Dark Reading

Meat Producer JBS USA Hit By Ransomware Attack

06/01/2021
The company says recovery from the attack may delay transactions with customers and suppliers.

Return to Basics: Email Security in the Post-COVID Workplace

06/01/2021
As we reimagine the post-pandemic workplace, we must also reevaluate post-pandemic email security practices.

Name That Edge Toon: In Tow

06/01/2021
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

CISO Confidence Is Rising, but Issues Remain

06/01/2021
New research reveals how global CISOs dealt with COVID-19 and their plans for 2022-2023.

Cybersecurity Group Hopes to Push 30 More National Priorities

06/01/2021
The Cyberspace Solarium Commission worked with legislators and the Trump administration to get 27 recommendations implemented in policy last year. It's aiming for 30 more in 2021.

3 SASE Misconceptions to Consider

05/31/2021
SASE is all the rage, promising things IT leaders have long dreamed about, but a purist approach may create consequences.

Chinese APT Groups Continue to Pound Away on Pulse Secure VPNs

05/28/2021
Security vendor says it has observed threat groups using a set of 16 tools specifically designed to attack Pulse Secure devices since April 2020.

Chart: Cloud Concerns

05/28/2021
As more organizations make their way to the cloud, their eyes are wide open to the associated cybersecurity risks that tag along for the ride.

Modern SOCs a 'Painful' Challenge Amid Growing Complexity: Report

05/28/2021
A new study examines the tools and technologies driving investment and activities for security operations centers.

SolarWinds Attackers Impersonate USAID in Advanced Email Campaign

05/28/2021
Microsoft shares the details of a wide-scale malicious email campaign attributed to Nobelium, the group linked to the SolarWinds supply chain attack.

A Wrench and a Screwdriver: Critical Infrastructure's Last, Best Lines of Defense?

05/28/2021
Critical infrastructure's cybersecurity problems are complex, deep-rooted, and daunting. Addressing them won't be easy...but it isn't impossible.

Siemens Patches Major PLC Flaw that Bypasses Its 'Sandbox' Protection

05/28/2021
Researchers from Claroty today detailed the memory vuln they discovered in Siemens SIMATIC S7-1200 and S7-1500 PLCs.

Plug-ins for Code Editors Pose Developer-Security Threat

05/28/2021
There are two critical vulnerabilities in plug-ins for the popular Visual Studio Code editor, now patched, but security firm Snyk warns that popular plug-ins could put development environments in jeopardy.

Most Mobile Apps Can Be Compromised in 15 Minutes or Less

05/28/2021
In the name of releasing apps quickly and delivering a smooth user experience, mobile app security is often given short shrift.

'Have I Been Pwned' Code Base Now Open Source

05/27/2021
Founder Troy Hunt also announces the platform will receive compromised passwords the FBI finds in its investigations.

BazaLoader Attackers Create Fake Movie Streaming Site to Trick Victims

05/27/2021
The BazaLoader infection chain includes a live call center and "customer service" from criminals, researchers report.

Acronis: Pandemic Hastened Cloud Migration, Prompting New Security Issues

05/27/2021
SPONSORED: WATCH NOW -- The COVID-19 pandemic has accelerated an ongoing shift in data away from business data centers to home offices and the cloud, explains Candid Wuest, VP of cyber protection research for Acronis.

Let's Stop Blaming Employees for Our Data Breaches

05/27/2021
Assuming employees want to steal trade secrets pits them against your security teams, creates stress and reduces productivity.

DHS Orders Pipeline Operators to Report Cyberattacks, Review Security Posture

05/27/2021
On the heels of the Colonial Pipeline attack, the US Department of Homeland Security aims to force a reticent industry to improve its ability to detect and respond to cybersecurity attacks.

How Menlo Uses Isolation to Secure Mobile Devices in the Cloud

05/27/2021
SPONSORED: WATCH NOW -- Mobile devices like smartphones and tablets have emerged as popular targets for bad actors looking to break into to cloud-based networks, according to Poornima DeBolle, chief product officer for Menlo Security.