The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Threat Intelligence
Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools & technologies.
Travel-Themed Phishing, BEC Campaigns Get Smarter as Summer Season Arrives
Phishing campaigns targeting travelers have evolved from simple, easy-to-spot fraud attempts to highly sophisticated operations.
May 26, 2023
Phishing campaigns targeting travelers have evolved from simple, easy-to-spot fraud attempts to highly sophisticated operations.
by Nathan Eddy, Contributing Writer, Dark Reading
May 26, 2023
4 MIN READ
Article
'Volt Typhoon' Breaks Fresh Ground for China-Backed Cyber Campaigns
This is the first incident where a threat actor from the country appears to be laying the groundwork for disruptive attacks in the future, researchers say.
May 25, 2023
This is the first incident where a threat actor from the country appears to be laying the groundwork for disruptive attacks in the future, researchers say.
by Jai Vijayan, Contributing Writer, Dark Reading
May 25, 2023
6 MIN READ
Article
CosmicEnergy Malware Emerges, Capable of Electric Grid Shutdown
Russian code that could tamper with industrial machines and toggle RTUs on and off was floating around VirusTotal for years before being noticed. It raises new questions about the state of OT security.
May 25, 2023
Russian code that could tamper with industrial machines and toggle RTUs on and off was floating around VirusTotal for years before being noticed. It raises new questions about the state of OT security.
by Nate Nelson, Contributing Writer, Dark Reading
May 25, 2023
4 MIN READ
Article
Lazarus Group Striking Vulnerable Windows IIS Web Servers
The infamous North Korean APT group is using Log4Shell, the 3CX supply chain attack, and other known vectors to breach Microsoft Web servers.
May 25, 2023
The infamous North Korean APT group is using Log4Shell, the 3CX supply chain attack, and other known vectors to breach Microsoft Web servers.
by Dark Reading Staff, Dark Reading
May 25, 2023
1 MIN READ
Article
'Operation Magalenha' Attacks Give a Window Into Brazil's Cybercrime Ecosystem
A campaign against customers of Portuguese banks uses a capable financial malware strain dubbed PeepingTitle, written in the Delphi programming language.
May 25, 2023
A campaign against customers of Portuguese banks uses a capable financial malware strain dubbed PeepingTitle, written in the Delphi programming language.
by Nate Nelson, Contributing Writer, Dark Reading
May 25, 2023
3 MIN READ
Article
'Volt Typhoon' China-Backed APT Infiltrates US Critical Infrastructure Orgs
According to Microsoft and researchers, the state-sponsored threat actor could very well be setting up a contingency plan for disruptive attacks on the US in the wake of an armed conflict in the South China Sea.
May 24, 2023
According to Microsoft and researchers, the state-sponsored threat actor could very well be setting up a contingency plan for disruptive attacks on the US in the wake of an armed conflict in the South China Sea.
by Tara Seals, Managing Editor, News, Dark Reading
May 24, 2023
3 MIN READ
Article
Google's .zip, .mov Domains Give Social Engineers a Shiny New Tool
Security professionals warn that Google's new top-level domains, .zip and .mov, pose social engineering risks while providing little reason for their existence.
May 24, 2023
Security professionals warn that Google's new top-level domains, .zip and .mov, pose social engineering risks while providing little reason for their existence.
by Robert Lemos, Contributing Writer, Dark Reading
May 24, 2023
5 MIN READ
Article
SuperMailer Abuse Bypasses Email Security for Super-Sized Credential Theft
Secure email gateways and end users alike are being fooled by a cyberattack campaign that's enjoying skyrocketing volumes against businesses in every industry, globally.
May 23, 2023
Secure email gateways and end users alike are being fooled by a cyberattack campaign that's enjoying skyrocketing volumes against businesses in every industry, globally.
by Tara Seals, Managing Editor, News, Dark Reading
May 23, 2023
5 MIN READ
Article
FBI: Human Trafficking Rings Force Job Seekers Into Cryptojacking Schemes
Victims of the cybercrime schemes are coerced to participate through violence and having their belongings taken away.
May 23, 2023
Victims of the cybercrime schemes are coerced to participate through violence and having their belongings taken away.
by Dark Reading Staff, Dark Reading
May 23, 2023
1 MIN READ
Article
Bridgestone CISO: Lessons From Ransomware Attack Include Acting, Not Thinking
A February 2022 attack knocked the giant tire maker's North American operations offline for several days.
May 23, 2023
A February 2022 attack knocked the giant tire maker's North American operations offline for several days.
by Jai Vijayan, Contributing Writer, Dark Reading
May 23, 2023
4 MIN READ
Article
IBM's Polar Buy Creates Focus on a New 'Shadow Data' Cloud Security Area
The purchase gives IBM access to a new category of products called "data security posture management" for security data in cloud and SaaS repositories.
May 22, 2023
The purchase gives IBM access to a new category of products called "data security posture management" for security data in cloud and SaaS repositories.
by Jai Vijayan, Contributing Writer, Dark Reading
May 22, 2023
4 MIN READ
Article
3 Common Initial Attack Vectors Account for Most Ransomware Campaigns
The data shows how most cyberattacks start, so basic steps can help organizations avoid becoming the latest statistic.
May 19, 2023
The data shows how most cyberattacks start, so basic steps can help organizations avoid becoming the latest statistic.
by Robert Lemos, Contributing Writer, Dark Reading
May 19, 2023
4 MIN READ
Article
KeePass Vulnerability Imperils Master Passwords
A newly discovered bug in the open source password manager, if exploited, lets attackers retrieve a target's master password — and proof-of-concept code is available.
May 18, 2023
A newly discovered bug in the open source password manager, if exploited, lets attackers retrieve a target's master password — and proof-of-concept code is available.
by Jai Vijayan, Contributing Writer, Dark Reading
May 18, 2023
4 MIN READ
Article
Trojan-Rigged Phishing Attacks Pepper China-Taiwan Conflict
Plug X and other information-stealing remote-access Trojans are among the malware targeting networking, manufacturing, and logistics companies in Taiwan.
May 18, 2023
Plug X and other information-stealing remote-access Trojans are among the malware targeting networking, manufacturing, and logistics companies in Taiwan.
by Nate Nelson, Contributing Writer, Dark Reading
May 18, 2023
2 MIN READ
Article
10 Types of AI Attacks CISOs Should Track
Risk from artificial intelligence vectors presents a growing concern among security professionals in 2023.
May 18, 2023
Risk from artificial intelligence vectors presents a growing concern among security professionals in 2023.
by Ericka Chickowski, Contributing Writer, Dark Reading
May 18, 2023
7 MIN READ
Slideshow