Dark Reading
Nok Nok Labs Unveils S3 Authentication Suite
03/17/2022
Enhancements include support for OpenID Connect as an integration mechanism.
Multiple Automotive Manufacturers Infected With Emotet
03/17/2022
Telemetry from industrial systems security firm Dragos has spotted the malware command-and-control servers communicating with several automotive manufacturer systems.
Cloudflare Announces API Gateway
03/17/2022
Organizations can secure, manage, and monitor all of their APIs in one easy-to-use dashboard.
Titaniam Announces Completion of Product Suite
03/17/2022
The Titaniam Suite includes ransomware and extortion defense capabilities in the form of five products.
Glasswall Launches Freemium Version of its Desktop Content Disarm and Reconstruction App
03/17/2022
Glasswall technology offers proactive protection from file-based cybersecurity threats.
Stopping Russian Cyberattacks at Their Source
03/17/2022
Step up training with cybersecurity drills, teach how to avoid social engineering traps, share open source monitoring tools, and make multifactor authentication the default.
Cut Down on Alert Overload and Leverage Layered Security Measures
03/17/2022
Feeling overwhelmed by the number of alerts? It doesn't have to be that way.
Enhancing DLP With Natural Language Understanding for Better Email Security
03/16/2022
Natural language understanding is well-suited for scanning enterprise email to detect and filter out spam and other malicious content. Armorblox introduces a data loss prevention service to its email security platform using NLU.
How Pen Testing Gains Critical Security Buy-in and Defense Insight
03/16/2022
It's more important than ever for companies to challenge their defenses, learning about new gaps and opportunities for improvement along the way.
4 Critical Capabilities for a SaaS Security Posture Management (SSPM) Solution
03/16/2022
The need for deep visibility and remediation for SaaS security settings is critical. If you're considering a SaaS Security Posture Management solution, here’s a checklist of what to look for.
CSC Unveils 3D Domain Monitoring Solution on DomainSec Platform
03/16/2022
Continuing CSC research indicates over 70% of brand-specific domains are fake.
Microsoft the No. 1 Most-Spoofed Brand in Phishing Attacks
03/16/2022
New Barracuda Networks data shows attackers sent some 3 million emails from around 12,000 pilfered accounts.
What the Newly Signed US Cyber-Incident Law Means for Security
03/16/2022
Bipartisan cybersecurity legislation comes amid increased worries over ransomware, and fears of cyberattacks from Russia in the wake of its invasion of Ukraine.
VPNs Give Russians an End Run Around Censorship
03/16/2022
As the invasion of Ukraine continues, Russian citizens have turned to virtual private networks — boosting demand for the software by 27x — to circumvent the government's blocks on social media and news sites critical of the war.
Russia State-Sponsored Hackers Used Misconfigured MFA to Breach NGO
03/16/2022
FBI and CISA warn of attack on multifactor authentication account to exploit "PrintNightmare" exploit.
Would 'Cyber Geneva Conventions' Defuse Online Aggression?
03/16/2022
International treaties could force nation-states to police bad actors within their borders to avoid penalties.
How Should My Security Analyst Use the MITRE ATT&CK Framework?
03/16/2022
As a curated knowledgebase for adversary behavior, the MITRE ATT&CK framework can guide defenders on how to conduct an investigation and the order of things to look for.
What Kind Of Security Tools Should I Provide My Developers?
03/15/2022
Who says developers don't care about security? Give them the tools to help them build security into their code.
Private Equity Firm Snaps Up RSA Conference
03/15/2022
Crosspoint Capital Partners, along with Clearlake Capital Group and Symphony Technology Group, are setting up RSA Conference as a separate company from RSA Security.
NAS Vendor Says Several of Its Products Likely Contain Linux 'Dirty Pipe' Flaw
03/15/2022
QNAP's disclosure this week is the latest reminder of the potentially wide impact of privilege escalation flaw in the Linux kernel.
<< Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 Next >>