Dark Reading

7 Security Strategies as Employees Return to the Office

04/01/2021
More sooner than later, employees will be making their way back to the office. Here's how security pros can plan for the next new normal.

Kansas Man Indicted for Hacking, Tampering With Water Utility System

04/01/2021
Attacker disabled water-purification operation systems "with intention of harming" the rural water district.

NIST Publishes Guide for Securing Hotel Property Management Systems

04/01/2021
These sensitive systems store guests' personal data and payment-card information.

Solving the Leadership Buy-In Impasse With Data

04/01/2021
Justify your requirements with real numbers to get support for security investments.

How to Build a Resilient IoT Framework

04/01/2021
For all of their benefits, IoT devices weren't built with security in mind -- and that can pose huge challenges.

The Role of Visibility in Securing Cloud Applications

04/01/2021
Traditional data center approaches aren't built for securing modern cloud applications.

Top 5 Attack Techniques May Be Easier to Detect Than You Think

03/31/2021
New analysis shows attackers for the most part are continuing to rely on the same techniques and tactics they have been using for years.

Google Updates on Campaign Targeting Security Researchers

03/31/2021
Attackers linked to North Korea began to target security researchers on social media earlier this year.

What's So Great About XDR?

03/31/2021
XDR is a significant advance in threat detection and response technology, but few enterprises understand why. Omdia identifies four catalysts driving the emergence of XDR.

83% of Businesses Hit With a Firmware Attack in Past Two Years

03/31/2021
A new Microsoft-commissioned report finds less than 30% of organizations allocate security budget toward preventing firmware attacks.

College Students Targeted in Newest IRS Scam

03/31/2021
The Internal Revenue Service warns of fraudulent emails sent to .edu addresses.

Advice From Security Experts: How to Approach Security in the New Normal

03/31/2021
Here are the biggest lessons they've learned after a year of work from home, and how they advise their counterparts at organizations to proceed as a result of those lessons.

3 Ways Vendors Can Inspire Customer Trust Amid Breaches

03/31/2021
As customers rely more on cloud storage and remote workforces, the probability of a breach increases.

Weakness in EDR Tools Lets Attackers Push Malware Past Them

03/31/2021
A technique called hooking used by most endpoint detection and response products to monitor running processes can be abused, new research shows.

Security on a Shoestring? More Budget Means More Detection

03/30/2021
Companies that spend the smallest share of their IT budget on security see fewer threats, but that's not good news.

Publicly Available Data Enables Enterprise Cyberattacks

03/30/2021
Adversaries scour social media platforms and use other tactics to gather information that facilitates targeted enterprise attacks, research shows.

What We Know (and Don't Know) So Far About the 'Supernova' SolarWinds Attack

03/30/2021
A look at the second elusive attack targeting SolarWinds software that researchers at Secureworks recently cited as the handiwork of Chinese nation-state hackers.

White Ops Renames Company 'Human'

03/30/2021
The company first confirmed plans to change its name in October 2020.

What You Need to Know -- or Remember -- About Web Shells

03/30/2021
What's old is new again as Web shell malware becomes the latest attack vector in widespread Exchange exploits. Here's a primer on what Web shells are and what they do.

Watch Out for These Cyber-Risks

03/30/2021
It's difficult to predict what will materialize in the months ahead in terms of cyber-risks, which is why it's wise to review your organization's security posture now.