informa

Vulnerabilities/Threats

Over 1,000 Individuals Arrested in Global Cybercrime-Fighting Operation
HAECHI-II initiative represents Interpol's stepped-up efforts to tackle the operators of financially motivated online scams and other cyberattacks.
November 29, 2021
HAECHI-II initiative represents Interpol's stepped-up efforts to tackle the operators of financially motivated online scams and other cyberattacks.
by Jai Vijayan, Contributing Writer
November 29, 2021
3 min read
Article
Paving the Road to Zero Trust With Adaptive Authentication
A gradual transition to a world beyond passwords predisposes zero-trust projects to success.
November 29, 2021
A gradual transition to a world beyond passwords predisposes zero-trust projects to success.
by Eric Olden, CEO, Strata Identity
November 29, 2021
4 min read
Article
MediaTek Chip Flaw Could Have Let Attackers Spy on Android Phones
MediaTek systems-on-a-chip are embedded in more than one-third of smartphones and IoT devices around the world.
November 24, 2021
MediaTek systems-on-a-chip are embedded in more than one-third of smartphones and IoT devices around the world.
by Dark Reading Staff, Dark Reading
November 24, 2021
2 min read
Article
When Will Security Frameworks Catch Up With the New Cybersecurity Normal?
Standards need to reflect that most endpoints will be remote and/or wireless.
November 24, 2021
Standards need to reflect that most endpoints will be remote and/or wireless.
by Tony Howlett, CISO at UniSec Cybersecurity
November 24, 2021
5 min read
Article
New Android Spyware Variants Linked to Middle Eastern APT
The new variants, improved for stealth and persistence, share code with other malware samples attributed to the C-23 APT.
November 23, 2021
The new variants, improved for stealth and persistence, share code with other malware samples attributed to the C-23 APT.
by Dark Reading Staff, Dark Reading
November 23, 2021
2 min read
Article
Apple Sues NSO Group for Spyware Use
The company seeks to hold Israeli firm NSO Group liable for the targeting of Apple users and requests a permanent injunction to ban its use of Apple products and services.
November 23, 2021
The company seeks to hold Israeli firm NSO Group liable for the targeting of Apple users and requests a permanent injunction to ban its use of Apple products and services.
by Kelly Sheridan, Senior Editor
November 23, 2021
4 min read
Article
Holiday Scams Drive SMS Phishing Attacks
Attackers typically target consumers with malicious text messages containing obfuscated links, but experts say businesses are threatened as well.
November 23, 2021
Attackers typically target consumers with malicious text messages containing obfuscated links, but experts say businesses are threatened as well.
by Robert Lemos, Contributing Writer
November 23, 2021
4 min read
Article
How Sun Tzu's Wisdom Can Rewrite the Rules of Cybersecurity
The ancient Chinese military strategist Sun Tzu would agree: The best defense is to avoid an attack in the first place.
November 23, 2021
The ancient Chinese military strategist Sun Tzu would agree: The best defense is to avoid an attack in the first place.
by Gregory R. Simpson, Former CTO of GE and Former CTO of Synchrony Financial
November 23, 2021
4 min read
Article
Don't Help Cybercriminals Dash With Your Customers' Cash This Black Friday
Each security step, no matter how small, can have great impact in detecting and deterring cyber theft.
November 23, 2021
Each security step, no matter how small, can have great impact in detecting and deterring cyber theft.
by Ali Neil, Director of International Security Solutions, Verizon Business
November 23, 2021
5 min read
Article
GoDaddy Breach Exposes SSL Keys of Managed WordPress Hosting Customers
The incident, which affected 1.2 million users, raises concerns about domain impersonation attacks and other malicious activities.
November 22, 2021
The incident, which affected 1.2 million users, raises concerns about domain impersonation attacks and other malicious activities.
by Jai Vijayan, Contributing Writer
November 22, 2021
4 min read
Article
CISA Urges Critical Infrastructure to Be Alert for Holiday Threats
CISA and the FBI share steps organizations should take to better protect against security threats during holidays and weekends.
November 22, 2021
CISA and the FBI share steps organizations should take to better protect against security threats during holidays and weekends.
by Dark Reading Staff, Dark Reading
November 22, 2021
2 min read
Article
Is It OK to Take Your CEO Offline to Protect the Network?
Are you asking the right questions when developing your incident response playbook? What security tasks are you willing to automate?
November 22, 2021
Are you asking the right questions when developing your incident response playbook? What security tasks are you willing to automate?
by Ed Bellis, Co-Founder and CTO of Kenna Security, Cisco
November 22, 2021
4 min read
Article
Zero Trust: An Answer to the Ransomware Menace?
Zero trust isn't a silver bullet, but if implemented well it can help create a much more robust security defense.
November 19, 2021
Zero trust isn't a silver bullet, but if implemented well it can help create a much more robust security defense.
by Steve Durbin, CEO of the Information Security Forum
November 19, 2021
5 min read
Article
US Indicts Iranian Nationals for Cyber-Enabled Election Interference
Among other things, the pair pretended to be Proud Boys volunteers and sent in a fake video and emails to Republican lawmakers purporting to show Democratic Party attempts to subvert the 2020 presidential elections.
November 19, 2021
Among other things, the pair pretended to be Proud Boys volunteers and sent in a fake video and emails to Republican lawmakers purporting to show Democratic Party attempts to subvert the 2020 presidential elections.
by Jai Vijayan, Contributing Writer
November 19, 2021
4 min read
Article
Search CT Logs for Misconfigured SSL Certificates
Security defenders can run these queries against Certificate Transparency logs to identify misconfigured SSL certificates before they can be used by adversaries to map out attacks.
November 19, 2021
Security defenders can run these queries against Certificate Transparency logs to identify misconfigured SSL certificates before they can be used by adversaries to map out attacks.
by Dark Reading Staff, Dark Reading
November 19, 2021
3 min read
Article