The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat Europe - December 5-8 - Learn More
Black Hat Middle East & Africa - November 15-17 - Learn More
Webinars
From Reactive to Proactive, Changing the Culture on API Security
Aug 24, 2022
Understanding Machine Learning, Artificial Intelligence, & Deep Learning, and When to Use Them
Sep 07, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat Europe - December 5-8 - Learn More
Black Hat Middle East & Africa - November 15-17 - Learn More
Webinars
From Reactive to Proactive, Changing the Culture on API Security
Aug 24, 2022
Understanding Machine Learning, Artificial Intelligence, & Deep Learning, and When to Use Them
Sep 07, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat Europe - December 5-8 - Learn More
Black Hat Middle East & Africa - November 15-17 - Learn More
Webinars
From Reactive to Proactive, Changing the Culture on API Security
Aug 24, 2022
Understanding Machine Learning, Artificial Intelligence, & Deep Learning, and When to Use Them
Sep 07, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Event
Malicious Bots: What Enterprises Need to Know | August 30 Webinar | <REGISTER NOW>
Event
How Supply Chain Attacks Work – And What You Can Do to Stop Them | August 17 Webinar | <REGISTER NOW>
Previous
Next
Risk
Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.
Krebs: Taiwan, Geopolitical Headwinds Loom Large
During a keynote at Black Hat 2022, former CISA director Chris Krebs outlined the biggest risk areas for the public and private sectors for the next few years.
August 11, 2022
During a keynote at Black Hat 2022, former CISA director Chris Krebs outlined the biggest risk areas for the public and private sectors for the next few years.
by Tara Seals, Managing Editor, News, Dark Reading
August 11, 2022
8 min read
Article
After Colonial Pipeline, Critical Infrastructure Operators Remain Blind to Cyber-Risks
In her keynote address at Black Hat USA 2022, Kim Zetter gives a scathing rebuke of Colonial Pipeline for not foreseeing the attack.
August 11, 2022
In her keynote address at Black Hat USA 2022, Kim Zetter gives a scathing rebuke of Colonial Pipeline for not foreseeing the attack.
by Jeffrey Schwartz, Contributing Writer
August 11, 2022
5 min read
Article
Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight
Up-and-coming companies shoot their shot in a new feature introduced at the 25th annual cybersecurity conference.
August 11, 2022
Up-and-coming companies shoot their shot in a new feature introduced at the 25th annual cybersecurity conference.
by Karen Spiegelman, Features Editor
August 11, 2022
4 min read
Article
Cyber-Insurance Fail: Most Businesses Lack Ransomware Coverage
Even among businesses with cyber insurance, they lack coverage for basic costs of many cyberattacks, according to a BlackBerry survey.
August 11, 2022
Even among businesses with cyber insurance, they lack coverage for basic costs of many cyberattacks, according to a BlackBerry survey.
by Nathan Eddy, Contributing Writer, Dark Reading
August 11, 2022
4 min read
Article
Compliance Certifications: Worth the Effort?
Because demonstrating compliance with industry regulations can be cumbersome and expensive, it's important to ensure they're also absolutely essential.
August 10, 2022
Because demonstrating compliance with industry regulations can be cumbersome and expensive, it's important to ensure they're also absolutely essential.
by Shmulik Yehezkel, Chief Critical Cyber Operations Officer & CISO, CYE
August 10, 2022
5 min read
Article
Software Development Pipelines Offer Cybercriminals 'Free-Range' Access to Cloud, On-Prem
A Q&A with NCC Group's Viktor Gazdag ahead of a Black Hat USA session on CI/CD pipeline risks reveals a scary, and expanding, campaign vector for software supply chain attacks and RCE.
August 09, 2022
A Q&A with NCC Group's Viktor Gazdag ahead of a Black Hat USA session on CI/CD pipeline risks reveals a scary, and expanding, campaign vector for software supply chain attacks and RCE.
by Tara Seals, Managing Editor, News, Dark Reading
August 09, 2022
8 min read
Article
Researchers Debut Fresh RCE Vector for Common Google API Tool
The finding exposes the danger of older, unpatched bugs, which plague at least 4.5 million devices.
August 09, 2022
The finding exposes the danger of older, unpatched bugs, which plague at least 4.5 million devices.
by Nathan Eddy, Contributing Writer, Dark Reading
August 09, 2022
6 min read
Article
US Oil and Gas Sector at Risk of a Cyberbreach, According to BreachBits Study
Study offers a cyber "state of the industry" analysis from a hacker's perspective to help companies anticipate attacks.
August 09, 2022
Study offers a cyber "state of the industry" analysis from a hacker's perspective to help companies anticipate attacks.
August 09, 2022
3 min read
Article
Deepfakes Grow in Sophistication, Cyberattacks Rise Following Ukraine War
A rising tide of threats — from API exploits to deepfakes to extortionary ransomware attacks — is threatening to overwhelm IT security teams.
August 08, 2022
A rising tide of threats — from API exploits to deepfakes to extortionary ransomware attacks — is threatening to overwhelm IT security teams.
by Nathan Eddy, Contributing Writer, Dark Reading
August 08, 2022
4 min read
Article
A Ransomware Explosion Fosters Thriving Dark Web Ecosystem
For the right price, threat actors can get just about anything they want to launch a ransomware attack — even without technical skills or any previous experience.
August 05, 2022
For the right price, threat actors can get just about anything they want to launch a ransomware attack — even without technical skills or any previous experience.
by Jai Vijayan, Contributing Writer, Dark Reading
August 05, 2022
6 min read
Article
Massive China-Linked Disinformation Campaign Taps PR Firm for Help
A global network of inauthentic news sites present themselves as independent news outlets, offering content favoring China's government and articles critical of the US.
August 04, 2022
A global network of inauthentic news sites present themselves as independent news outlets, offering content favoring China's government and articles critical of the US.
by Nathan Eddy, Contributing Writer, Dark Reading
August 04, 2022
4 min read
Article
How IT Teams Can Use 'Harm Reduction' for Better Cybersecurity Outcomes
Copado's Kyle Tobener will discuss a three-pronged plan at Black Hat USA for addressing human weaknesses in cybersecurity with this medical concept — from phishing to shadow IT.
August 03, 2022
Copado's Kyle Tobener will discuss a three-pronged plan at Black Hat USA for addressing human weaknesses in cybersecurity with this medical concept — from phishing to shadow IT.
by Tara Seals, Managing Editor, News, Dark Reading
August 03, 2022
6 min read
Article
Druva Introduces the Data Resiliency Guarantee of up to $10 Million
The new program offers robust protection across all five data risk categories: cyber, human, application, operation, and environmental.
August 03, 2022
The new program offers robust protection across all five data risk categories: cyber, human, application, operation, and environmental.
August 03, 2022
6 min read
Article
Ransomware Hit on European Pipeline & Energy Supplier Encevo Linked to BlackCat
Customers across several European countries are urged to update credentials in the wake of the attack that affected a gas-pipeline operator and power company.
August 01, 2022
Customers across several European countries are urged to update credentials in the wake of the attack that affected a gas-pipeline operator and power company.
by Dark Reading Staff, Dark Reading
August 01, 2022
2 min read
Article
Malicious npm Packages Scarf Up Discord Tokens, Credit Card Info
The campaign uses four malicious packages to spread "Volt Stealer" and "Lofy Stealer" malware in the open source npm software package repository.
July 29, 2022
The campaign uses four malicious packages to spread "Volt Stealer" and "Lofy Stealer" malware in the open source npm software package repository.
by Nathan Eddy, Contributing Writer, Dark Reading
July 29, 2022
5 min read
Article