Dark Reading

RCS Secure Catches Its Next Big Wave

10/19/2022
Cybersecurity company RCS Secure announces round of Series A funding and name change as it rebrands to Third Wave Innovations.

China-Linked Cyber-Espionage Team Homes In on Hong Kong Government Orgs

10/19/2022
The Winnti APT was spotted dropping several variants of Spyder Loader and other malware as part of the so-called Operation Cuckoobees.

GitGuardian Extends Code Security Platform, Adding Infrastructure-as-Code Scanning for Security Misconfigurations

10/19/2022
The extension allows cloud security teams to protect their organization's infrastructure at the source and collaborate with developers.

Patching-as-a-Service Offers Benefits, Challenges

10/18/2022
Organizations without the time or talent to patch may find patching-as-a-service to be a way to improve security.

What Is the Difference Between Identity Verification and Authentication?

10/18/2022
Identity verification and identity authentication are neither synonymous nor interchangeable, and implementing both is essential to fighting fraud.

Gen Z, Millennial Workers Are Bigger Cybersecurity Risks Than Older Employees

10/18/2022
Younger workers surveyed are less likely to follow established business cybersecurity protocols than their Gen X and baby boomer counterparts, a new survey finds.

German Cybersecurity Boss Sacked Over Kremlin Connection

10/18/2022
Head of German national cybersecurity agency was fired over ties to a member of Russian intelligence once honored by Vladimir Putin.

Treat Essential Security Certificates as Valuable Assets

10/18/2022
Manage the company's often-overlooked security certificates as the valuable assets they are, essential for security hygiene and to prevent issues.

Phishing Mitigation Can Cost Businesses More Than $1M Annually

10/18/2022
One of the oldest tactics in cybercrime is still one of the most widely feared — and with good reason, as campaigns are expected to increase and become more sophisticated over the next 12 months.

AutoRABIT Accelerates Release Management Processes with Automation and Key Integrations

10/18/2022
Improving the flow of clean, safe code with heightened visibility and automation.

CISA Offers Free RedEye Analytics Tool for Red Teams

10/18/2022
The tool helps red teams manage their activities, analyze the data from their campaigns, create reports, and better present results to organizations.

Shared Responsibility or Shared Fate? Decentralized IT Means We Are All Cyber Defenders

10/18/2022
With the IT universe expanding, collaboration, thoughtfulness, and discipline can ensure a more secure future.

Mastercard To Bring Crypto Trading Capabilities To Banks

10/18/2022
New Crypto Source program extends Mastercard’s safe, secure, and trusted services.

Researchers Keep a Wary Eye on Critical New Vulnerability in Apache Commons Text

10/17/2022
There's nothing yet to suggest CVE-2022-42889 is the next Log4j. But proof-of-concept code is available, and interest appears to be ticking up.

Cybersecurity's Hiring Spree Requires a Recruiting Rethink

10/17/2022
Just 65 cybersecurity professionals are in the workforce for every 100 available jobs, new study shows.

The Risk of Stateful Anti-Patterns in Enterprise Internet Architecture

10/17/2022
Excessive statefulness hurts the ability to scale networks, applications, and ancillary supporting infrastructure, thus affecting an entire service delivery chain's ability to withstand a DDoS attack.

Signal to Ditch SMS/MMS Messaging on Android

10/17/2022
Main driver for the change: "Plaintext SMS messages are inherently insecure."

Tactics Tie Ransom Cartel Group to Defunct REvil Ransomware

10/17/2022
Ransom Cartel ransomware-as-a-service operator blog claims to offer a new and improved version of REvil ransomware.

New Research Report Predicts Blockchain and Quantum Threat Will Quickly Spread Beyond Cybercurrencies; Surge in New Prod

10/17/2022
Research report identifies the challenges as well as the opportunities for new products and services that arise from the threat that quantum computers pose to the "blockchain" mechanism.

What Fast-Talkers Can Teach Us About Vetting Vendors

10/17/2022
Here's how to differentiate vendors that can back up their words with solutions and those that cannot.