Dark Reading

Log4Shell Makes the Case for Runtime Application Self-Protection

03/02/2022
Dive into the case for RASP to combat Log4Shell and why Web app firewalls aren't great for these types of attacks.

NeuraLegion Rebrands as Bright Security

03/02/2022
Also announces $20 million Series A funding round led by Evolution Equity Partners.

Cyberattacks in Ukraine Soon Could Spill Over to Other Countries

03/01/2022
Email-borne attacks out of Russia have already targeted at least a few US and European organizations.

IRONSCALES Expands Product Offering Across Email, Communication Platforms

03/01/2022
New solutions protect customers from expanding threats to cybersecurity landscape.

What Do I Need to Know for SaaS Security?

03/01/2022
Most importantly, someone needs to step forward and take it on as their job.

Darktrace Forms New U.S. Federal Division to Assist With Global Cyberthreats

03/01/2022
Sally Kenyon Grant has been appointed as VP of Darktrace Federal, leading initiatives supporting U.S. government cybersecurity operations.

Why the Shifting Nature of Endpoints Requires a New Approach to Security

03/01/2022
Endpoints have evolved, and legacy defenses aren't doing enough to keep them secure.

Beyond the Hype: AI's Future in Defensive Cybersecurity

03/01/2022
Hybridizing signatures with artificial intelligence is making a significant difference in our ability to detect cyberattacks, including ransomware.

CISO Checklist for Offboarding Security Staff

02/28/2022
The Great Resignation strikes cybersecurity teams, too. Here's a checklist for CISOs to ensure security is retained even when security staff is not.

KnowBe4 Research: Half of Employees Use Unauthorized File Services to Complete Work

02/28/2022
Report examines the prevalence of two common insecure practices.

Deep Instinct 2022 Threat Landscape Report Finds 125% Increase in Threat Types and Novel Evasion Techniques

02/28/2022
The Deep Instinct Threat Research team monitored attack volumes and types and extrapolated their findings to predict where the future of cybersecurity is heading, determine what motivates attackers, and lays out the steps organizations can take now in order to protect themselves in the future.

Invicti Security Adds Software Composition Analysis to Its Industry- Leading AppSec Platform

02/28/2022
Invicti SCA enables users to track and secure open-source components to reduce security risk.

Phishing Attack in Ukraine Could Be Prelude to Disinformation Campaign

02/28/2022
Belarus-based APT behind the attacks may also be working in concert with Russia, researchers say.

Researchers Warn of Stealthy Chinese Backdoor Targeting Multiple Foreign Agencies

02/28/2022
A stealthy backdoor program used by China-linked threat actors has targeted government computers at multiple foreign agencies, allowing attackers to retain a presence on sensitive networks and exfiltrate data while remaining undetected.

Companies Borrow Attack Technique to Watermark Machine Learning Models

02/28/2022
Researchers continue to improve on a technique for embedded crafted outputs into machine-learning models, an anti-copying technique originally thought up by adversarial researchers.

How to Boost Shift-Left Security in the SDLC

02/28/2022
Organizations will see big wins from applying security controls early in the development life cycle.

Ukrainian Troops Targeted in Phishing Attacks by Suspected Belarusian APT

02/25/2022
Ukraine's Computer Emergency Response Team calls out UNIC1151 nation-state hacking group out of Belarus as behind the attacks.

Top 5 Interview Questions to Ask DevOps Candidates in 2022

02/25/2022
It's worthwhile to find candidates who have experience with models that embed security into their processes.

The Future of Cyber Insurance

02/25/2022
Having cyber insurance is a good idea if the costs make sense — it could be the difference between going out of business and staying afloat. But it shouldn't be your first course of action.

Putting the X Factor in XDR

02/25/2022
While extended detection and response (XDR) is effectively considered an upgrade from endpoint detection and response, enterprises must still begin with a strong EDR foundation.