Dark Reading

Researchers Learn From Nation-State Attackers' OpSec Mistakes

07/06/2021
Security researchers discuss how a series of simple and consistent mistakes helped them learn more about ITG18, better known as Charming Kitten.

Workers Careless in Sharing & Reusing Corporate Secrets

07/06/2021
A new survey shows leaked enterprise secrets costs companies millions of dollars each year.

It's High Time for a Security Scoring System for Applications and Open Source Libraries

07/06/2021
A benchmarking system would help buyers choose more secure software products and, more importantly, light a fire underneath software producers to make products secure.

Alleged Cybercriminal Arrested in Morocco Following Interpol Probe

07/06/2021
The suspect operated under the name "Dr Hex" to target thousands of people through phishing, fraud, and carding activities.

Cyberattack on Kaseya Nets More Than 1,000 Victims, $70M Ransom Demand

07/06/2021
The provider of remote monitoring and management services warns customers to not run its software until a patch is available and manually installed.

8 Ways to Preserve Legal Privilege After a Cybersecurity Incident

07/06/2021
Knowing your legal distinctions can make defense easier should you end up in court after a breach, attack, or data loss.

Watch for Cybersecurity Games at the Tokyo Olympics

07/05/2021
The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications.

Barracuda Agrees to Acquire Skout Cybersecurity

07/02/2021
The acquisition will bring Barracuda into the extended detection and response (XDR) market with a tool for managed service providers.

Secured-Core PCs May Mitigate Firmware Attacks, but Adoption Lags

07/02/2021
Microsoft maintains that exploitation of recent Dell vulnerabilities would be blocked on ultra-secure PCs - but most systems do not have the technology yet.

Microsoft Issues New CVE for 'PrintNightmare' Flaw

07/02/2021
Company says remote code execution issue in all Windows versions is different from one in Windows Print Spooler that it had patched last month, though both affect same function.

SOC Investment Improves Detection and Response Times, Data Shows

07/02/2021
A survey of IT and security pros finds many are confident in their ability to detect security incidents in near-real time or within minutes.

5 Mistakes That Impact a Security Team's Success

07/02/2021
The way we work and treat each other go a long way in improving our organizations' security posture.

WFH: A Smart Time to Revisit Employee Use of Social Media

07/02/2021
Employers have their hands full when it comes to monitoring online activities that could hurt the brand or violate the organization's core values.

GitHub Unveils AI Tool to Speed Development, but Beware Insecure Code

07/01/2021
The company has created an AI system, dubbed Copilot, to offer code suggestions to developers, but warns that any code produced should be tested for defects and vulnerabilities.

CISA Urges Orgs to Disable Windows Print Spooler on Critical Systems

07/01/2021
Patches Microsoft issued last month not effective against exploits targeting "PrintNightmare" flaw, agency and others say.

WhiteHat Security Rebrands as NTT Application Security

07/01/2021
The name change follows NTT Security Corporation's acquisition of WhiteHat in 2019.

Name That Edge Toon: Security Grill

07/01/2021
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

CISA Updates CSET Tool for Ransomware Defense

07/01/2021
A new module provides a set of practices to help organizations assess how well-equipped they are to defend and recover from ransomware.

NSA & CISA Issue Warning About Russian GRU Brute-Force Cyberattacks Against US, Global Orgs

07/01/2021
Fancy Bear nation-state hacking team add a modern twist on old-school hacking method by using a cluster of Kubernetes software containers to expedite credential theft.

Why Are There Never Enough Logs During An Incident Response?

07/01/2021
Most security pros believe their responses could be dramatically quicker were the right logs available, and usually they're not.