The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Risk
Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.
DOS Attacks Dominate, but System Intrusions Cause Most Pain
In the latest Verizon "Data Breach Investigations Report," denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems.
June 09, 2023
In the latest Verizon "Data Breach Investigations Report," denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems.
by Robert Lemos, Contributing Writer, Dark Reading
June 09, 2023
4 MIN READ
Article
QuSecure Awarded US Army Contract for Post-Quantum Cybersecurity Solutions
United States Army with QuSecure advances toward a quantum-resilient future protecting the country from today and tomorrow's cybersecurity threats.
June 08, 2023
United States Army with QuSecure advances toward a quantum-resilient future protecting the country from today and tomorrow's cybersecurity threats.
June 08, 2023
3 MIN READ
Article
Cl0p Cybercrime Gang Delivers Ultimatum After Payroll Breach
Experts and researchers warn individuals and organizations that the cybercrime group is not to be trusted in their demands.
June 07, 2023
Experts and researchers warn individuals and organizations that the cybercrime group is not to be trusted in their demands.
by Dark Reading Staff, Dark Reading
June 07, 2023
1 MIN READ
Article
Microsoft Fined $20M For Xbox Child Data Collection
The FTC has demanded additional data privacy protections for kids using Xbox gaming systems, extending COPPA protections.
June 07, 2023
The FTC has demanded additional data privacy protections for kids using Xbox gaming systems, extending COPPA protections.
by Dark Reading Staff, Dark Reading
June 07, 2023
1 MIN READ
Article
The Case for a Federal Cyber-Insurance Backstop
By stepping in to provide aid, the federal government could help protect companies, insurers, and the economy from the impact of a widespread, catastrophic cyberattack.
June 07, 2023
By stepping in to provide aid, the federal government could help protect companies, insurers, and the economy from the impact of a widespread, catastrophic cyberattack.
by Monica Shokrai, Head of Business Risk & Insurance, Google Cloud
June 07, 2023
4 MIN READ
Article
Verizon DBIR: Social Engineering Breaches Double, Leading to Spiraling Ransomware Costs
Ransomware continues its runaway growth with median payments reaching $50,000 per incident.
June 06, 2023
Ransomware continues its runaway growth with median payments reaching $50,000 per incident.
by Tara Seals, Managing Editor, News, Dark Reading
June 06, 2023
7 MIN READ
Article
US Aerospace Contractor Hacked With 'PowerDrop' Backdoor
Hackers used a little to do a lot, cracking a high-value target with hardly more than the living-off-the-land tools (PowerShell especially) found on any standard Windows computer.
June 06, 2023
Hackers used a little to do a lot, cracking a high-value target with hardly more than the living-off-the-land tools (PowerShell especially) found on any standard Windows computer.
by Nate Nelson, Contributing Writer, Dark Reading
June 06, 2023
3 MIN READ
Article
ChatGPT Hallucinations Open Developers to Supply Chain Malware Attacks
Attackers could exploit a common AI experience — false recommendations — to spread malicious code via developers that use ChatGPT to create software.
June 06, 2023
Attackers could exploit a common AI experience — false recommendations — to spread malicious code via developers that use ChatGPT to create software.
by Elizabeth Montalbano, Contributor, Dark Reading
June 06, 2023
5 MIN READ
Article
Gigabyte Slams Backdoor Shut With Attack-Killing BIOS Update
A firmware update for hundreds of Gigabyte PC models gets rid of a backdoor capability that could be hijacked by cybercriminals, the company says.
June 05, 2023
A firmware update for hundreds of Gigabyte PC models gets rid of a backdoor capability that could be hijacked by cybercriminals, the company says.
by Dark Reading Staff, Dark Reading
June 05, 2023
1 MIN READ
Article
Streamers Ditch Netflix for Dark Web After Password Sharing Ban
Disgruntled users are pursuing offers for "full Netflix access" at steeply discounted rates.
June 02, 2023
Disgruntled users are pursuing offers for "full Netflix access" at steeply discounted rates.
by Nate Nelson, Contributing Writer, Dark Reading
June 02, 2023
2 MIN READ
Article
Tel Aviv Stock Exchange Selects CardinalOps to Reduce Risk of Breaches Due to Undetected Attacks
Enables financial services firm to operationalize MITRE ATT&CK with Splunk and eliminate detection coverage gaps based on organizational risk and priorities.
June 01, 2023
Enables financial services firm to operationalize MITRE ATT&CK with Splunk and eliminate detection coverage gaps based on organizational risk and priorities.
June 01, 2023
4 MIN READ
Article
Mirai Variant Opens Tenda, Zyxel Gear to RCE, DDoS
Researchers have observed several cyberattacks leveraging a botnet called IZ1H9, which exploits vulnerabilities in exposed devices and servers running on Linux.
May 31, 2023
Researchers have observed several cyberattacks leveraging a botnet called IZ1H9, which exploits vulnerabilities in exposed devices and servers running on Linux.
by Elizabeth Montalbano, Contributor, Dark Reading
May 31, 2023
4 MIN READ
Article
Salesforce 'Ghost Sites' Expose Sensitive Corporate Data
Some companies have moved on from using Salesforce. But without remembering to fully deactivate their clouds, Salesforce won't move on from them.
May 31, 2023
Some companies have moved on from using Salesforce. But without remembering to fully deactivate their clouds, Salesforce won't move on from them.
by Nate Nelson, Contributing Writer, Dark Reading
May 31, 2023
3 MIN READ
Article
'Volt Typhoon' Breaks Fresh Ground for China-Backed Cyber Campaigns
This is the first incident where a threat actor from the country appears to be laying the groundwork for disruptive attacks in the future, researchers say.
May 25, 2023
This is the first incident where a threat actor from the country appears to be laying the groundwork for disruptive attacks in the future, researchers say.
by Jai Vijayan, Contributing Writer, Dark Reading
May 25, 2023
6 MIN READ
Article
Bank of Ghana Opens SOC to Enable Threat Intelligence Sharing
Bank of Ghana's security operations center will boost visibility into threats and enable threat intelligence sharing, it says.
May 25, 2023
Bank of Ghana's security operations center will boost visibility into threats and enable threat intelligence sharing, it says.
by Dark Reading Staff, Dark Reading
May 25, 2023
1 MIN READ
Article