Dark Reading

Air India Confirms Data of 4.5M Travelers Compromised

05/24/2021
Affected data includes names, birthdates, contact information, passport details, and credit card data, the airline reports.

Sophos Research Uncovers Widespread Use of TLS By Cybercriminals

05/24/2021
SPONSORED CONTENT: Nearly half of all malware is being disseminated via the Transport Layer Security cryptographic protocol, says Dan Schiappa, executive VP and chief product officer for Sophos.

Work from Home Modifies the Endpoint Security Equation, Cisco Says

05/24/2021
SPONSORED CONTENT: As customers get to grips with this new WFH reality, they'll need to simplify their implementations and make more use of automation, says Cisco Secure's Al Huger.

As Threat Hunting Matures, Malware Labs Emerge

05/24/2021
By leveraging their analysis outputs, security pros can update detection rules engines and establish a stronger security posture in the process.

Cyber Insurance Firms Start Tapping Out as Ransomware Continues to Rise

05/24/2021
A global insurance carrier refuses to write new ransomware policies in France, while insurers rewrite policies. Are we heading toward a day when ransomware incidents become uninsurable?

Data in Danger Amid New IT Challenges

05/21/2021
Survey finds new threats due to the pandemic make managing enterprise cyber-risk even more challenging.

FBI Issues Conti Ransomware Alert as Attacks Target Healthcare

05/21/2021
Officials have identified at least 16 Conti ransomware attacks targeting US healthcare and first responder networks.

Cloud Security Blind Spots: Where They Are and How to Protect Them

05/21/2021
Security experts discuss oft-neglected areas of cloud security and offer guidance to businesses working to strengthen their security posture.

The Edge Poll: Moving On

05/21/2021
During the stresses of the pandemic, did you ever consider quitting security?

The Changing Face of Cybersecurity Awareness

05/21/2021
In the two decades since cybersecurity awareness programs emerged, they've been transformed from a good idea to a business imperative.

Dev-Sec Disconnect Undermines Secure Coding Efforts

05/20/2021
Rather than continue to complain about each other, developers and security pros need to work together and celebrate their successes.

Lack of Skills, Maturity Hamper Threat Hunting at Many Organizations

05/20/2021
When implemented correctly, threat hunting can help organizations stay head of threats, researcher says at RSA Conference.

Don't Let Scary Headlines Shape Your Company's Cyber-Resilience Strategy

05/20/2021
Resilience planning should be based on data and backed by technology, cybersecurity pros agreed at this week's RSA Conference.

Maricopa County CISO: Online Misinformation/Disinformation in 2020 Election a 'Gamechanger'

05/20/2021
Custom playbooks played a key role in the Arizona election jurisdiction's security strategy.

100M Users' Data Exposed via Third-Party Cloud Misconfigurations

05/20/2021
Researchers who examined 23 Android apps report developers potentially exposed the data of more than 100 million people.

Security Providers Describe New Solutions (& Growing Threats) at RSAC

05/20/2021
SPONSORED CONTENT: Watch now -- Leading security companies meet Dark Reading in the RSA Conference Broadcast Alley to talk about tackling insider threat, SOC complexity, cyber resilience, mobile security, attacker evasion, supply chain threats, ransomware, and more.

Cost Savings, Better Security Drive Adoption of Emerging Technologies

05/20/2021
However, senior technology managers express concerns about whether their current infrastructure can properly safeguard them.

3 Ways Anti-Vaxxers Will Undercut Security With Misinformation

05/20/2021
Misinformation campaigns thrive on inequality of knowledge, which bad actors use to drive a wedge between communities.

How 2 New Executive Orders May Reshape Cybersecurity & Supply Chains for a Post-Pandemic World

05/20/2021
A modernized US technology strategy must account for the growing ideological divide between authoritarians and democracies over the use of cyber and emerging technologies.

Cobalt Strike Becomes a Preferred Hacking Tool by Cybercrime, APT Groups

05/19/2021
Incident response cases and research show how the red-team tool has become a become a go-to for attackers.