The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Vulnerability Management
Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools & technologies.
Microsoft Links MOVEit Attack to Cl0p as British Airways, BBC Fall
Some billion-dollar organizations have already been identified as victims of the prolific ransomware group's latest exploit, amidst ongoing attacks.
June 05, 2023
Some billion-dollar organizations have already been identified as victims of the prolific ransomware group's latest exploit, amidst ongoing attacks.
by Nate Nelson, Contributing Writer, Dark Reading
June 05, 2023
4 MIN READ
Article
2.5M Impacted by Enzo Biochem Data Leak After Ransomware Attack
With the leak of information such as Social Security numbers, in addition to other protected information, 600,000 of the nearly 2.5 million affected are at risk for identity theft.
June 05, 2023
With the leak of information such as Social Security numbers, in addition to other protected information, 600,000 of the nearly 2.5 million affected are at risk for identity theft.
by Dark Reading Staff, Dark Reading
June 05, 2023
1 MIN READ
Article
Want Sustainable Security? Find Middle Ground Between Tech & Education
The winning recipe for sustainable security combines strategic user education and tactical automation of well-constructed processes.
June 02, 2023
The winning recipe for sustainable security combines strategic user education and tactical automation of well-constructed processes.
by Johanna Baum, CEO & Founder, Strategic Security Solutions (S3)
June 02, 2023
4 MIN READ
Article
Amazon Pays $30.8M to Settle Ring Spying & Alexa Privacy Lawsuits
The global e-commerce company will pay millions of dollars in two separate lawsuits because of privacy and security violations, the FTC says.
June 01, 2023
The global e-commerce company will pay millions of dollars in two separate lawsuits because of privacy and security violations, the FTC says.
by Dark Reading Staff, Dark Reading
June 01, 2023
1 MIN READ
Article
Jetpack WordPress Plug-in API Bug Triggers Mass Updates
An audit uncovers an API-related security vulnerability dating back to Jetpack version 2.0 released in 2012 — and it affects millions of websites.
June 01, 2023
An audit uncovers an API-related security vulnerability dating back to Jetpack version 2.0 released in 2012 — and it affects millions of websites.
by Dark Reading Staff, Dark Reading
June 01, 2023
1 MIN READ
Article
Where SBOMs Stand Today
It's been two years since Executive Order 14028. By using SBOMs as a standard, organizations can manage software risks, protect their reputation, and improve their cybersecurity posture.
June 01, 2023
It's been two years since Executive Order 14028. By using SBOMs as a standard, organizations can manage software risks, protect their reputation, and improve their cybersecurity posture.
by Liran Tancman, CEO & Co-Founder, Rezilion
June 01, 2023
4 MIN READ
Article
MacOS 'Migraine' Bug: Big Headache for Device System Integrity
Microsoft says the vulnerability could allow cyberattackers with root access to bypass security protections and install malware.
May 31, 2023
Microsoft says the vulnerability could allow cyberattackers with root access to bypass security protections and install malware.
by Dark Reading Staff, Dark Reading
May 31, 2023
1 MIN READ
Article
Dangerous Regions: Isolating Branch Offices in High-Risk Countries
Organizations must be cautious about how they interact with other regions around the world in order to operate safely in an at-times adversarial landscape.
May 25, 2023
Organizations must be cautious about how they interact with other regions around the world in order to operate safely in an at-times adversarial landscape.
by John A. Smith, CEO, Conversant Group
May 25, 2023
4 MIN READ
Article
Apple Patches 3 Zero-Days Possibly Already Exploited
In an advisory released by the company, Apple revealed patches for three previously unknown bugs it says may already have been used by attackers.
May 19, 2023
In an advisory released by the company, Apple revealed patches for three previously unknown bugs it says may already have been used by attackers.
by Dark Reading Staff, Dark Reading
May 19, 2023
1 MIN READ
Article
3 Ways Hackers Use ChatGPT to Cause Security Headaches
As ChatGPT adoption grows, the industry needs to proceed with caution. Here's why.
May 18, 2023
As ChatGPT adoption grows, the industry needs to proceed with caution. Here's why.
by Ron Reiter, Co-Founder & CTO, Sentra
May 18, 2023
4 MIN READ
Article
Unpatched Wemo Smart Plug Bug Opens Countless Networks to Cyberattacks
Cyberattckers can easily exploit a command-injection bug in the popular device, but Belkin has no plans to address the security vulnerability.
May 16, 2023
Cyberattckers can easily exploit a command-injection bug in the popular device, but Belkin has no plans to address the security vulnerability.
by Tara Seals, Managing Editor, News, Dark Reading
May 16, 2023
5 MIN READ
Article
Microsoft Follina Bug Is Back in Meme-Themed Cyberattacks Against Travel Orgs
A two-bit comedian is using a patched Microsoft vulnerability to attack the hospitality industry, and really laying it on thick along the way.
May 15, 2023
A two-bit comedian is using a patched Microsoft vulnerability to attack the hospitality industry, and really laying it on thick along the way.
by Nate Nelson, Contributing Writer, Dark Reading
May 15, 2023
4 MIN READ
Article
The Problem of Old Vulnerabilities — and What to Do About It
The vulnerabilities most often exploited by ransomware attackers are already known to us.
May 09, 2023
The vulnerabilities most often exploited by ransomware attackers are already known to us.
by Aaron Sandeen, CEO & Co-Founder, Securin
May 09, 2023
4 MIN READ
Article
Consilient Inc. and Harex InfoTech Partner to Fight Financial Crime in South Korea
Companies bring generative AI-Federated Learning to the forefront to transform business processes and enable dynamic risk management.
May 08, 2023
Companies bring generative AI-Federated Learning to the forefront to transform business processes and enable dynamic risk management.
May 08, 2023
4 MIN READ
Article
Apple Patches Bluetooth Flaw in AirPods, Beats
Users can check for the updated firmware version of their wireless headphones in the Bluetooth settings of their iPhone, iPad, or Mac devices.
May 05, 2023
Users can check for the updated firmware version of their wireless headphones in the Bluetooth settings of their iPhone, iPad, or Mac devices.
by Dark Reading Staff, Dark Reading
May 05, 2023
1 MIN READ
Article