Dark Reading

4 Tips to Secure the OT Cybersecurity Budget You Require

11/10/2021
OT security engineers and personnel should approach senior management with an emphasis on risk reduction benefits and with a concrete plan to secure budget and funding before it's too late.

Securing the Public: Who Should Take Charge?

11/10/2021
International policy expert Marietke Schaake explores the intricacies of protecting the public as governments depend on private companies to build and secure digital infrastructure.

Researcher Details Vulnerabilities Found in AWS API Gateway

11/10/2021
AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.

Dark Reading Video News Desk Comes to Black Hat Europe

11/10/2021
While attendees join Black Hat Europe 2021 virtually and live in London, we bring you prerecorded interviews from remote offices around the world.

Microsoft Fixes Exchange Server Zero-Day

11/09/2021
November security update contains patches for 55 bugs — including six zero-days across various products.

Are You Planning for the Quantum, Transhumanist Threat?

11/09/2021
Breaking encryption in a day and hacking without visible devices are two threats that could become a reality in the next decade and beyond, experts say.

What My Optometrist Taught Me About InfoSec Presentations

11/08/2021
A broken pair of eyeglasses brings into focus an important lesson about how to tailor security messages to the right audience.

Arctic Wolf Security Operations Cloud Reaches Massive Scale and a Global Footprint

11/08/2021
Global business momentum and technical advancements position the Arctic Wolf platform as a category-defining Security Operations solution

Kaspersky Finds DDoS Attacks in Q3 Grow by 24%, Become More Sophisticated

11/08/2021
The total number of smart attacks (advanced DDoS attacks that are often targeted) increased by 31% when compared to the same period last year.

Banking Malware Threats Surging as Mobile Banking Increases – Nokia Threat Intelligence Report

11/08/2021
The Nokia 2021 Threat Intelligence Report announced today shows that banking malware threats are sharply increasing as cyber criminals target the rising popularity of mobile banking on smartphones, with plots aimed at stealing personal banking credentials and credit card information.

Valeo Networks Acquires On Time Tech, Accelerating National Growth Strategy

11/08/2021
Through this latest acquisition, the company adds two more California locations.

Could Cyber Diplomacy Be the Ultimate Answer to American Ransomware Woes?

11/08/2021
Incentives for good conduct and deterrents for bad behavior in cyberspace are impossible to effectively establish and enforce without international collaboration and commitment.

3 Ways to Deal With the Trojan Source Attack

11/08/2021
These scripts and commands provide short-term fixes for blocking the Trojan Source attack that abuses Unicode to inject malicious backdoors in source code.

SecureAuth Buys Acceptto to Deliver Low-Friction Authentication to Enterprises

11/05/2021
Acceptto’s contextual behavior threat intelligence technology will help SecureAuth deliver AI-driven MFA and continuous password-less authentication, SecureAuth says.

US Defense Contractor Discloses Data Breach

11/05/2021
Electronic Warfare Associates says an attackers infiltrated EWA email in August, which led to the exfiltration of files with personal data.

Who's Minding Your Company's Crypto Decisions?

11/05/2021
Security teams must first evaluate security protocols and the reputation of the cryptocurrency payment platform before their companies can proceed to accept the alternative currency as payment.

How InfoSec Should Use the Minimum Viable Secure Product Checklist

11/05/2021
Google and Salesforce executives discuss the need for the newly released MVSP, how tech companies came together to work on it, and how organizations should use it.

To Secure DevOps, Security Teams Must be Agile

11/05/2021
The evolution of agile development and infrastructure-as-code has given security teams the tools they need to gain visibility, find vulnerabilities early, and continuously evaluate infrastructure.

4 Tips on How Small to Midsize Businesses Can Combat Cyberattacks

11/05/2021
The first step in improving your cybersecurity is understanding your risk of attack.

How Is Zero Trust Different From Traditional Security?

11/04/2021
Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.