Dark Reading

Why the Shifting Nature of Endpoints Requires a New Approach to Security

03/01/2022
Endpoints have evolved, and legacy defenses aren't doing enough to keep them secure.

Beyond the Hype: AI's Future in Defensive Cybersecurity

03/01/2022
Hybridizing signatures with artificial intelligence is making a significant difference in our ability to detect cyberattacks, including ransomware.

CISO Checklist for Offboarding Security Staff

02/28/2022
The Great Resignation strikes cybersecurity teams, too. Here's a checklist for CISOs to ensure security is retained even when security staff is not.

KnowBe4 Research: Half of Employees Use Unauthorized File Services to Complete Work

02/28/2022
Report examines the prevalence of two common insecure practices.

Deep Instinct 2022 Threat Landscape Report Finds 125% Increase in Threat Types and Novel Evasion Techniques

02/28/2022
The Deep Instinct Threat Research team monitored attack volumes and types and extrapolated their findings to predict where the future of cybersecurity is heading, determine what motivates attackers, and lays out the steps organizations can take now in order to protect themselves in the future.

Invicti Security Adds Software Composition Analysis to Its Industry- Leading AppSec Platform

02/28/2022
Invicti SCA enables users to track and secure open-source components to reduce security risk.

Phishing Attack in Ukraine Could Be Prelude to Disinformation Campaign

02/28/2022
Belarus-based APT behind the attacks may also be working in concert with Russia, researchers say.

Researchers Warn of Stealthy Chinese Backdoor Targeting Multiple Foreign Agencies

02/28/2022
A stealthy backdoor program used by China-linked threat actors has targeted government computers at multiple foreign agencies, allowing attackers to retain a presence on sensitive networks and exfiltrate data while remaining undetected.

Companies Borrow Attack Technique to Watermark Machine Learning Models

02/28/2022
Researchers continue to improve on a technique for embedded crafted outputs into machine-learning models, an anti-copying technique originally thought up by adversarial researchers.

How to Boost Shift-Left Security in the SDLC

02/28/2022
Organizations will see big wins from applying security controls early in the development life cycle.

Ukrainian Troops Targeted in Phishing Attacks by Suspected Belarusian APT

02/25/2022
Ukraine's Computer Emergency Response Team calls out UNIC1151 nation-state hacking group out of Belarus as behind the attacks.

Top 5 Interview Questions to Ask DevOps Candidates in 2022

02/25/2022
It's worthwhile to find candidates who have experience with models that embed security into their processes.

The Future of Cyber Insurance

02/25/2022
Having cyber insurance is a good idea if the costs make sense — it could be the difference between going out of business and staying afloat. But it shouldn't be your first course of action.

Putting the X Factor in XDR

02/25/2022
While extended detection and response (XDR) is effectively considered an upgrade from endpoint detection and response, enterprises must still begin with a strong EDR foundation.

Fears Rise of Potential Russian Cyberattacks on US, Allies Over Sanctions

02/24/2022
If past is precedent, the cyber impact of the war in Ukraine could be broad and bruising, experts say.

Why Developers Should Care About Log4j

02/24/2022
Unless you can gain full visibility into how data flows to and through your dependencies, you can’t be sure if you are affected by this vulnerability.

Trickbot Comes Up With a New Set of Tricks

02/24/2022
Late last year, the group behind the malware stopped spreading Trickbot, instead pushing out copies of Emotet and Qbot to infected systems, researchers say.

Insider Threats Are More Than Just Malicious Employees

02/24/2022
Humans are unpredictable and may make mistakes that could result in a security incident.

4 Simple Steps to a Modernized Threat Intelligence Approach

02/24/2022
As cybersecurity strategies continuously evolve to keep pace with attackers, the relevance of the traditional model is in need of an automation upgrade.

Businesses Are at Significant Risk of Cybersecurity Breaches Due to Immature Security Hygiene and Posture Management Pra

02/24/2022
Seven out of 10 organizations experienced a cyberattack that started through the exploit of unknown or poorly managed technology assets, according to Enterprise Strategy Group research.