Remote Workforce
Breaking news, news analysis, and expert commentary on cybersecurity threats that target remote users and their devices and the tools & technologies to protect them.
Netskope Intelligent SSE Selected by Transdev to Secure and Connect its Hybrid Workforce
Implementation is part of Transdev's Cloud-First approach to better manage technological obsolescence.
June 06, 2023
Implementation is part of Transdev's Cloud-First approach to better manage technological obsolescence.
June 06, 2023
3 MIN READ
Article
Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace
No activity logging in the free subscription for Google's Web-based productivity suite exposes enterprises to insider and other threats, researchers say.
June 01, 2023
No activity logging in the free subscription for Google's Web-based productivity suite exposes enterprises to insider and other threats, researchers say.
by Elizabeth Montalbano, Contributor, Dark Reading
June 01, 2023
5 MIN READ
Article
FBI: Human Trafficking Rings Force Job Seekers Into Cryptojacking Schemes
Victims of the cybercrime schemes are coerced to participate through violence and having their belongings taken away.
May 23, 2023
Victims of the cybercrime schemes are coerced to participate through violence and having their belongings taken away.
by Dark Reading Staff, Dark Reading
May 23, 2023
1 MIN READ
Article
Microsoft: BEC Attackers Evade 'Impossible Travel' Flags With Residential IP Addresses
Threat actors are circumventing geo-location-based security detections, using a combination of cybercrime-as-a-service platforms and the purchasing of local IP addresses.
May 23, 2023
Threat actors are circumventing geo-location-based security detections, using a combination of cybercrime-as-a-service platforms and the purchasing of local IP addresses.
by Elizabeth Montalbano, Contributor, Dark Reading
May 23, 2023
4 MIN READ
Article
Microsoft Teams Features Amp Up Orgs' Cyberattack Exposure
It's as they say: Teams is only as strong as its weakest links. Microsoft's collaboration platform offers Tabs, Meetings, and Messages functions, and they all can be exploited.
May 17, 2023
It's as they say: Teams is only as strong as its weakest links. Microsoft's collaboration platform offers Tabs, Meetings, and Messages functions, and they all can be exploited.
by Nate Nelson, Contributing Writer, Dark Reading
May 17, 2023
4 MIN READ
Article
Name That Toon: One by One
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
May 16, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
May 16, 2023
1 MIN READ
Article
Dragos Employee Hacked, Revealing Ransomware, Extortion Scheme
Attackers compromised the personal email of a new employee and, when the initial attack failed, attempted through socially engineered messages to get the company to pay them off.
May 11, 2023
Attackers compromised the personal email of a new employee and, when the initial attack failed, attempted through socially engineered messages to get the company to pay them off.
by Elizabeth Montalbano, Contributor, Dark Reading
May 11, 2023
4 MIN READ
Article
Security Leaders Discuss Industry Trends at Dark Reading's News Desk at RSAC 2023
Watch News Desk interviews with Dark Reading and cybersecurity leaders as they discuss trends and industry drivers druing RSA Conference 2023 in San Francisco.
May 11, 2023
Watch News Desk interviews with Dark Reading and cybersecurity leaders as they discuss trends and industry drivers druing RSA Conference 2023 in San Francisco.
by Dark Reading Staff, Dark Reading
May 11, 2023
5 MIN READ
Video
Microsoft Fixes Failed Patch for Exploited Outlook Vulnerability
Adding a single character to a function in the previous Outlook patch rendered that fix useless, researchers say.
May 10, 2023
Adding a single character to a function in the previous Outlook patch rendered that fix useless, researchers say.
by Jai Vijayan, Contributing Writer, Dark Reading
May 10, 2023
4 MIN READ
Article
Keeper Security Announces Minority Growth Equity Investment From Summit Partners
Investment marks the second significant funding round from a leading technology growth equity firm.
May 09, 2023
Investment marks the second significant funding round from a leading technology growth equity firm.
May 09, 2023
5 MIN READ
Article
SideWinder Strikes Victims in Pakistan, Turkey in Multiphase Polymorphic Attack
The APT is exploiting a remote template injection flaw to deliver malicious documents that lure in government officials and other targets with topics of potential interest.
May 09, 2023
The APT is exploiting a remote template injection flaw to deliver malicious documents that lure in government officials and other targets with topics of potential interest.
by Elizabeth Montalbano, Contributor, Dark Reading
May 09, 2023
4 MIN READ
Article
BEC Campaign via Israel Spotted Targeting Large Multinational Companies
The latest scams request historically high sums of around $700,000.
May 09, 2023
The latest scams request historically high sums of around $700,000.
by Nathan Eddy, Contributing Writer, Dark Reading
May 09, 2023
4 MIN READ
Article
How to Spot a ChatGPT Phishing Website
Scammers are leveraging the popularity of ChatGPT in phishing attacks. Here's a look at research on these newly registered domains and tactics.
May 04, 2023
Scammers are leveraging the popularity of ChatGPT in phishing attacks. Here's a look at research on these newly registered domains and tactics.
by Nate Nelson, Contributing Writer, Dark Reading
May 04, 2023
2 MIN READ
Article
The Daily Number of Human-Driven Cyber Incidents Increased by 1.5 Times in 2022
May 03, 2023
May 03, 2023
2 MIN READ
Article
Google Ads Abused to Lure Corporate Workers to LOBSHOT Backdoor
The cyberattack campaign, similar to one to spread the Rhadamanthys Stealer, is part of a larger trend by attackers to use malvertising as initial access for ransomware and other threat activity.
May 02, 2023
The cyberattack campaign, similar to one to spread the Rhadamanthys Stealer, is part of a larger trend by attackers to use malvertising as initial access for ransomware and other threat activity.
by Elizabeth Montalbano, Contributor, Dark Reading
May 02, 2023
4 MIN READ
Article