Dark Reading
NSA Cyber Chief Vows 'No Backdoors' in Quantum Encryption Standards
05/16/2022
New quantum encryption standards will stand up to spy-snooping, NSA cybersecurity director said.
Name That Toon: Knives Out
05/16/2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Critical Zyxel Firewall Bug Under Active Attack After PoC Exploit Debut
05/16/2022
Just one day after disclosure, cyberattackers are actively going after the command-injection/code-execution vulnerability in Zyxel's gear.
US Cyber Director: Forging a Cybersecurity Social Contract Is Not Optional
05/16/2022
In a Black Hat Asia keynote fireside chat, US national cyber director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.
Me, My Digital Self, and I: Why Identity Is the Foundation of a Decentralized Future
05/16/2022
A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.
How to Turn a Coke Can Into an Eavesdropping Device
05/14/2022
Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.
US Agrees to International Electronic Cybercrime Evidence Swap
05/13/2022
The Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals.
CISO Shares Top Strategies to Communicate Security's Value to the Biz
05/13/2022
In a keynote address at Black Hat Asia in Singapore this week, CISO and former NASA security engineer George Do discussed his go-to model for measuring security effectiveness – and getting others in the organization to listen.
Black Hat Asia: Democracy's Survival Depends on Taming Technology
05/13/2022
The conference opens with stark outlook on the future of global democracy — currently squeezed between Silicon Valley and China.
Linux, OpenSSF Champion Plan to Improve Open Source Security
05/13/2022
The White House and tech industry pledge $150 million over two years to boost open source resiliency and supply chain security.
Log4Shell Exploit Threatens Enterprise Data Lakes, AI Poisoning
05/13/2022
A brand-new attack vector lays open enterprise data lakes, threatening grave consequences for AI use cases like telesurgery or autonomous cars.
Data Transformation: 3 Sessions to Attend at RSA 2022
05/13/2022
Three RSA 2022 sessions take deep dives into the security considerations around data cloud transformation.
How to Avoid Falling Victim to PayOrGrief's Next Rebrand
05/13/2022
The group that shut down the second largest city in Greece was not new but a relaunch of DoppelPaymer.
Transforming SQL Queries Bypasses WAF Security
05/12/2022
A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.
Black Hat Asia: Firmware Supply Chain Woes Plague Device Security
05/12/2022
The supply chain for firmware development is vast, convoluted, and growing out of control: patching security vulnerabilities can take up to two years. For cybercriminals, it's a veritable playground.
3 Predictors of Cybersecurity Startup Success
05/12/2022
Before investing, venture capitalists should consider a trio of business characteristics that seem to correlate with commercial success, based on meetings with over 2,000 cybersecurity startups.
Egnyte Enhances Program for Managed Service Providers
05/12/2022
Enhancements to the program include unique packages, faster response time for invoicing, and dedicated training for new solutions.
StackHawk Raises $20.7 Million in Series B Funding for Developer-First Application and API Security Testing
05/12/2022
Round co-led by Sapphire Ventures and Costanoa Ventures to accelerate product leadership and market growth.
Cloud Firm Appian Awarded $2B in Trade Secret Cyber-Theft Lawsuit
05/12/2022
Cloud competitor found liable for breaking into Appian back-end systems to steal company secrets.
Needs Improvement: Scoring Biden's Cyber Executive Order
05/12/2022
One year after it was issued, has President Biden's Cyber Executive Order had an impact?
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 Next >>