Dark Reading

NSA Cyber Chief Vows 'No Backdoors' in Quantum Encryption Standards

05/16/2022
New quantum encryption standards will stand up to spy-snooping, NSA cybersecurity director said.

Name That Toon: Knives Out

05/16/2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

Critical Zyxel Firewall Bug Under Active Attack After PoC Exploit Debut

05/16/2022
Just one day after disclosure, cyberattackers are actively going after the command-injection/code-execution vulnerability in Zyxel's gear.

US Cyber Director: Forging a Cybersecurity Social Contract Is Not Optional

05/16/2022
In a Black Hat Asia keynote fireside chat, US national cyber director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.

Me, My Digital Self, and I: Why Identity Is the Foundation of a Decentralized Future

05/16/2022
A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.

How to Turn a Coke Can Into an Eavesdropping Device

05/14/2022
Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.

US Agrees to International Electronic Cybercrime Evidence Swap

05/13/2022
The Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals.

CISO Shares Top Strategies to Communicate Security's Value to the Biz

05/13/2022
In a keynote address at Black Hat Asia in Singapore this week, CISO and former NASA security engineer George Do discussed his go-to model for measuring security effectiveness – and getting others in the organization to listen.

Black Hat Asia: Democracy's Survival Depends on Taming Technology

05/13/2022
The conference opens with stark outlook on the future of global democracy — currently squeezed between Silicon Valley and China.

Linux, OpenSSF Champion Plan to Improve Open Source Security

05/13/2022
The White House and tech industry pledge $150 million over two years to boost open source resiliency and supply chain security.

Log4Shell Exploit Threatens Enterprise Data Lakes, AI Poisoning

05/13/2022
A brand-new attack vector lays open enterprise data lakes, threatening grave consequences for AI use cases like telesurgery or autonomous cars.

Data Transformation: 3 Sessions to Attend at RSA 2022

05/13/2022
Three RSA 2022 sessions take deep dives into the security considerations around data cloud transformation.

How to Avoid Falling Victim to PayOrGrief's Next Rebrand

05/13/2022
The group that shut down the second largest city in Greece was not new but a relaunch of DoppelPaymer.

Transforming SQL Queries Bypasses WAF Security

05/12/2022
A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.

Black Hat Asia: Firmware Supply Chain Woes Plague Device Security

05/12/2022
The supply chain for firmware development is vast, convoluted, and growing out of control: patching security vulnerabilities can take up to two years. For cybercriminals, it's a veritable playground.

3 Predictors of Cybersecurity Startup Success

05/12/2022
Before investing, venture capitalists should consider a trio of business characteristics that seem to correlate with commercial success, based on meetings with over 2,000 cybersecurity startups.

Egnyte Enhances Program for Managed Service Providers

05/12/2022
Enhancements to the program include unique packages, faster response time for invoicing, and dedicated training for new solutions.

StackHawk Raises $20.7 Million in Series B Funding for Developer-First Application and API Security Testing

05/12/2022
Round co-led by Sapphire Ventures and Costanoa Ventures to accelerate product leadership and market growth.

Cloud Firm Appian Awarded $2B in Trade Secret Cyber-Theft Lawsuit

05/12/2022
Cloud competitor found liable for breaking into Appian back-end systems to steal company secrets.

Needs Improvement: Scoring Biden's Cyber Executive Order

05/12/2022
One year after it was issued, has President Biden's Cyber Executive Order had an impact?