informa
/

Vulnerabilities/Threats

Cloudflare Ventures into Simplifying Email Security
The company adds complex email security technologies — including the alphabet soup of SPF, DKIM, and DMARC — as part of ...
September 27, 2021
The company adds complex email security technologies — including the alphabet soup of SPF, DKIM, and DMARC — as part of ...
by Robert Lemos, Contributing Writer
September 27, 2021
5 min read
Article
How to Get Started With Zero Trust in a SaaS Environment
Given current business conditions and the prevalence of SaaS technologies, now is the time to take steps toward zero tru...
September 27, 2021
Given current business conditions and the prevalence of SaaS technologies, now is the time to take steps toward zero tru...
by Lenny Zeltser, Chief Information Security Officer at Axonius
September 27, 2021
5 min read
Article
Our Eye Is on the SPARROW
How unauthorized users can exploit wireless infrastructures for covert communication.
September 24, 2021
How unauthorized users can exploit wireless infrastructures for covert communication.
by Reza Soosahabi, Senior R&D Engineer, Keysight Technologies
September 24, 2021
5 min read
Article
Endpoint Still a Prime Target for Attack
A vast majority of security professionals surveyed think any exploit will start with the endpoint.
September 24, 2021
A vast majority of security professionals surveyed think any exploit will start with the endpoint.
by Dark Reading Staff, Dark Reading
September 24, 2021
2 min read
Article
Google Spots New Technique to Sneak Malware Past Detection Tools
The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools.
September 23, 2021
The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools.
by Jai Vijayan, Contributing Writer
September 23, 2021
3 min read
Article
FamousSparrow APT Group Flocks to Hotels, Governments, Businesses
The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit.
September 23, 2021
The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit.
by Kelly Sheridan, Senior Editor
September 23, 2021
3 min read
Article
Apple Patches Zero-Days in iOS, Known Vuln in macOS
One of the iOS vulnerabilities was discovered by Citizen Lab; the Google Threat Analysis Group reported iOS and macOS fl...
September 23, 2021
One of the iOS vulnerabilities was discovered by Citizen Lab; the Google Threat Analysis Group reported iOS and macOS fl...
by Dark Reading Staff, Dark Reading
September 23, 2021
1 min read
Article
Microsoft Exchange Autodiscover Flaw Leaks Thousands of Credentials
Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol...
September 23, 2021
Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol...
by Dark Reading Staff, Dark Reading
September 23, 2021
2 min read
Article
How to Implement a Security Champions Program
A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top ...
September 23, 2021
A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top ...
by Simon Maple, Field CTO at Snyk
September 23, 2021
5 min read
Article
NIST Brings Threat Modeling into the Spotlight
NIST recommendations typically become part of government procurement, which means threat modeling will soon be written i...
September 23, 2021
NIST recommendations typically become part of government procurement, which means threat modeling will soon be written i...
by Adam Shostack, Leading expert in threat modeling
September 23, 2021
5 min read
Article
6 Lessons From Major Data Breaches This Year
Though many incidents stemmed from familiar security failures, they served up — or resurfaced — some important takeaways...
September 22, 2021
Though many incidents stemmed from familiar security failures, they served up — or resurfaced — some important takeaways...
by Jai Vijayan, Contributing Writer
September 22, 2021
1 min read
Slideshow
Who Is BlackMatter?
Researchers piece together the origins of the group that made headlines this week as the perpetrator behind a ransomware...
September 22, 2021
Researchers piece together the origins of the group that made headlines this week as the perpetrator behind a ransomware...
by Kelly Sheridan, Senior Editor
September 22, 2021
4 min read
Article
UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlig...
September 22, 2021
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlig...
by Maxine Holt, Research Director, Omdia
September 22, 2021
3 min read
Article
Strained Relationships Hinder DevSecOps Innovation
A new survey from Forrester and VMware finds more than half of developers still think security gets in the way.
September 22, 2021
A new survey from Forrester and VMware finds more than half of developers still think security gets in the way.
by Dark Reading Staff, Dark Reading
September 22, 2021
2 min read
Article
CISA, FBI, NSA Warn of Increase in Conti Ransomware Attacks
A new alert provides the technical details of ongoing attacks and guidance for organizations to secure systems against C...
September 22, 2021
A new alert provides the technical details of ongoing attacks and guidance for organizations to secure systems against C...
by Dark Reading Staff, Dark Reading
September 22, 2021
2 min read
Article