Dark Reading

A Day in The Life of a Pen Tester

04/02/2020
Two penetration testers share their day-to-day responsibilities, challenges they encounter, and the skills they value most on the job.

Bad Bots Build Presence Across the Web

04/02/2020
Bots that mimic human behavior are driving a growing percentage of website traffic while contributing to an avalanche of misinformation.

Companies Are Failing to Deploy Key Solution for Email Security

04/02/2020
A single -- albeit complex-to-deploy -- technology could stop the most expensive form of fraud, experts say. Why aren't more companies adopting it?

Prioritizing High-Risk Assets: A 4-Step Approach to Mitigating Insider Threats

04/02/2020
Sound insider threat detection programs combine contextual data and a thorough knowledge of employee roles and behaviors to pinpoint the biggest risks.

5 Ways Enterprises Inadvertently Compromise Their Network Security

04/02/2020
Is your organization carelessly leaving its networks vulnerable to invasion? Check out these five common oversights to see if your resources are at risk.

A Hacker's Perspective on Securing VPNs As You Go Remote

04/02/2020
As organizations rush to equip and secure their newly remote workforce, it's important to keep things methodical and purposeful

Best Practices to Manage Third-Party Cyber-Risk Today

04/02/2020
Bold new thinking is needed to solve the rapidly evolving challenge of third-party risk management.

Vulnerability Researchers Focus on Zoom App's Security

04/02/2020
With videoconferencing's rise as an essential tool for remote work comes a downside: more security scrutiny, which has turned up a number of security weaknesses.

Attackers Leverage Excel File Encryption to Deliver Malware

04/01/2020
Technique involves saving malicious Excel file as "read-only" and tricking users into opening it, Mimecast says.

Why All Employees Are Responsible for Company Cybersecurity

04/01/2020
It's not just the IT and security team's responsibility to keep data safe -- every member of the team needs to be involved.

Defense Evasion Dominated 2019 Attack Tactics

03/31/2020
Researchers mapped tactics and techniques to the MITRE ATT&CK framework to determine which were most popular last year.

Researchers Uncover Unsophisticated - But Creative - Watering-Hole Attack

03/31/2020
Holy Water campaign is targeting users of a specific religious and ethnic group in Asia, Kaspersky says.

Researchers Spot Sharp Increase in Zoom-Themed Domain Registrations

03/30/2020
Attackers are attempting to take advantage of the surge in teleworking prompted by COVID-19, Check Point says.

Microsoft Edge Will Tell You If Credentials Are Compromised

03/30/2020
Password Monitor, InPrivate mode, and ad-tracking prevention are three new additions to Microsoft Edge.

HackerOne Drops Mobile Voting App Vendor Voatz

03/30/2020
Bug bounty platform provider cited "Voatz's pattern of interactions with the research community" in its decision to halt the app vendor's vuln disclosure program on HackerOne.

Malicious USB Drive Hides Behind Gift Card Lure

03/27/2020
Victims are being enticed to insert an unknown USB drive into their computers.

Virgin Media Could Pay GB pound 4.5B for Leak Affecting 900,000 Customers

03/27/2020
A misconfigured database holding personal data was left available online between April 2019 and February 2020.

The Wild, Wild West(world) of Cybersecurity

03/27/2020
Though set in the future, HBO's "Westworld" works as an allegory for the present moment in cybersecurity.

10 Security Services Options for SMBs

03/26/2020
Outsourcing security remains one of the best ways for small to midsize businesses to protect themselves from cyberthreats.

Security Not a Priority for SAP Projects, Users Report

03/26/2020
Nearly 70% of SAP users surveyed believe organizations lacked focus on IT security during previous SAP implementations.