Dark Reading

Healthcare Providers and Hospitals Under Ransomware's Siege

12/28/2022
According to the FBI and Internet Crime Complaint Center, 25% of ransomware complaints involve healthcare providers.

When CISOs Are Ready to Hunt

12/28/2022
This is what happens when a CISO gets tired of reacting to attacks and goes on the offensive.

Why Cyber Pros and Forensic Accountants Should Work Together to Mitigate Security Risk

12/28/2022
It's time companies build a multilayered approach to cybersecurity.

Will the Crypto Crash Impact Cybersecurity in 2023? Maybe.

12/28/2022
Will the bottom falling out of the cryptocurrency market have a profound impact on cybercriminal tactics and business models? Experts weigh in on what to expect.

Securing and Improving User Experience for the Future of Hybrid Work

12/27/2022
Digital transformation initiatives are challenging because IT still has to make sure performance doesn't suffer by making applications available from anywhere.

How to Get the Most out of UEBA

12/27/2022
Security teams are considering how to get the most out of user entity behavioral analytics by taking advantage of its strengths and augmenting its limitations.

Why Attackers Target GitHub, and How You Can Secure It

12/27/2022
The unfettered collaboration of the GitHub model creates a security headache. Follow these seven principles to help relieve the pain.

The Threat of Predictive Policing to Data Privacy and Personal Liberty

12/27/2022
Inaccurate information from data brokers can damage careers and reputations. It's time for US privacy laws to change how law enforcement and legal agencies obtain and act on data.

Internet AppSec Remains Abysmal & Requires Sustained Action in 2023

12/27/2022
A variety of initiatives — such as memory-safe languages and software bills of materials — promise more secure applications, but sustained improvements will require that vendors do much better, researchers agree.

Container Verification Bug Allows Malicious Images to Cloud Up Kubernetes

12/23/2022
A complete bypass of the Kyverno security mechanism for container image imports allows cyberattackers to completely take over a Kubernetes pod to steal data and inject malware.

LastPass Cops to Massive Breach Including Customer Vault Data

12/23/2022
The follow-on attack from August's source-code breach could fuel future campaigns against LastPass customers.

Videoconferencing Worries Grow, With SMBs in Cyberattack Crosshairs

12/23/2022
Securing videoconferencing solutions is just one of many IT security challenges small businesses are facing, often with limited financial and human resources.

Google: With Cloud Comes APIs & Security Headaches

12/23/2022
APIs are key to cloud transformation, but two Google surveys find that cyberattacks targeting them are reaching a tipping point, even as general cloud security issues abound.

Fool Me Thrice? How to Avoid Double and Triple Ransomware Extortion

12/23/2022
To stay safer, restrict access to data, monitor for breaches in the supply chain, track relevant data that is sold on the Dark Web, and implement best safety practices.

Security Is a Second-Class Citizen in High-Performance Computing

12/22/2022
Vendors and operators attempt to balance power and security, but right now, power is the highest goal.

What Kind of Data Gets Stolen When a Developer is Compromised?

12/22/2022
What is the worst that can happen when a developer's machine is compromised? Depending on the developer's position, attackers gain access to nearly everything: SSH keys, credentials, access to CI/CD pipelines and production infrastructure, the works.

New Brand of Security Threats Surface in the Cloud

12/22/2022
Tech Insight report co-produced by Black Hat, Dark Reading, and Omdia examines how cloud security is evolving in a rapid race to beat threat actors to the (cloud) breach.

Inside The Next-Level Fraud Ring Scamming Billions Off Holiday Retailers

12/22/2022
"Largest attack of its kind": A potent Southeast Asian e-commerce fraud ring has declared war on US retailers, targeting billions in goods in just the past month and forcing mules into its scheme.

Biden Signs Post-Quantum Cybersecurity Guidelines Into Law

12/22/2022
The new law holds the US Office of Budget and Management to a road map for transitioning federal systems to NIST-approved PQC.

Security on a Shoestring? Cloud, Consolidation Best Bets for Businesses

12/22/2022
With a recession potentially coming, some companies are cutting security teams. But moving more infrastructure to the cloud and reducing the number of vendors through consolidation may be the best ways to prepare.