The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Building & Maintaining an Effective Remote Access Strategy | August 2 Webinar | <REGISTER NOW>
Event
Building & Maintaining Security at the Network Edge | July 28 Webinar | <REGISTER NOW>
Event
How Ransomware Works - And What You Can Do to Stop It | July 14 Webinar | <REGISTER NOW>
Previous
Next
Remote Workforce
Breaking news, news analysis, and expert commentary on cybersecurity threats that target remote users and their devices and the tools & technologies to protect them.
Patch Now: Linux Container-Escape Flaw in Azure Service Fabric
Microsoft is urging organizations that don't have automatic updates enabled to update to the latest version of Linux Server Fabric to thwart the "FabricScape" cloud bug.
June 29, 2022
Microsoft is urging organizations that don't have automatic updates enabled to update to the latest version of Linux Server Fabric to thwart the "FabricScape" cloud bug.
by Jai Vijayan, Contributing Writer, Dark Reading
June 29, 2022
5 min read
Article
ZuoRAT Hijacks SOHO Routers From Cisco, Netgear
The malware has been in circulation since 2020, with sophisticated, advanced malicious actors taking advantage of the vulnerabilities in SOHO routers as the work-from-home population expands rapidly.
June 29, 2022
The malware has been in circulation since 2020, with sophisticated, advanced malicious actors taking advantage of the vulnerabilities in SOHO routers as the work-from-home population expands rapidly.
by Nathan Eddy, Contributing Writer, Dark Reading
June 29, 2022
5 min read
Article
Kaspersky Reveals Phishing Emails That Employees Find Most Confusing
Results from phishing simulation campaigns highlight the five most effective types of phishing email.
June 29, 2022
Results from phishing simulation campaigns highlight the five most effective types of phishing email.
June 29, 2022
4 min read
Article
Shadow IT Spurs 1 in 3 Cyberattacks
Cerby platform emerges from stealth mode to let users automate security for applications outside of the standard IT purview.
June 27, 2022
Cerby platform emerges from stealth mode to let users automate security for applications outside of the standard IT purview.
by Dark Reading Staff, Dark Reading
June 27, 2022
1 min read
Article
Cyberattackers Abuse QuickBooks Cloud Service in 'Double-Spear' Campaign
Malicious invoices coming from the accounting software's legitimate domain are used to harvest phone numbers and carry out fraudulent credit-card transactions.
June 23, 2022
Malicious invoices coming from the accounting software's legitimate domain are used to harvest phone numbers and carry out fraudulent credit-card transactions.
by Tara Seals, Managing Editor, News, Dark Reading
June 23, 2022
4 min read
Article
Microsoft 365 Users in US Face Raging Spate of Attacks
A voicemail-themed phishing campaign is hitting specific industry verticals across the country, bent on scavenging credentials that can be used for a range of nefarious purposes.
June 22, 2022
A voicemail-themed phishing campaign is hitting specific industry verticals across the country, bent on scavenging credentials that can be used for a range of nefarious purposes.
by Tara Seals, Managing Editor, News, Dark Reading
June 22, 2022
7 min read
Article
Tanium Partners With ScreenMeet to Enable Employees to Securely Connect to Their Remote Desktops
Partnership lets users access one-click ScreenMeet sessions from the Tanium platform.
June 22, 2022
Partnership lets users access one-click ScreenMeet sessions from the Tanium platform.
June 22, 2022
3 min read
Article
80% of Firms Suffered Identity-Related Breaches in Last 12 Months
With almost every business experiencing growth in human and machine identities, firms have made securing those identities a priority.
June 22, 2022
With almost every business experiencing growth in human and machine identities, firms have made securing those identities a priority.
by Robert Lemos, Contributing Writer, Dark Reading
June 22, 2022
4 min read
Article
VPNs Persist Despite Zero-Trust Fervor
Most organizations still rely on virtual private networks for secure remote access.
June 21, 2022
Most organizations still rely on virtual private networks for secure remote access.
by Ericka Chickowski, Contributing Writer, Dark Reading
June 21, 2022
3 min read
Article
Name That Toon: Cuter Than a June Bug
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
June 20, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
June 20, 2022
1 min read
Article
Corel Acquires Awingu
The combination of Awingu and the Parallels Remote Application Server platform will enable end users to securely work from anywhere, at any time, on any device, or OS.
June 13, 2022
The combination of Awingu and the Parallels Remote Application Server platform will enable end users to securely work from anywhere, at any time, on any device, or OS.
June 13, 2022
4 min read
Article
New Cloud Pricing and Products Proof of RSA’s Transformation
RSA pivots to exclusive focus. Identity is once again the ‘beating heart’ of RSA.
June 02, 2022
RSA pivots to exclusive focus. Identity is once again the ‘beating heart’ of RSA.
June 02, 2022
4 min read
Article
New Microsoft Zero-Day Attack Underway
"Follina" vulnerability in Microsoft Support Diagnostic Tool (MSDT) affects all currently supported Windows versions and can be triggered via specially crafted Office documents.
May 31, 2022
"Follina" vulnerability in Microsoft Support Diagnostic Tool (MSDT) affects all currently supported Windows versions and can be triggered via specially crafted Office documents.
by Jai Vijayan, Contributing Writer, Dark Reading
May 31, 2022
6 min read
Article
ChromeLoader Malware Hijacks Browsers With ISO Files
The malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.
May 27, 2022
The malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.
by Nathan Eddy, Contributing Writer, Dark Reading
May 27, 2022
4 min read
Article
Spring Cleaning Checklist for Keeping Your Devices Safe at Work
Implement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and employees' devices secure.
May 25, 2022
Implement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and employees' devices secure.
by Alex Lisle, Chief Technology Officer, Kryptowire
May 25, 2022
4 min read
Article