informa
/

Risk

HTTP/2 Implementation Errors Exposing Websites to Serious Risks
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites an...
August 06, 2021
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites an...
by Jai Vijayan, Contributing Writer
August 06, 2021
4 min read
Article
CISA Launches JCDC, the Joint Cyber Defense Collaborative
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
August 05, 2021
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
by Kelly Jackson Higgins, Executive Editor
August 05, 2021
5 min read
Article
Why Supply Chain Attacks Are Destined to Escalate
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for softwa...
August 05, 2021
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for softwa...
by Kelly Jackson Higgins, Executive Editor
August 05, 2021
4 min read
Article
As Attackers Circle, Federal Agencies Fail to Improve Cybersecurity
Despite being the frequent target of nation-state and criminal actors, nearly every US government agency gets a "C" or "...
August 04, 2021
Despite being the frequent target of nation-state and criminal actors, nearly every US government agency gets a "C" or "...
by Robert Lemos, Contributing Writer
August 04, 2021
4 min read
Article
Organizations Still Struggle to Hire & Retain Infosec Employees: Report
Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
August 04, 2021
Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
by Joan Goodchild, Senior Editor
August 04, 2021
3 min read
Article
REvil Most Popular Ransomware Variant in 2021 (So Far)
An increase in global cyberattacks was driven by Web shell activity, targeted ransomware and extortion operations, and s...
August 04, 2021
An increase in global cyberattacks was driven by Web shell activity, targeted ransomware and extortion operations, and s...
by Dark Reading Staff, Dark Reading
August 04, 2021
2 min read
Article
Dark Reading Virtual News Desk Returns to Black Hat
Coming to you prerecorded from home offices around the world!
August 04, 2021
Coming to you prerecorded from home offices around the world!
by Dark Reading Staff, Dark Reading
August 04, 2021
9 min read
Article
Average Cost to Buy Access to a Compromised Company: $1,000
The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to special...
August 03, 2021
The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to special...
by Robert Lemos, Contributing Writer
August 03, 2021
4 min read
Article
Get Ahead of the Hack: Why Cyber Insurance Is Not Enough
Cybersecurity insurance is a smart investment to protect against the effects of ransomware and other attacks, but it sho...
August 03, 2021
Cybersecurity insurance is a smart investment to protect against the effects of ransomware and other attacks, but it sho...
by Jay Prassl, CEO and Founder, Automox
August 03, 2021
5 min read
Article
New Normal Demands New Security Leadership Structure
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security stra...
August 02, 2021
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security stra...
by Kelly Sheridan, Senior Editor
August 02, 2021
3 min read
Article
Defenders Face New Challenges As Attack Complexity Grows
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
August 02, 2021
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
by Dark Reading Staff, Dark Reading
August 02, 2021
1 min read
Article
Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
'PwnedPiper' flaws could allow attackers to disrupt delivery of lab samples, or steal hospital employee credentials, new...
August 02, 2021
'PwnedPiper' flaws could allow attackers to disrupt delivery of lab samples, or steal hospital employee credentials, new...
by Kelly Jackson Higgins, Executive Editor
August 02, 2021
6 min read
Article
Reports Point to Uptick in HTML Smuggling Attacks
Menlo Security and Microsoft report recent campaigns implementing the technique, which helps attackers stealthily delive...
July 30, 2021
Menlo Security and Microsoft report recent campaigns implementing the technique, which helps attackers stealthily delive...
by Kelly Sheridan, Senior Editor
July 30, 2021
5 min read
Article
What's Essential in an Incident Response Plan? Security Leaders Weigh In
A new report examines the must-have components of a security incident readiness and response playbook.
July 30, 2021
A new report examines the must-have components of a security incident readiness and response playbook.
by Dark Reading Staff, Dark Reading
July 30, 2021
1 min read
Article
The Power of Comedy for Cybersecurity Awareness Training
Cybersecurity is serious stuff, but the way we talk about it shouldn't be if we want people to pay attention and remembe...
July 30, 2021
Cybersecurity is serious stuff, but the way we talk about it shouldn't be if we want people to pay attention and remembe...
by Jann Yogman, Entertainment industry veteran and writer of Mimecast Awareness Training
July 30, 2021
4 min read
Article