informa
/

Vulnerabilities/Threats

TikTok Partnership to Help First US Cyber Team Compete on the World Stage
TikTok joins as founding sponsor of the inaugural US Cyber Games and US Cyber Team led by Katzcy.
August 02, 2021
TikTok joins as founding sponsor of the inaugural US Cyber Games and US Cyber Team led by Katzcy.
August 02, 2021
6 min read
Article
Microsoft Warns of 'Crafty' Phishing Campaign
The active campaign uses legitimate-looking original sender addresses and spoofed display sender addresses, along with o...
August 02, 2021
The active campaign uses legitimate-looking original sender addresses and spoofed display sender addresses, along with o...
by Dark Reading Staff, Dark Reading
August 02, 2021
2 min read
Article
New Normal Demands New Security Leadership Structure
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security stra...
August 02, 2021
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security stra...
by Kelly Sheridan, Senior Editor
August 02, 2021
3 min read
Article
Defenders Face New Challenges As Attack Complexity Grows
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
August 02, 2021
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
by Dark Reading Staff, Dark Reading
August 02, 2021
1 min read
Article
Nozomi Networks Secures $100M Investment from Global Ecosystem of Customers and Technology Partners
Pre-IPO round led by growth investor Triangle Peak Partners; Includes investments from commercial partners Honeywell Ven...
August 02, 2021
Pre-IPO round led by growth investor Triangle Peak Partners; Includes investments from commercial partners Honeywell Ven...
August 02, 2021
6 min read
Article
Build a Continuous Education Program for Better Cybersecurity
Addictive learning works because it keeps students interested and challenged at all times.
August 02, 2021
Addictive learning works because it keeps students interested and challenged at all times.
by Margus Ernits, CTO of RangeForce
August 02, 2021
5 min read
Article
5 Easy-to-Fix Vulnerabilities Threatening Your SMB
Small-business owners can no longer rely on their size to avoid cyberattacks, as no business bank account is too small i...
August 02, 2021
Small-business owners can no longer rely on their size to avoid cyberattacks, as no business bank account is too small i...
Alexander Ivanyuk, Global Director, Product and Technology Positioning, at Acronis
August 02, 2021
5 min read
Article
Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
'PwnedPiper' flaws could allow attackers to disrupt delivery of lab samples, or steal hospital employee credentials, new...
August 02, 2021
'PwnedPiper' flaws could allow attackers to disrupt delivery of lab samples, or steal hospital employee credentials, new...
by Kelly Jackson Higgins, Executive Editor
August 02, 2021
6 min read
Article
Reports Point to Uptick in HTML Smuggling Attacks
Menlo Security and Microsoft report recent campaigns implementing the technique, which helps attackers stealthily delive...
July 30, 2021
Menlo Security and Microsoft report recent campaigns implementing the technique, which helps attackers stealthily delive...
by Kelly Sheridan, Senior Editor
July 30, 2021
5 min read
Article
What's Essential in an Incident Response Plan? Security Leaders Weigh In
A new report examines the must-have components of a security incident readiness and response playbook.
July 30, 2021
A new report examines the must-have components of a security incident readiness and response playbook.
by Dark Reading Staff, Dark Reading
July 30, 2021
1 min read
Article
Identity Breach Report Finds New COVID-19 Cyber Vulnerabilities
Report examines new trends in the deep and dark web, how threat actors are exploiting the global COVID-19 crisis, and ri...
July 30, 2021
Report examines new trends in the deep and dark web, how threat actors are exploiting the global COVID-19 crisis, and ri...
July 30, 2021
4 min read
Article
CISA Launches New Vulnerability Disclosure Policy Platform
The VDP platform provides a single website where agencies can intake, triage, and route the vulnerabilities that researc...
July 30, 2021
The VDP platform provides a single website where agencies can intake, triage, and route the vulnerabilities that researc...
by Dark Reading Staff, Dark Reading
July 30, 2021
2 min read
Article
Next for Bug Bounties: More Open Source Funding
Ten years after kicking off its Vulnerability Rewards Program, Google sees another decade of bounties with a focus on sh...
July 30, 2021
Ten years after kicking off its Vulnerability Rewards Program, Google sees another decade of bounties with a focus on sh...
by Robert Lemos, Contributing Writer
July 30, 2021
5 min read
Article
Inside the Famed Black Hat NOC
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
July 30, 2021
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
by Kelly Jackson Higgins, Executive Editor
July 30, 2021
6 min read
Article
Chinese-Speaking Threat Actor Using Unknown Rootkit in Targeted Attacks
Security vendor says it first spotted 'GhostEmperor' when investigating attacks targeting Microsoft Exchange flaws.
July 29, 2021
Security vendor says it first spotted 'GhostEmperor' when investigating attacks targeting Microsoft Exchange flaws.
by Jai Vijayan, Contributing Writer
July 29, 2021
4 min read
Article