The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Vendors as Your Largest BEC Threat
Jun 22, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Vendors as Your Largest BEC Threat
Jun 22, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Vendors as Your Largest BEC Threat
Jun 22, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
The Value Drivers of Attack Surface Management, Revealed | May 26 Webinar | <REGISTER NOW>
Event
Implementing and Using XDR to Improve Enterprise Cybersecurity | May 25 Webinar | <REGISTER NOW>
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Threat Intelligence
1 min read
video
The Benefits of Exploiting Attackers' Favorite Tools
Symantec senior threat researcher Waylon Grange explains that attackers write vulnerable code, too.
Dark Reading Staff
Dark Reading
August 22, 2017
PDF
Vulnerabilities/Threats
Attacks/Breaches
Black Hat
Application Security
Vulnerability Management
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
Subscribe
More Insights
White Papers
Five Best Practices for AWS Security Monitoring
Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal
More White Papers
Webinars
Using Threat Modeling to Improve Enterprise Cyber Defenses
Vendors as Your Largest BEC Threat
More Webinars
Reports
Incorporating a Prevention Mindset into Threat Detection and Response
Practical Network Security Approaches for a Multicloud, Hybrid IT World
More Reports
Editors' Choice
How to Turn a Coke Can Into an Eavesdropping Device
Robert Lemos, Contributing Writer, Dark Reading
iPhones Open to Attack Even When Off, Researchers Say
Dark Reading Staff, Dark Reading
Mastering the New CISO Playbook
Chaim Mazal, Senior VP of Technology and CISO, Kandji
What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers
Tara Seals, Managing Editor, News, Dark Reading
Webinars
Using Threat Modeling to Improve Enterprise Cyber Defenses
Vendors as Your Largest BEC Threat
The Value Drivers of Attack Surface Management, Revealed
Implementing and Using XDR to Improve Enterprise Cybersecurity
Implementing Zero Trust in Your Enterprise
More Webinars
White Papers
Five Best Practices for AWS Security Monitoring
Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal
The Top 10 API Vulnerabilities
BotGuard Supplements CDN and WAF Case Study
Optimizing Endpoint Protection
More White Papers
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Black Hat Spring Trainings - June 13-16 - Learn More
More Events
More Insights
White Papers
Five Best Practices for AWS Security Monitoring
Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal
More White Papers
Webinars
Using Threat Modeling to Improve Enterprise Cyber Defenses
Vendors as Your Largest BEC Threat
More Webinars
Reports
Incorporating a Prevention Mindset into Threat Detection and Response
Practical Network Security Approaches for a Multicloud, Hybrid IT World
More Reports