Dark Reading

Application & Infrastructure Risk Management: You've Been Doing It Backward

12/04/2019
Before getting more scanning tools, think about what's needed to defend your organization's environment and devise a plan to ensure all needed tools can work together productively.

TrickBot Expands in Japan Ahead of the Holidays

12/03/2019
Data indicates TrickBot operators are modifying its modules and launching widespread campaigns around the world.

When Rogue Insiders Go to the Dark Web

12/03/2019
Employees gone bad sell stolen company information, sometimes openly touting their companies, researchers say.

What Security Leaders Can Learn from Marketing

12/03/2019
Employees can no longer be pawns who must be protected all the time. They must become partners in the battle against threats.

Smith & Wesson Is Magecart's Latest Target

12/03/2019
Researchers estimate the gun manufacturer's website was compromised sometime before Black Friday.

Siemens Offers Workarounds for Newly Found PLC Vulnerability

12/03/2019
An undocumented hardware-based special access feature recently found by researchers in Siemens' S7-1200 can be used by attackers to gain control of the industrial devices.

Leveraging the Cloud for Cyber Intelligence

12/03/2019
How fusing output datasets and sharing information can create a real-time understanding of suspicious activity across your enterprise.

Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition

12/02/2019
Make your favorite security experts laugh with these affordable holiday gifts.

Sharing Is Caring

12/02/2019
Do you do any cybersecurity-related volunteer work?

Data from 21M Mixcloud Users Compromised in Breach

12/02/2019
The music streaming service received reports indicating attackers gained unauthorized access to its systems.

New: State of the Internet: Web Attacks and Gaming Abuse

12/02/2019
Attackers see credential abuse as a low-risk venture with potential for a high payout, at least for now.

SQL Injection Errors No Longer the Top Software Security Issue

11/27/2019
In newly updated Common Weakness Enumeration (CWE), SQL injection now ranks sixth.

Analysis of Jira Bug Stresses Impact of SSRF in Public Cloud

11/27/2019
More than 3,100 Jira instances are still vulnerable to a server-side request forgery vulnerability patched in August.

Google Details Its Responses to Cyber Attacks, Disinformation

11/27/2019
Government groups continue to attack user credentials and distribute disinformation according to a new blog post from Google's Threat Analysis Group.

New Free Emulator Challenges Apple's Control of iOS

11/27/2019
An open-source tool gives researchers and jailbreakers a free option for researching vulnerabilities in the operating system - and gives Apple a new headache.

How to Get Prepared for Privacy Legislation

11/27/2019
All the various pieces of legislation, both in the US and worldwide, can feel overwhelming. But getting privacy basics right is a solid foundation.

Practical Principles for Security Metrics

11/27/2019
A proactive approach to cybersecurity requires the right tools, not more tools.

How to Be a More Thoughtful & Safe Digital Citizen

11/27/2019
Don't be a Billy ... or Jennie ... or Betty.

7 Ways to Hang Up on Voice Fraud

11/27/2019
Criminals are coming at us from all direction, including our phones. Don't answer that next call without reading this tips first.

DDoS: An Underestimated Threat

11/26/2019
Distributed denial-of-service (DDoS) attacks have become more common, more powerful, and more useful to attackers. Here's how to fight back.