informa
/

Vulnerabilities/Threats

Google Spots New Technique to Sneak Malware Past Detection Tools
The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools.
September 23, 2021
The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools.
by Jai Vijayan, Contributing Writer
September 23, 2021
3 min read
Article
FamousSparrow APT Group Flocks to Hotels, Governments, Businesses
The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit.
September 23, 2021
The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit.
by Kelly Sheridan, Senior Editor
September 23, 2021
3 min read
Article
Apple Patches Zero-Days in iOS, Known Vuln in macOS
One of the iOS vulnerabilities was discovered by Citizen Lab; the Google Threat Analysis Group reported iOS and macOS fl...
September 23, 2021
One of the iOS vulnerabilities was discovered by Citizen Lab; the Google Threat Analysis Group reported iOS and macOS fl...
by Dark Reading Staff, Dark Reading
September 23, 2021
1 min read
Article
Microsoft Exchange Autodiscover Flaw Leaks Thousands of Credentials
Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol...
September 23, 2021
Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol...
by Dark Reading Staff, Dark Reading
September 23, 2021
2 min read
Article
How to Implement a Security Champions Program
A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top ...
September 23, 2021
A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top ...
by Simon Maple, Field CTO at Snyk
September 23, 2021
5 min read
Article
NIST Brings Threat Modeling into the Spotlight
NIST recommendations typically become part of government procurement, which means threat modeling will soon be written i...
September 23, 2021
NIST recommendations typically become part of government procurement, which means threat modeling will soon be written i...
by Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer
September 23, 2021
5 min read
Article
6 Lessons From Major Data Breaches This Year
Though many incidents stemmed from familiar security failures, they served up — or resurfaced — some important takeaways...
September 22, 2021
Though many incidents stemmed from familiar security failures, they served up — or resurfaced — some important takeaways...
by Jai Vijayan, Contributing Writer
September 22, 2021
1 min read
Slideshow
Who Is BlackMatter?
Researchers piece together the origins of the group that made headlines this week as the perpetrator behind a ransomware...
September 22, 2021
Researchers piece together the origins of the group that made headlines this week as the perpetrator behind a ransomware...
by Kelly Sheridan, Senior Editor
September 22, 2021
4 min read
Article
UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlig...
September 22, 2021
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlig...
by Maxine Holt, Research Director, Omdia
September 22, 2021
3 min read
Article
Strained Relationships Hinder DevSecOps Innovation
A new survey from Forrester and VMware finds more than half of developers still think security gets in the way.
September 22, 2021
A new survey from Forrester and VMware finds more than half of developers still think security gets in the way.
by Dark Reading Staff, Dark Reading
September 22, 2021
2 min read
Article
CISA, FBI, NSA Warn of Increase in Conti Ransomware Attacks
A new alert provides the technical details of ongoing attacks and guidance for organizations to secure systems against C...
September 22, 2021
A new alert provides the technical details of ongoing attacks and guidance for organizations to secure systems against C...
by Dark Reading Staff, Dark Reading
September 22, 2021
2 min read
Article
Midmarket Security: Think You’re Safe? Think Again
Gone is the false perception that large enterprises, banks, and financial institutions are the only organizations under ...
September 22, 2021
Gone is the false perception that large enterprises, banks, and financial institutions are the only organizations under ...
by Tim Liu, Co-founder and CTO at Hillstone Networks
September 22, 2021
5 min read
Article
Why Security Pros Should Rethink Their Focus on Information Resilience
Resilience is often defined as being able to withstand disruptions and rebound to a previous state. But a system's abili...
September 22, 2021
Resilience is often defined as being able to withstand disruptions and rebound to a previous state. But a system's abili...
by Sounil Yu, CISO and Head of Research of JupiterOne
September 22, 2021
5 min read
Article
New Cooperative's Ransomware Attack Underscores Threat to Food & Agriculture
The Iowa grain cooperative took its systems offline in response to a security incident earlier this week.
September 21, 2021
The Iowa grain cooperative took its systems offline in response to a security incident earlier this week.
by Kelly Sheridan, Senior Editor
September 21, 2021
6 min read
Article
CTO 2.0: Maiffret Rejoins BeyondTrust
Hacker-turned-entrepreneur Marc Maiffret reflects on his past few years "embedded" with enterprise security teams and ho...
September 21, 2021
Hacker-turned-entrepreneur Marc Maiffret reflects on his past few years "embedded" with enterprise security teams and ho...
by Kelly Jackson Higgins, Executive Editor
September 21, 2021
3 min read
Article