Dark Reading

Name That Edge Toon: Rough Patch?

04/05/2021
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

Inside the Ransomware Campaigns Targeting Exchange Servers

04/02/2021
Security experts discuss the ransomware campaigns taking aim at Microsoft Exchange Server vulnerabilities patched last month.

Hackers Demand $40M in Ransom From Florida School District

04/02/2021
District officials say they have no intention of paying the ransom

FBI & CISA Warn of Active Attacks on FortiOS Vulnerabilities

04/02/2021
A joint advisory warns admins of the likelihood of APT groups exploiting three vulnerabilities in the Fortinet FortiOS.

US Tech Dominance Rides on Securing Intellectual Property

04/02/2021
A recent, mostly overlooked pardon points to a big problem in the US tech industry: Intellectual property offers a lucrative golden ticket for insiders.

Enterprises Remain Riddled With Overprivileged Users -- and Attackers Know It

04/01/2021
Attackers commonly focus on finding users with too much privileged access as their ticket to network compromise. What can companies do?

7 Security Strategies as Employees Return to the Office

04/01/2021
More sooner than later, employees will be making their way back to the office. Here's how security pros can plan for the next new normal.

Kansas Man Indicted for Hacking, Tampering With Water Utility System

04/01/2021
Attacker disabled water-purification operation systems "with intention of harming" the rural water district.

NIST Publishes Guide for Securing Hotel Property Management Systems

04/01/2021
These sensitive systems store guests' personal data and payment-card information.

Solving the Leadership Buy-In Impasse With Data

04/01/2021
Justify your requirements with real numbers to get support for security investments.

How to Build a Resilient IoT Framework

04/01/2021
For all of their benefits, IoT devices weren't built with security in mind -- and that can pose huge challenges.

The Role of Visibility in Securing Cloud Applications

04/01/2021
Traditional data center approaches aren't built for securing modern cloud applications.

Top 5 Attack Techniques May Be Easier to Detect Than You Think

03/31/2021
New analysis shows attackers for the most part are continuing to rely on the same techniques and tactics they have been using for years.

Google Updates on Campaign Targeting Security Researchers

03/31/2021
Attackers linked to North Korea began to target security researchers on social media earlier this year.

What's So Great About XDR?

03/31/2021
XDR is a significant advance in threat detection and response technology, but few enterprises understand why. Omdia identifies four catalysts driving the emergence of XDR.

83% of Businesses Hit With a Firmware Attack in Past Two Years

03/31/2021
A new Microsoft-commissioned report finds less than 30% of organizations allocate security budget toward preventing firmware attacks.

College Students Targeted in Newest IRS Scam

03/31/2021
The Internal Revenue Service warns of fraudulent emails sent to .edu addresses.

Advice From Security Experts: How to Approach Security in the New Normal

03/31/2021
Here are the biggest lessons they've learned after a year of work from home, and how they advise their counterparts at organizations to proceed as a result of those lessons.

3 Ways Vendors Can Inspire Customer Trust Amid Breaches

03/31/2021
As customers rely more on cloud storage and remote workforces, the probability of a breach increases.

Weakness in EDR Tools Lets Attackers Push Malware Past Them

03/31/2021
A technique called hooking used by most endpoint detection and response products to monitor running processes can be abused, new research shows.