Dark Reading

WhiteHat Security Rebrands as NTT Application Security

07/01/2021
The name change follows NTT Security Corporation's acquisition of WhiteHat in 2019.

Name That Edge Toon: Security Grill

07/01/2021
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

CISA Updates CSET Tool for Ransomware Defense

07/01/2021
A new module provides a set of practices to help organizations assess how well-equipped they are to defend and recover from ransomware.

NSA & CISA Issue Warning About Russian GRU Brute-Force Cyberattacks Against US, Global Orgs

07/01/2021
Fancy Bear nation-state hacking team add a modern twist on old-school hacking method by using a cluster of Kubernetes software containers to expedite credential theft.

Why Are There Never Enough Logs During An Incident Response?

07/01/2021
Most security pros believe their responses could be dramatically quicker were the right logs available, and usually they're not.

Stop Playing Catchup: Move From Reactive to Proactive to Defeat Cyber Threats

07/01/2021
One-time reactive measures can't keep up. It's time to be proactive and pick our swords and not just our shields.

SentinelOne Starts Trading on NYSE, Raises $1.2B in IPO

06/30/2021
IPO is the highest valued in cybersecurity history, according to reports.

SMB Worm Targeting EternalBlue Vuln Spreads to US

06/30/2021
"Indexsinas" is the latest threat designed to exploit Windows servers that remain vulnerable to an NSA-developed exploit Microsoft patched more than four years ago.

Impersonation Becomes Top Phishing Technique

06/30/2021
A new report finds IT, healthcare, and manufacturing are the industries most targeted by phishing emails.

MyBook Investigation Reveals Attackers Exploited Legacy, Zero-Day Vulnerabilities

06/30/2021
A previously unknown flaw in Western Digital's older network-attached storage systems allowed unauthenticated commands to trigger a factory reset, formatting the hard drives, says the company after its preliminary investigation.

Attackers Already Unleashing Malware for Apple macOS M1 Chip

06/30/2021
Apple security expert Patrick Wardle found that some macOS malware written for the new M1 processor can bypass anti-malware tools.

Intl. Law Enforcement Operation Takes Down DoubleVPN

06/30/2021
The VPN service allegedly provided a means for cybercriminals to target their victims, Europol officials report.

3 Things Every CISO Wishes You Understood

06/30/2021
Ensuring the CISO's voice is heard by the board will make security top of mind for the business, its employees, and their customers.

7 Skills the Transportation Sector Needs to Fuel Its Security Teams

06/30/2021
Without a top-notch team to stop attackers, our favorite modes of transportation could come to a screeching halt.

9 Hot Trends in Cybersecurity Mergers & Acquisitions

06/30/2021
Security experts share their observations of the past year in cybersecurity M&A, highlighting key trends and notable deals.

Is Compliance-Only Security Giving Cybercriminals Your Security Playbook?

06/30/2021
Compliance-only security strategies aren't working. CISOs should squarely focus on being secure while achieving compliance.

Google Updates Vulnerability Data Format to Support Automation

06/29/2021
The Open Source Vulnerability schema supports automated vulnerability handling in Go, Rust, Python, and Distributed Weakness Filing system, and it could be the favored format for future exporting of data.

Ransomware Losses Drive Up Cyber-Insurance Costs

06/29/2021
Premiums have gone up by 7% on average for small firms and between 10% and 40% for medium and large businesses.

CISA Publishes Catalog of Poor Security Practices

06/29/2021
Organizations often focus on promoting best practices, CISA says, but stopping poor security practices is equally important.

Survey Data Reveals Gap in Americans' Security Awareness

06/29/2021
Survey data reveals many people have never heard of major cyberattacks, including the attack targeting Colonial Pipeline.