informa
/

Vulnerability Management

Ransomware Is Top Concern for Many Security Pros: Report
A survey of IT and security professionals also reveals COVID-19 has significantly changed the malware landscape.
July 23, 2021
A survey of IT and security professionals also reveals COVID-19 has significantly changed the malware landscape.
by Dark Reading Staff, Dark Reading
July 23, 2021
2 min read
Article
Understanding and Mitigating Insider Threats in Today's Remote-Work World
The insider threat menace has grown during the pandemic, worsened by an increase in credential theft and broader use of ...
July 23, 2021
The insider threat menace has grown during the pandemic, worsened by an increase in credential theft and broader use of ...
by Michael Walters, President & Co-Founder of Action1 Corporation
July 23, 2021
5 min read
Article
Memory Corruption Issues Lead 2021 CWE Top 25
The MITRE Common Weakness Enumeration (CWE) team's latest list of most dangerous software flaws includes several that sh...
July 22, 2021
The MITRE Common Weakness Enumeration (CWE) team's latest list of most dangerous software flaws includes several that sh...
by Jai Vijayan, Contributing Writer
July 22, 2021
5 min read
Article
Sophos Buys Network Detection And Response Startup Braintrace
The acquisition will add to Sophos' threat detection capabilities, the company reports.
July 22, 2021
The acquisition will add to Sophos' threat detection capabilities, the company reports.
by Dark Reading Staff, Dark Reading
July 22, 2021
1 min read
Article
Software Security: A Sounding Board for Needed Change
If the federal government is going to have software that performs critical functions, it must take complete ownership, a...
July 22, 2021
If the federal government is going to have software that performs critical functions, it must take complete ownership, a...
by Kevin E. Greene, Director of Security Solutions, Parasoft
July 22, 2021
6 min read
Article
Peloton Breach Reveals a Coming IoT Data Winter
We will see more and more Internet of Things attacks unless we adjust course quickly.
July 22, 2021
We will see more and more Internet of Things attacks unless we adjust course quickly.
by Emil Sayegh, CEO and President, Ntirety
July 22, 2021
5 min read
Article
Nearly All Linux OSes Have a Pair of Privilege Escalation Flaws
The issues, affecting kernels dating back to August 2014, allow an unprivileged user to gain root access to the operatin...
July 21, 2021
The issues, affecting kernels dating back to August 2014, allow an unprivileged user to gain root access to the operatin...
by Robert Lemos, Contributing Writer
July 21, 2021
4 min read
Article
Why the FBI's Recovery of Colonial Pipeline Ransom Signals Hope for the Future
The "win for the good guys" is a monumental step toward breaking down the business model of ransomware and digital extor...
July 21, 2021
The "win for the good guys" is a monumental step toward breaking down the business model of ransomware and digital extor...
by Morgan Demboski and Alexander J. Parella, Threat Intelligence Analyst, IronNet Cybersecurity / Threat Hunter, IronNet Cybersecurity
July 21, 2021
5 min read
Article
Cybersecurity Through the Lens of COVID
Whether you're talking about pandemics or cybersecurity attacks, public health and information security can use the same...
July 21, 2021
Whether you're talking about pandemics or cybersecurity attacks, public health and information security can use the same...
by Greg Bell, Co-founder & Chief Strategy Officer, Corelight
July 21, 2021
4 min read
Article
TSA Issues Second Directive for Pipeline Operators Amid China Concerns
A separate advisory from the CISA this week resurfaced details of a 2011–2013 Chinese campaign against energy industry t...
July 20, 2021
A separate advisory from the CISA this week resurfaced details of a 2011–2013 Chinese campaign against energy industry t...
by Jai Vijayan, Contributing Writer
July 20, 2021
5 min read
Article
China's Claim on Vulnerability Details Could Chill Researchers
The Network Security Law of the People's Republic of China enforces coordinated disclosure, but also requires that resea...
July 20, 2021
The Network Security Law of the People's Republic of China enforces coordinated disclosure, but also requires that resea...
by Robert Lemos, Contributing Writer
July 20, 2021
5 min read
Article
Name That Toon: Buzzard Bestie
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
July 20, 2021
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
by John Klossner, Cartoonist
July 20, 2021
1 min read
Article
Big Game Makes Easy Prey for Cybercriminals
By adopting nation-state methods, cybercriminals have moved on from small prey to large targets to rake in millions of d...
July 20, 2021
By adopting nation-state methods, cybercriminals have moved on from small prey to large targets to rake in millions of d...
by Ian Pratt, Global Head of Security for Personal Systems at HP Inc.
July 20, 2021
4 min read
Article
7 Ways AI and ML Are Helping and Hurting Cybersecurity
In the right hands, artificial intelligence and machine learning can enrich our cyber defenses. In the wrong hands, they...
July 19, 2021
In the right hands, artificial intelligence and machine learning can enrich our cyber defenses. In the wrong hands, they...
by Andrey Shklyarov & Dmitry Vyrostkov, Chief Compliance Officer, DataArt / Chief Software Architect, Security Services, DataArt
July 19, 2021
5 min read
Article
4 Future Integrated Circuit Threats to Watch
Threats to the supply chains for ICs and other computer components are poised to wreak even more havoc on organizations.
July 16, 2021
Threats to the supply chains for ICs and other computer components are poised to wreak even more havoc on organizations.
by Dr. Matthew Areno, Principal Engineer, Security Architecture and Engineering, Intel
July 16, 2021
6 min read
Article