The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Event
The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them | Jan 24 Webinar | <REGISTER NOW>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Vulnerabilities/Threats
Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools & technologies.
Critical RCE Lexmark Printer Bug Has Public Exploit
A nasty SSRF bug in Web Services plagues a laundry list of enterprise printers.
January 27, 2023
A nasty SSRF bug in Web Services plagues a laundry list of enterprise printers.
by Dark Reading Staff, Dark Reading
January 27, 2023
1 MIN READ
Article
Google: Influence Operator Dragonbridge Floods Social Media in Sprawling Cyber Campaign
Google has mounted a massive takedown, but Dragonbridge's extensive capabilities for generating and distributing vast amounts of largely spammy content calls into question the motivation behind the group.
January 27, 2023
Google has mounted a massive takedown, but Dragonbridge's extensive capabilities for generating and distributing vast amounts of largely spammy content calls into question the motivation behind the group.
by Nathan Eddy, Contributing Writer, Dark Reading
January 27, 2023
5 MIN READ
Article
How Noob Website Hackers Can Become Persistent Threats
An academic analysis of website defacement behavior by 241 new hackers shows there are four clear trajectories they can take in future, researchers say.
January 27, 2023
An academic analysis of website defacement behavior by 241 new hackers shows there are four clear trajectories they can take in future, researchers say.
by Jai Vijayan, Contributing Writer, Dark Reading
January 27, 2023
4 MIN READ
Article
3 Ways ChatGPT Will Change Infosec in 2023
OpenAI's chatbot has the promise to revolutionize how security practitioners work.
January 27, 2023
OpenAI's chatbot has the promise to revolutionize how security practitioners work.
by Matt Georgy, Chief Technology Officer, Redacted
January 27, 2023
5 MIN READ
Article
Riot Games Latest Video-Game Maker to Suffer Breach
Highlighting continued attacks on game developers, attackers stole source code from and issued a ransom demand to the maker of League of Legends.
January 26, 2023
Highlighting continued attacks on game developers, attackers stole source code from and issued a ransom demand to the maker of League of Legends.
by Robert Lemos, Contributing Writer, Dark Reading
January 26, 2023
4 MIN READ
Article
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Hackers don't need a key to get past your defenses if they can essentially teleport using RMMs, warns CISA and the NSA.
January 26, 2023
Hackers don't need a key to get past your defenses if they can essentially teleport using RMMs, warns CISA and the NSA.
by Nate Nelson, Contributing Writer, Dark Reading
January 26, 2023
4 MIN READ
Article
Hive Ransomware Gang Loses Its Honeycomb, Thanks to DoJ
The US Department of Justice hacked into Hive's infrastructure, made off with hundreds of decryptors, and seized the gang's operations.
January 26, 2023
The US Department of Justice hacked into Hive's infrastructure, made off with hundreds of decryptors, and seized the gang's operations.
by Tara Seals, Managing Editor, News, Dark Reading
January 26, 2023
3 MIN READ
Article
Healthcare Remains Top Target in 2022 ITRC Breach Report
January 25, 2023
January 25, 2023
2 MIN READ
Article
Researchers Pioneer PoC Exploit for NSA-Reported Bug in Windows CryptoAPI
The security vulnerability allows attackers to spoof a target certificate and masquerade as any website, among other things.
January 25, 2023
The security vulnerability allows attackers to spoof a target certificate and masquerade as any website, among other things.
by Jai Vijayan, Contributing Writer, Dark Reading
January 25, 2023
4 MIN READ
Article
Log4j Vulnerabilities Are Here to Stay — Are You Prepared?
Don't make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the vulnerability is on a potential attack path to a critical asset.
January 25, 2023
Don't make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the vulnerability is on a potential attack path to a critical asset.
by Zur Ulianitzky, Head of Security Research, XM Cyber
January 25, 2023
5 MIN READ
Article
North Korea's Top APT Swindled $1B From Crypto Investors in 2022
The DPRK has turned crypto scams into big business to replenish its depleted state coffers.
January 25, 2023
The DPRK has turned crypto scams into big business to replenish its depleted state coffers.
by Nate Nelson, Contributing Writer, Dark Reading
January 25, 2023
3 MIN READ
Article
Chat Cybersecurity: AI Promises a Lot, but Can It Deliver?
Machine learning offers great opportunities, but it still can't replace human experts.
January 24, 2023
Machine learning offers great opportunities, but it still can't replace human experts.
by Dane Sherrets, Senior Solutions Architect, HackerOne
January 24, 2023
4 MIN READ
Article
'DragonSpark' Malware: East Asian Cyberattackers Create an OSS Frankenstein
Hackers cleverly cobbled together a suite of open source software — including a novel RAT — and hijacked servers owned by ordinary businesses.
January 24, 2023
Hackers cleverly cobbled together a suite of open source software — including a novel RAT — and hijacked servers owned by ordinary businesses.
by Nate Nelson, Contributing Writer, Dark Reading
January 24, 2023
4 MIN READ
Article
Microsoft to Block Excel Add-ins to Stop Office Exploits
The company will block the configuration files, which interact with Web applications — since threat actors increasingly use the capability to install malicious code.
January 24, 2023
The company will block the configuration files, which interact with Web applications — since threat actors increasingly use the capability to install malicious code.
by Robert Lemos, Contributing Writer, Dark Reading
January 24, 2023
3 MIN READ
Article
Security and the Electric Vehicle Charging Infrastructure
When EVs and smart chargers plug in to critical infrastructure, what can go wrong? Plenty.
January 24, 2023
When EVs and smart chargers plug in to critical infrastructure, what can go wrong? Plenty.
by Shachar Inbar, VP, Head of Business Operations and Information Security, Driivz
January 24, 2023
5 MIN READ
Article