Dark Reading

Chinese 'RedZei' Group Batters Victims With Incessant Vishing Effort

01/03/2023
The cybercriminals switch up carriers and SIM cards regularly, making it difficult for either mobile users or telecom companies to block the barrage of malicious calls and voicemails.

Name That Edge Toon: The Upside Down

01/03/2023
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

Are Meta and Twitter Ushering in a New Age of Insider Threats?

01/03/2023
The era of digital trust is broken, and constant vigilance is needed to get things back on track.

Black Hat Flashback: The Day That Dan Kaminsky Saved the Internet

01/03/2023
Dark Reading's Kelly Jackson Higgins explains the enormous legacy left behind by Dan Kaminsky and his seminal "Great DNS Vulnerability" talk at Black Hat 2008.

API Security Is the New Black

12/30/2022
API security is so hot right now.

War and Geopolitical Conflict: The New Battleground for DDoS Attacks

12/30/2022
The effectiveness of attacks largely depends on organizations' distributed denial-of-service defenses.

Adobe, Apple, Cisco, Microsoft Flaws Make Up Half of KEV Catalog

12/30/2022
CISA’s Known Exploited Vulnerabilities Catalog has become a valuable repository of vulnerabilities to be patched. A pair of reports analyze the vulnerabilities under attack to understand the kind of threats organizations should be prioritizing.

Beyond the Obvious: The Boldest Cybersecurity Predictions for 2023

12/30/2022
Dark Reading's panel of security experts deliver a magnum of bubbly hot takes on what 2023 will look like, featuring evil AIs, WWIII, wild workplace soon-to-be-norms, and more.

6 Ways to Protect Your Organization Against LAPSUS$

12/29/2022
Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture.

3 Industries, 3 Security Programs

12/29/2022
Security leaders from a media corporation, a commercial real estate company, and an automotive technology company share how they address cyber-risk.

Extracting Encrypted Credentials From Common Tools

12/29/2022
Attackers are harvesting credentials from compromised systems. Here's how some commonly used tools can enable this.

After the Uber Breach: 3 Questions All CISOs Should Ask Themselves

12/29/2022
How CISOs handle the ethical issues around data breaches can make or break their careers. Don't wait until a breach happens to plot the course forward.

New Year's Surprise: Cybersecurity M&A, Funding Activity Snowballs in Q4

12/29/2022
Concerns about recessionary trends impacting the cybersecurity sector in 2022 remained largely unfounded in Q4, as investment activity surged after a Q3 slowdown.

Healthcare Providers and Hospitals Under Ransomware's Siege

12/28/2022
According to the FBI and Internet Crime Complaint Center, 25% of ransomware complaints involve healthcare providers.

When CISOs Are Ready to Hunt

12/28/2022
This is what happens when a CISO gets tired of reacting to attacks and goes on the offensive.

Why Cyber Pros and Forensic Accountants Should Work Together to Mitigate Security Risk

12/28/2022
It's time companies build a multilayered approach to cybersecurity.

Will the Crypto Crash Impact Cybersecurity in 2023? Maybe.

12/28/2022
Will the bottom falling out of the cryptocurrency market have a profound impact on cybercriminal tactics and business models? Experts weigh in on what to expect.

Securing and Improving User Experience for the Future of Hybrid Work

12/27/2022
Digital transformation initiatives are challenging because IT still has to make sure performance doesn't suffer by making applications available from anywhere.

How to Get the Most out of UEBA

12/27/2022
Security teams are considering how to get the most out of user entity behavioral analytics by taking advantage of its strengths and augmenting its limitations.

Why Attackers Target GitHub, and How You Can Secure It

12/27/2022
The unfettered collaboration of the GitHub model creates a security headache. Follow these seven principles to help relieve the pain.