informa
/

Vulnerabilities/Threats

4 Common Challenges of 'Shift Left' Security
Involving security in the earliest stages of software development helps prevent defects, but it's not without problems.
August 05, 2021
Involving security in the earliest stages of software development helps prevent defects, but it's not without problems.
by Tzury Bar Yochay, Co-founder and CTO of Reblaze and co-creator of Curiefense
August 05, 2021
3 min read
Article
Why Supply Chain Attacks Are Destined to Escalate
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for softwa...
August 05, 2021
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for softwa...
by Kelly Jackson Higgins, Executive Editor
August 05, 2021
4 min read
Article
Organizations Still Struggle to Hire & Retain Infosec Employees: Report
Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
August 04, 2021
Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
by Joan Goodchild, Senior Editor
August 04, 2021
3 min read
Article
NSA & CISA Publish Kubernetes Security Guidance
Kubernetes is frequently targeted for data theft, computational power theft, or denial of service, the agencies say in a...
August 04, 2021
Kubernetes is frequently targeted for data theft, computational power theft, or denial of service, the agencies say in a...
by Dark Reading Staff, Dark Reading
August 04, 2021
2 min read
Article
REvil Most Popular Ransomware Variant in 2021 (So Far)
An increase in global cyberattacks was driven by Web shell activity, targeted ransomware and extortion operations, and s...
August 04, 2021
An increase in global cyberattacks was driven by Web shell activity, targeted ransomware and extortion operations, and s...
by Dark Reading Staff, Dark Reading
August 04, 2021
2 min read
Article
Think Having Avoided Kaseya Means You're Safe? Guess Again
The lesson: Don't assume that everything coming from an apparently benign source is safe.
August 04, 2021
The lesson: Don't assume that everything coming from an apparently benign source is safe.
by Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll
August 04, 2021
5 min read
Article
5 Key Lessons From ICS Attacks Through the Ages
Industrial control systems attacks are happening with more frequency, but they are hardly new.
August 04, 2021
Industrial control systems attacks are happening with more frequency, but they are hardly new.
by Corey Nachreiner, Chief Security Officer, WatchGuard Technologies
August 04, 2021
5 min read
Article
Dark Reading Virtual News Desk Returns to Black Hat
Coming to you prerecorded from home offices around the world!
August 04, 2021
Coming to you prerecorded from home offices around the world!
by Dark Reading Staff, Dark Reading
August 04, 2021
9 min read
Article
New Raccoon Stealer Campaign Underscores an Evolving Threat
An information stealer disguised as pirated software targets cryptocurrencies and data while dropping malicious content ...
August 03, 2021
An information stealer disguised as pirated software targets cryptocurrencies and data while dropping malicious content ...
by Kelly Sheridan, Senior Editor
August 03, 2021
6 min read
Article
5 Questions Your Organization Must Ask to Prepare for a Ransomware Attack
Ransomware's evolving all the time, but here are some issues to address now to mitigate the impact of the next ransomwar...
August 03, 2021
Ransomware's evolving all the time, but here are some issues to address now to mitigate the impact of the next ransomwar...
by Yassir Abousselham, Chief Information Security Officer, Splunk
August 03, 2021
5 min read
Article
Average Cost to Buy Access to a Compromised Company: $1,000
The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to special...
August 03, 2021
The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to special...
by Robert Lemos, Contributing Writer
August 03, 2021
4 min read
Article
Get Ahead of the Hack: Why Cyber Insurance Is Not Enough
Cybersecurity insurance is a smart investment to protect against the effects of ransomware and other attacks, but it sho...
August 03, 2021
Cybersecurity insurance is a smart investment to protect against the effects of ransomware and other attacks, but it sho...
by Jay Prassl, CEO and Founder, Automox
August 03, 2021
5 min read
Article
TikTok Partnership to Help First US Cyber Team Compete on the World Stage
TikTok joins as founding sponsor of the inaugural US Cyber Games and US Cyber Team led by Katzcy.
August 02, 2021
TikTok joins as founding sponsor of the inaugural US Cyber Games and US Cyber Team led by Katzcy.
August 02, 2021
6 min read
Article
Microsoft Warns of 'Crafty' Phishing Campaign
The active campaign uses legitimate-looking original sender addresses and spoofed display sender addresses, along with o...
August 02, 2021
The active campaign uses legitimate-looking original sender addresses and spoofed display sender addresses, along with o...
by Dark Reading Staff, Dark Reading
August 02, 2021
2 min read
Article
New Normal Demands New Security Leadership Structure
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security stra...
August 02, 2021
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security stra...
by Kelly Sheridan, Senior Editor
August 02, 2021
3 min read
Article