informa
/

Threat Intelligence

Microsoft Warns of 'Crafty' Phishing Campaign
The active campaign uses legitimate-looking original sender addresses and spoofed display sender addresses, along with o...
August 02, 2021
The active campaign uses legitimate-looking original sender addresses and spoofed display sender addresses, along with o...
by Dark Reading Staff, Dark Reading
August 02, 2021
2 min read
Article
New Normal Demands New Security Leadership Structure
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security stra...
August 02, 2021
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security stra...
by Kelly Sheridan, Senior Editor
August 02, 2021
3 min read
Article
Defenders Face New Challenges As Attack Complexity Grows
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
August 02, 2021
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
by Dark Reading Staff, Dark Reading
August 02, 2021
1 min read
Article
Reports Point to Uptick in HTML Smuggling Attacks
Menlo Security and Microsoft report recent campaigns implementing the technique, which helps attackers stealthily delive...
July 30, 2021
Menlo Security and Microsoft report recent campaigns implementing the technique, which helps attackers stealthily delive...
by Kelly Sheridan, Senior Editor
July 30, 2021
5 min read
Article
CISA Launches New Vulnerability Disclosure Policy Platform
The VDP platform provides a single website where agencies can intake, triage, and route the vulnerabilities that researc...
July 30, 2021
The VDP platform provides a single website where agencies can intake, triage, and route the vulnerabilities that researc...
by Dark Reading Staff, Dark Reading
July 30, 2021
2 min read
Article
Inside the Famed Black Hat NOC
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
July 30, 2021
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
by Kelly Jackson Higgins, Executive Editor
July 30, 2021
6 min read
Article
Chinese-Speaking Threat Actor Using Unknown Rootkit in Targeted Attacks
Security vendor says it first spotted 'GhostEmperor' when investigating attacks targeting Microsoft Exchange flaws.
July 29, 2021
Security vendor says it first spotted 'GhostEmperor' when investigating attacks targeting Microsoft Exchange flaws.
by Jai Vijayan, Contributing Writer
July 29, 2021
4 min read
Article
Babuk Coding Errors Make Data Recovery 'Impossible'
The ransomware group's decryption tool is poorly designed and coded, leading the group to focus more on data theft rathe...
July 29, 2021
The ransomware group's decryption tool is poorly designed and coded, leading the group to focus more on data theft rathe...
by Dark Reading Staff, Dark Reading
July 29, 2021
2 min read
Article
US Government Unlikely to Ban Ransomware Payments
The Department of Justice believes that banning ransom payments will cause greater havoc. However, the agency has called...
July 29, 2021
The Department of Justice believes that banning ransom payments will cause greater havoc. However, the agency has called...
by Robert Lemos, Contributing Writer
July 29, 2021
4 min read
Article
Lower-Level Employees Become Top Spear-Phishing Targets
Cybercriminals seek employees who will be a "weak link" in the organization when designing phishing attacks, a new repor...
July 29, 2021
Cybercriminals seek employees who will be a "weak link" in the organization when designing phishing attacks, a new repor...
by Dark Reading Staff, Dark Reading
July 29, 2021
2 min read
Article
CISA, FBI Name the Most Exploited Vulnerabilities Over the Past Year
List shows many relatively new and perimeter-like devices targeted in 2020 and 2021, according to an analysis by CISA, t...
July 28, 2021
List shows many relatively new and perimeter-like devices targeted in 2020 and 2021, according to an analysis by CISA, t...
by Jai Vijayan, Contributing Writer
July 28, 2021
5 min read
Article
Data Breach Cost Hits Record High of $4.24M
The per-breach cost represents a 10% increase from the average cost per incident recorded one year prior, IBM reports.
July 28, 2021
The per-breach cost represents a 10% increase from the average cost per incident recorded one year prior, IBM reports.
by Kelly Sheridan, Senior Editor
July 28, 2021
5 min read
Article
UC San Diego Health Discloses Data Breach
The incident involved unauthorized access to some employee email accounts and may have affected personal data of employe...
July 28, 2021
The incident involved unauthorized access to some employee email accounts and may have affected personal data of employe...
by Dark Reading Staff, Dark Reading
July 28, 2021
2 min read
Article
8 Security Tools to be Unveiled at Black Hat USA
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, mal...
July 28, 2021
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, mal...
by Ericka Chickowski, Contributing Writer
July 28, 2021
1 min read
Slideshow
Google Debuts New Bug Hunting Platform
The new platform brings bug reporting for all Google targets into one place.
July 27, 2021
The new platform brings bug reporting for all Google targets into one place.
by Dark Reading Staff, Dark Reading
July 27, 2021
1 min read
Article