Dark Reading

Expert Insights: Training the Data Elephant in the AI Room

02/04/2022
Be aware of the risk of inadvertent data exposure in machine learning systems.

China-Linked Group Attacked Taiwanese Financial Firms for 18 Months

02/04/2022
The Antlion group, also known as Pirate Panda and Tropic Trooper, has shifted to targeting mainly Taiwan, using custom backdoors against financial organizations.

Want to Be an Ethical Hacker? Here's Where to Begin

02/04/2022
By utilizing these resources, beginner hackers can find their specific passions within the cybersecurity space and eventually make their own mark in the ethical hacking profession.

Mac Malware-Dropping Adware Gets More Dangerous

02/03/2022
The authors of UpdateAgent have tweaked it yet again — for the fifth time in less than 18 months.

Mandiant Bolsters SaaS Platform With Integration of New Attack Surface Management Module

02/03/2022
New automated offering helps organizations gain comprehensive visibility across IT environments, continuously monitor for vulnerabilities, operationalize threat intelligence and manage risk.

Several India-Based Call Centers Indicted by US DoJ

02/03/2022
"Scam robocall" operators face charges for defrauding US citizens.

Tenable Launches Suite of New Features to Cloud-Native Application Security Platform

02/03/2022
Tenable.cs enhancements secure cloud resources, container images, and cloud assets

The Future of Cybersecurity: Our Predictions for 2022

02/03/2022
New technologies and workplace trends are fueling a global explosion in cybercrime. Discover the threats to watch out for in 2022.

Research From Quantum and ESG Reveals Top Challenges in Data Management

02/03/2022
Unstructured data management, storage complexity and cost remain barriers to adoption, resulting in valuable data being discarded or mismanaged.

DHS Launches Cyber Safety Review Board to Analyze Major Vulnerability Events

02/03/2022
The US Department of Homeland Security has named a 15-member review board to assess significant cybersecurity events and recommend improvements - starting with the Log4J vulnerability.

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (

02/03/2022
Menlo identified 224% increase in HEAT attacks in the last six months fueling ransomware surge.

Microsoft: Multifactor Adoption Remains Low

02/03/2022
New data shows a slow roll to strong authentication for most enterprise Windows systems.

BIO-key to Expand Customer Reach and Talent in EMEA Region

02/03/2022
Expansion comes via definitive agreement to acquire authentication solutions provider Swivel Secure Europe.

Keeper Security Acquires Glyptodon

02/03/2022
The acquisition enables distributed teams to connect to remote or cloud infrastructure in a hyper-secure, agentless and passwordless way without a VPN.

BreachQuest Welcomes Sandy Dunn as Chief Information Security Officer

02/03/2022
Industry cybersecurity veteran joins executive team of leading cyber experts with key experience In healthcare market.

HackNotice Releases Combined Security and Threat Awareness Service for Free

02/03/2022
HackNotice users can now deepen their security awareness with a self-paced training course to prevent themselves from being targets of cyberattacks.

Simplifying Zero Trust Security in Healthcare Organizations

02/03/2022
Healthcare organizations are increasingly looking at zero trust to help deter ransomware attacks, safeguard PHI, and prevent downtime.

Big Pharma Finds Patch Management a Bitter Pill

02/03/2022
One-quarter of pharmaceutical manufacturers received a failing grade on patch management, which is a vital step in heading off ransomware attacks.

Hackers Went Wild in 2021 — Every Company Should Do These 5 Things in 2022

02/03/2022
Practical steps companies can take to defend their critical infrastructure and avoid the financial and reputational damage that could result from a breach.

If My Organization Is Mostly in the Cloud, Do I Need a Firewall?

02/02/2022
A firewall is still a valuable part of the IT security stack, but businesses need to consider all their attack surfaces.