The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Deciphering the Hype Around XDR
Feb 16, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Deciphering the Hype Around XDR
Feb 16, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Deciphering the Hype Around XDR
Feb 16, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Risk
Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.
Patching & Passwords Lead the Problem Pack for Cyber-Teams
Despite growing awareness, organizations remain plagued with unpatched vulnerabilities and weaknesses in credential policies.
February 06, 2023
Despite growing awareness, organizations remain plagued with unpatched vulnerabilities and weaknesses in credential policies.
by Nathan Eddy, Contributing Writer, Dark Reading
February 06, 2023
3 MIN READ
Article
What CISOs Can Do About Brand Impersonation Scam Sites
Apply these nine tips to proactively fight fraudulent websites that use your brand to rip people off.
February 03, 2023
Apply these nine tips to proactively fight fraudulent websites that use your brand to rip people off.
by Ericka Chickowski, Contributing Writer, Dark Reading
February 03, 2023
8 MIN READ
Article
Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally
The Russia-linked LockBit ransomware group claims to be behind the attack that fouled automated transactions for dozens of clients of financial technology firm ION Group.
February 02, 2023
The Russia-linked LockBit ransomware group claims to be behind the attack that fouled automated transactions for dozens of clients of financial technology firm ION Group.
by Robert Lemos, Contributing Writer, Dark Reading
February 02, 2023
4 MIN READ
Article
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale Cyberattacks
The group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low risk, high reward, quick, easy, and low effort.
February 02, 2023
The group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low risk, high reward, quick, easy, and low effort.
by Nate Nelson, Contributing Writer, Dark Reading
February 02, 2023
5 MIN READ
Article
Patch Critical Bug Now: QNAP NAS Devices Ripe for the Slaughter
QNAP NAS devices are vulnerable to CVE-2022-27596, which allows unauthenticated, remote SQL code injection.
February 02, 2023
QNAP NAS devices are vulnerable to CVE-2022-27596, which allows unauthenticated, remote SQL code injection.
by Dark Reading Staff, Dark Reading
February 02, 2023
1 MIN READ
Article
Nearly All Firms Have Ties With Breached Third Parties
The average organization does business with 11 third parties, and 98% of organizations do business with a third party who has suffered a breach, an analysis finds.
February 01, 2023
The average organization does business with 11 third parties, and 98% of organizations do business with a third party who has suffered a breach, an analysis finds.
by Robert Lemos, Contributing Writer, Dark Reading
February 01, 2023
4 MIN READ
Article
Radiant Logic Signs Definitive Agreement to Acquire Brainwave GRC
Move will strengthen position as a leader in the identity governance and analytics market.
February 01, 2023
Move will strengthen position as a leader in the identity governance and analytics market.
February 01, 2023
4 MIN READ
Article
Critical VMware RCE Vulnerabilities Targeted by Public Exploit Code
Security vulnerabilities in VMware's vRealize Log Insight platform can be chained together to offer a cybercriminals a gaping hole to access corporate crown jewels.
January 31, 2023
Security vulnerabilities in VMware's vRealize Log Insight platform can be chained together to offer a cybercriminals a gaping hole to access corporate crown jewels.
by Tara Seals, Managing Editor, News, Dark Reading
January 31, 2023
4 MIN READ
Article
Cybercrime Ecosystem Spawns Lucrative Underground Gig Economy
The complex nature of cyberattacks has increased demand for software developers, reverse engineers, and offensive specialists — attracting workers facing financial insecurity.
January 30, 2023
The complex nature of cyberattacks has increased demand for software developers, reverse engineers, and offensive specialists — attracting workers facing financial insecurity.
by Robert Lemos, Contributing Writer, Dark Reading
January 30, 2023
4 MIN READ
Article
IT and Security Professionals Spend an Average of 4,300 Hours Annually Achieving or Maintaining Compliance
New research from Drata shows compliance remains a business challenge for many organizations.
January 30, 2023
New research from Drata shows compliance remains a business challenge for many organizations.
January 30, 2023
2 MIN READ
Article
Long Con Impersonates Financial Advisers to Target Victims
Cybercriminals are co-opting the identities of legitimate US financial advisers to use them as fodder for relationship scams (aka "pig butchering"), which end with the theft of investments.
January 30, 2023
Cybercriminals are co-opting the identities of legitimate US financial advisers to use them as fodder for relationship scams (aka "pig butchering"), which end with the theft of investments.
by Robert Lemos, Contributing Writer, Dark Reading
January 30, 2023
4 MIN READ
Article
Google: Influence Operator Dragonbridge Floods Social Media in Sprawling Cyber Campaign
Google has mounted a massive takedown, but Dragonbridge's extensive capabilities for generating and distributing vast amounts of largely spammy content calls into question the motivation behind the group.
January 27, 2023
Google has mounted a massive takedown, but Dragonbridge's extensive capabilities for generating and distributing vast amounts of largely spammy content calls into question the motivation behind the group.
by Nathan Eddy, Contributing Writer, Dark Reading
January 27, 2023
5 MIN READ
Article
NIST Risk Management Framework Aims to Improve Trustworthiness of Artificial Intelligence
New guidance seeks to cultivate trust in AI technologies and promote AI innovation while mitigating risk
January 26, 2023
New guidance seeks to cultivate trust in AI technologies and promote AI innovation while mitigating risk
January 26, 2023
4 MIN READ
Article
Zacks Investment Research Hack Exposes Data for 820K Customers
Zacks Elite sign-ups for the period 1999–2005 were accessed, including name, address, email address, phone number, and the password associated with Zacks.com.
January 25, 2023
Zacks Elite sign-ups for the period 1999–2005 were accessed, including name, address, email address, phone number, and the password associated with Zacks.com.
by Dark Reading Staff, Dark Reading
January 25, 2023
1 MIN READ
Article
Ticketmaster Blames Bots in Taylor Swift 'Eras' Tour Debacle
Ticketmaster testified in the Senate that a cyberattack was to blame for the high-profile Taylor Swift concert sales collapse, but some senators aren't so sure.
January 24, 2023
Ticketmaster testified in the Senate that a cyberattack was to blame for the high-profile Taylor Swift concert sales collapse, but some senators aren't so sure.
by Becky Bracken, Editor, Dark Reading
January 24, 2023
4 MIN READ
Article