Dark Reading

The Ticking Time Bomb in Every Company's Code

04/30/2021
Developers must weigh the benefits and risks of using third-party code in Web apps.

XDR Pushing Endpoint Detection and Response Technologies to Extinction

04/29/2021
Ironically, EDR's success has spawn demand for technology that extends beyond it.

Researchers Connect Complex Specs to Software Vulnerabilities

04/29/2021
Following their release of 70 different vulnerabilities in different implementations of TCP/IP stacks over the past year, two companies find a common link.

'BadAlloc' Flaws Could Threaten IoT and OT Devices: Microsoft

04/29/2021
More than 25 critical memory allocation bugs could enable attackers to bypass security controls in industrial, medical, and enterprise devices.

Your Digital Identity's Evil Shadow

04/29/2021
In the wrong hands, these shady shadows are stealthy means to bypass security systems by hiding behind a proxy with legitimate IP addresses and user agents.

The Challenge of Securing Non-People Identities

04/29/2021
Non-people identities, which can act intelligently and make decisions on behalf of a person's identity, are a growing cybersecurity risk.

Adobe Open Sources Tool for Anomaly Research

04/28/2021
The One-Stop Anomaly Shop (OSAS) project packages machine-learning algorithms into a Docker container for finding anomalies in security log data.

FluBot Malware's Rapid Spread May Soon Hit US Phones

04/28/2021
The FluBot Android malware has spread throughout several European countries through an SMS package delivery scam.

FBI Works With 'Have I Been Pwned' to Notify Emotet Victims

04/28/2021
Officials shared 4.3 million email addresses with the HIBP website to help inform companies and individuals if Emotet compromised their accounts.

How to Secure Employees' Home Wi-Fi Networks

04/28/2021
Businesses must ensure their remote workers' Wi-Fi networks don't risk exposing business data or secrets due to fixable vulnerabilities.

Cartoon Caption Winner: Rough Patch?

04/28/2021
And the winner of The Edge's April cartoon caption contest is ...

Is Your Cloud Raining Sensitive Data?

04/28/2021
Learn common Kubernetes vulnerabilities and ways to avoid them.

Attacks Targeting ADFS Token Signing Certificates Could Become Next Big Threat

04/28/2021
New research shows how threat actors can steal and decrypt signing certificates so SAML tokens can be forged.

Do Cyberattacks Affect Stock Prices? It Depends on the Breach

04/27/2021
A security researcher explores how data breaches, ransomware attacks, and other types of cybercrime influence stock prices.

Emotet Malware Uninstalled From Infected Devices

04/27/2021
A law enforcement update deployed to compromised machines in January has been pushed, effectively removing the malware.

10K Hackers Defend the Planet Against Extraterrestrials

04/27/2021
Hack the Planet's Cyber Apocalypse capture-the-flag contest attracts 10,000 competitors from across the globe.

Ransomware Recovery Costs Near $2M

04/27/2021
The cost of recovering from a ransomware attack has more than doubled in one year, Sophos researchers report.

4 Ways CISOs Can Strengthen Their Security Resilience

04/27/2021
Security pros must remember bad actors will target their infrastructure, using counter-incident response technology in the process.

Expect an Increase in Attacks on AI Systems

04/27/2021
Companies are quickly adopting machine learning but not focusing on how to verify systems and produce trustworthy results, new report shows.

XDR: A Game-Changer in Enterprise Threat Detection

04/27/2021
Omdia's Eric Parizo highlights four capabilities that show how XDR technology is reinventing enterprise threat detection.