Dark Reading

Meta Expands Bug-Bounty Program to Include Data Scraping

12/15/2021
Scraping bugs and scraped databases are two new areas of research for the company's bug-bounty and data-bounty programs.

Cybereason Announces Availability of AI-Driven Cybereason XDR and EDR on Google Cloud Marketplace

12/15/2021
Cloud-native platform automates prevention, detection, and response to cyberattacks.

Kroll Acquires Security Compass Advisory

12/15/2021
Combined capabilities will help clients address the growing complexity of securing public, private and hybrid cloud, 5G, IoT, and industrial control systems

Privacy and Safety Issues With Facebook's New 'Metaventure'

12/15/2021
With access to a user's 3D model and full-body digital tracking, attackers can recreate the perfect replica of a C-level executive to trick employees.

What Are the Pros and Cons of a SASE Architecture?

12/15/2021
SASE is a promising and burgeoning networking architecture approach, but it's not without some challenges.

Why We Need "Developer-First" Application Security

12/15/2021
The way to improve the security of the modern software development life cycle and reduce the number of application-based breaches is to re-center app security around the needs of developers.

Why Cloud Storage Isn't Immune to Ransomware

12/15/2021
Cloud security is a shared responsibility. which sometimes leads to security gaps and complexity in risk management.

Kryptowire Collaborates With Orange and Finds Vulnerabilities in Mobile Devices

12/15/2021
Kryptowire’s end-to-end cybersecurity engine identified vulnerabilities granting system user-level privileges for arbitrary shell script execution.

Cisco's Ash Devata on Securing the Hybrid Workforce With Zero Trust

12/14/2021
Hybrid work is here to stay, and organizations can apply zero trust's three core principles to ensure a secure workforce, Devata says.

Tufin Introduces Security Policy Builder (SPB) App to Marketplace

12/14/2021
Automates security policy design to ensure compliance and reduce likelihood of breach announcing significant updates to other marketplace apps.

Ground Labs Research Reveals 71% of American Consumers are Unaware of Data Protection Laws

12/14/2021
Google Survey of 1,000 U.S. consumers uncovers data privacy disconnect, a call to action for businesses.

Attackers Target Log4J to Drop Ransomware, Web Shells, Backdoors

12/14/2021
Amid the increase in Log4J attack activity, at least one Iranian state-backed threat group is preparing to target the vulnerability, experts say.

Propane Gas Distributor Hit With Ransomware

12/14/2021
North America-based Superior Plus "temporarily disabled" some of its systems in the wake of the attack.

Ransomware Hits Virginia Legislative Agencies

12/14/2021
The attack forced a shutdown of computer systems and websites for Virginia legislative agencies and commissions, reports state.

Tool Overload & Attack Surface Expansion Plague SOCs

12/14/2021
Security professionals are burning out from handling too many tools and facing a growing number of threats, and more than 40% see lack of leadership as the main problem.

Microsoft Patches Zero-Day Spreading Emotet Malware

12/14/2021
The December rollout includes 67 security patches and addresses one zero-day and five more publicly known vulnerabilities.

Source Code Leaks: The Real Problem Nobody Is Paying Attention To

12/14/2021
Source code is a corporate asset like any other, which makes it an attractive target for hackers.

Combat Misinformation by Getting Back to Security Basics

12/14/2021
One volley of fake news may land, but properly trained AI can shut down similar attempts at their sources.

XDR: What It Is, What It Isn't

12/13/2021
The three must-haves in eXtended Detection and Response are: making data accessible, facilitating real-time threat detection, and providing remediation strategies.

Tales from the Dark Web: Fingerprinting Access Brokers on Criminal Forums

12/13/2021
Every high-profile breach leaves a trail of bread crumbs, and defenders who monitor access brokers can connect the dots and detect attacks as they unfold.