The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Building & Maintaining an Effective Remote Access Strategy | August 2 Webinar | <REGISTER NOW>
Event
Building & Maintaining Security at the Network Edge | July 28 Webinar | <REGISTER NOW>
Event
How Ransomware Works - And What You Can Do to Stop It | July 14 Webinar | <REGISTER NOW>
Previous
Next
Vulnerabilities/Threats
Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools & technologies.
China-Backed APT Pwns Building-Automation Systems with ProxyLogon
The previously unknown state-sponsored group is compromising industrial targets with the ShadowPad malware before burrowing deeper into networks.
June 28, 2022
The previously unknown state-sponsored group is compromising industrial targets with the ShadowPad malware before burrowing deeper into networks.
by Tara Seals, Managing Editor, News, Dark Reading
June 28, 2022
5 min read
Article
Atlassian Confluence Exploits Peak at 100K Daily
Swarms of breach attempts against the Atlassian Confluence vulnerability are likely to continue for years, researchers say, averaging 20,000 attempts daily as of this week.
June 28, 2022
Swarms of breach attempts against the Atlassian Confluence vulnerability are likely to continue for years, researchers say, averaging 20,000 attempts daily as of this week.
by Dark Reading Staff, Dark Reading
June 28, 2022
1 min read
Article
A WAF Is Not a Free Lunch: Teaching the Shift-Left Security Mindset
Developers need to think like WAF operators for security. Start with secure coding and think of Web application firewalls not as a prophylactic but as part of the secure coding test process.
June 28, 2022
Developers need to think like WAF operators for security. Start with secure coding and think of Web application firewalls not as a prophylactic but as part of the secure coding test process.
by Yaniv Sazman, Lead Product Manager, F5 NGINX and OSS Security, F5 Networks
June 28, 2022
5 min read
Article
Ransomware Volume Nearly Doubles 2021 Totals in a Single Quarter
Like a hydra, every time one ransomware gang drops out (REvil or Conti), plenty more step up to fill the void (Black Basta).
June 28, 2022
Like a hydra, every time one ransomware gang drops out (REvil or Conti), plenty more step up to fill the void (Black Basta).
by Ericka Chickowski, Contributing Writer, Dark Reading
June 28, 2022
4 min read
Article
How to Find New Attack Primitives in Microsoft Azure
Abuse primitives have a longer shelf life than bugs and zero-days and are cheaper to maintain. They're also much harder for defenders to detect and block.
June 28, 2022
Abuse primitives have a longer shelf life than bugs and zero-days and are cheaper to maintain. They're also much harder for defenders to detect and block.
by Andy Robbins, Technical Architect, SpecterOps
June 28, 2022
5 min read
Article
New Vulnerability Database Catalogs Cloud Security Issues
Researchers have created a new community website for reporting and tracking security issues in cloud platforms and services — plus fixes for them where available.
June 28, 2022
Researchers have created a new community website for reporting and tracking security issues in cloud platforms and services — plus fixes for them where available.
by Jai Vijayan, Contributing Writer, Dark Reading
June 28, 2022
4 min read
Article
LockBit 3.0 Debuts With Ransomware Bug Bounty Program
LockBit 3.0 promises to 'Make Ransomware Great Again!' with a side of cybercrime crowdsourcing.
June 27, 2022
LockBit 3.0 promises to 'Make Ransomware Great Again!' with a side of cybercrime crowdsourcing.
by Becky Bracken, Editor, Dark Reading
June 27, 2022
2 min read
Article
Shadow IT Spurs 1 in 3 Cyberattacks
Cerby platform emerges from stealth mode to let users automate security for applications outside of the standard IT purview.
June 27, 2022
Cerby platform emerges from stealth mode to let users automate security for applications outside of the standard IT purview.
by Dark Reading Staff, Dark Reading
June 27, 2022
1 min read
Article
It's a Race to Secure the Software Supply Chain — Have You Already Stumbled?
If you haven't properly addressed the issue, you're already behind. But even if you've had a false start, it's never too late to get back up.
June 27, 2022
If you haven't properly addressed the issue, you're already behind. But even if you've had a false start, it's never too late to get back up.
by Kayla Underkoffler, Senior Security Technologist, HackerOne
June 27, 2022
5 min read
Article
7 Steps to Stronger SaaS Security
Continuous monitoring is key to keeping up with software-as-a-service changes, but that's not all you'll need to get better visibility into your SaaS security.
June 24, 2022
Continuous monitoring is key to keeping up with software-as-a-service changes, but that's not all you'll need to get better visibility into your SaaS security.
by John Whelan, Senior Director of Product Management, AppOmni
June 24, 2022
4 min read
Article
Without Conti on the Scene, LockBit 2.0 Leads Ransomware Attacks
Analysts say an 18% drop in ransomware attacks seen in May is likely fleeting, as Conti actors regroup.
June 24, 2022
Analysts say an 18% drop in ransomware attacks seen in May is likely fleeting, as Conti actors regroup.
by Dark Reading Staff, Dark Reading
June 24, 2022
1 min read
Article
Chinese APT Group Likely Using Ransomware Attacks as Cover for IP Theft
Bronze Starlight’s use of multiple ransomware families and its victim-targeting suggest there’s more to the group’s activities than just financial gain, security vendor says.
June 23, 2022
Bronze Starlight’s use of multiple ransomware families and its victim-targeting suggest there’s more to the group’s activities than just financial gain, security vendor says.
by Jai Vijayan, Contributing Writer, Dark Reading
June 23, 2022
5 min read
Article
Pair of Brand-New Cybersecurity Bills Become Law
Bipartisan legislation allows cybersecurity experts to work across multiple agencies and provides federal support for local governments.
June 23, 2022
Bipartisan legislation allows cybersecurity experts to work across multiple agencies and provides federal support for local governments.
by Dark Reading Staff, Dark Reading
June 23, 2022
1 min read
Article
The Rise, Fall, and Rebirth of the Presumption of Compromise
The concept might make us sharp and realistic, but it's not enough on its own.
June 23, 2022
The concept might make us sharp and realistic, but it's not enough on its own.
by Oleg Brodt, R&D Director of Deutsche Telekom Innovation Labs, Israel, and Chief Innovation Officer for
[email protected]
University
June 23, 2022
4 min read
Article
How APTs Are Achieving Persistence Through IoT, OT, and Network Devices
To prevent these attacks, businesses must have complete visibility into, and access and management over, disparate devices.
June 23, 2022
To prevent these attacks, businesses must have complete visibility into, and access and management over, disparate devices.
by Brian Contos, Chief Security Officer, Phosphorus Cybersecurity,
June 23, 2022
5 min read
Article