informa
/

Vulnerabilities/Threats

New Report Examines Top Threats Discussed at Black Hat USA
Supply chain security and vulnerabilities in enterprise software were among the threats most dicussed at this year's sho...
September 17, 2021
Supply chain security and vulnerabilities in enterprise software were among the threats most dicussed at this year's sho...
by Dark Reading Staff, Dark Reading
September 17, 2021
2 min read
Article
Infrastructure, Security, and the Need for Visibility
Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-gene...
September 17, 2021
Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-gene...
by Joe Slowik, Senior Manager at Gigamon
September 17, 2021
5 min read
Article
Microsoft Warns of Uptick in MSHTML Attacks
Attackers leveraging the flaw are using infrastructure associated with other criminal groups, including ransomware-as-a-...
September 16, 2021
Attackers leveraging the flaw are using infrastructure associated with other criminal groups, including ransomware-as-a-...
by Jai Vijayan, Contributing Writer
September 16, 2021
4 min read
Article
HPE Survey Finds 76% of Doctors and Nurses Believe Telehealth Will Dominate Patient Care in Near Future
Findings are presented in HPE's "Future of Healthcare" Report, which surveyed healthcare clinicians and IT Decision Make...
September 16, 2021
Findings are presented in HPE's "Future of Healthcare" Report, which surveyed healthcare clinicians and IT Decision Make...
September 16, 2021
8 min read
Article
FBI, CISA, CGCYBER Warn of APTs Targeting CVE-2021-40539
The critical authentication bypass vulnerability exists in Zoho ManageEngine ADSelfService Plus, officials report.
September 16, 2021
The critical authentication bypass vulnerability exists in Zoho ManageEngine ADSelfService Plus, officials report.
by Dark Reading Staff, Dark Reading
September 16, 2021
2 min read
Article
Under Pressure: COVID-19 Forced Many Execs to Sideline Cybersecurity
CISOs are more stressed, and the fallout is increased cyber-risk. Also, budget restrictions lead to a yawning chasm betw...
September 16, 2021
CISOs are more stressed, and the fallout is increased cyber-risk. Also, budget restrictions lead to a yawning chasm betw...
by Marc Wilczek, Digital Strategist & COO of Link11
September 16, 2021
5 min read
Article
How Attackers Invest in Cloud-Focused Cybercrime
A new study reveals an active underground market for access credentials to tens of thousands of cloud accounts and resou...
September 15, 2021
A new study reveals an active underground market for access credentials to tens of thousands of cloud accounts and resou...
by Jai Vijayan, Contributing Writer
September 15, 2021
4 min read
Article
OWASP Reshuffles Its Top 10 List, Adds New Categories
The Open Web Application Security Project reshuffles its list of top threats, putting broken access controls and cryptog...
September 15, 2021
The Open Web Application Security Project reshuffles its list of top threats, putting broken access controls and cryptog...
by Robert Lemos, Contributing Writer
September 15, 2021
5 min read
Article
OMIGOD: Azure Users Warned of Critical OMI Vulnerabilities
Security researchers share the details of four flaws in Open Management Infrastructure, which is deployed on a large num...
September 15, 2021
Security researchers share the details of four flaws in Open Management Infrastructure, which is deployed on a large num...
by Kelly Sheridan, Senior Editor
September 15, 2021
4 min read
Article
ExpressVPN Acquired By Kape Technologies for $936 Million
Privacy firm Kape says deal will double customer base and broaden reach into consumer VPN market
September 15, 2021
Privacy firm Kape says deal will double customer base and broaden reach into consumer VPN market
by Dark Reading Staff, Dark Reading
September 15, 2021
1 min read
Article
How Your Printer Is Like Swiss Cheese
Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.
September 15, 2021
Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.
by Chris Rouland, Co-Founder and Chief Executive Officer at Phosphorus Cybersecurity
September 15, 2021
5 min read
Article
Purchasing Managed Security Services: Strategies for Client References
There's a scarcity of customers using managed security services who are willing to talk to others about their experience...
September 15, 2021
There's a scarcity of customers using managed security services who are willing to talk to others about their experience...
by Bob Blakley, Senior Director, Global Security Services
September 15, 2021
5 min read
Article
Microsoft Patches MSHTML Vuln Among 66 CVEs
This month's Patch Tuesday release addresses a remote code execution bug under active attack and a publicly known flaw i...
September 14, 2021
This month's Patch Tuesday release addresses a remote code execution bug under active attack and a publicly known flaw i...
by Kelly Sheridan, Senior Editor
September 14, 2021
4 min read
Article
Ransomware Operators Ramp Up Pressure on Victims via Multiple Extortion Attacks
Though overall ransomware attack volumes dipped in the first half of this year, the number of campaigns involving three ...
September 14, 2021
Though overall ransomware attack volumes dipped in the first half of this year, the number of campaigns involving three ...
by Jai Vijayan, Contributing Writer
September 14, 2021
4 min read
Article
Name That Toon: Congrats! It's a ...
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
September 14, 2021
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
September 14, 2021
1 min read
Article