Dark Reading

Is an Attacker Living Off Your Land?

06/16/2021
Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.

Keeping Your Organization Secure When Dealing With the Unexpected

06/16/2021
There's no way to anticipate every possible scenario, but the right approach to business continuity can help you respond effectively in any situation.

Don't Get Stymied by Security Indecision

06/16/2021
You might be increasing cyber-risk by not actively working to reduce it.

Thousands of VMware vCenter Servers Remain Open to Attack Over the Internet

06/15/2021
Three weeks after company disclosed two critical vulnerabilities in the workload management utility, many organizations have not patched the technology yet, security vendor says.

Microsoft Disrupts Large-Scale BEC Campaign Across Web Services

06/15/2021
Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.

Security Experts Scrutinize Apple, Amazon IoT Networks

06/15/2021
Both companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices worries some security researchers.

Andariel Group Targets South Korean Entities in New Campaign

06/15/2021
Andariel, designated as a sub-group of the Lazarus Group APT, has historically targeted South Korean organzations.

Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities

06/15/2021
Terbium Labs' products and services will become part of Deloitte's Detect & Respond lineup, the company confirms.

What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain

06/15/2021
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.

How President Biden Can Better Defend the US From Russian Hacks

06/15/2021
Wilson Center cybersecurity expert Meg King pinpoints five ambitious steps the administration should take, including a comprehensive national data breach notification protocol.

How Does the Government Buy Its Cybersecurity?

06/15/2021
The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.

VPN Attacks Surged in First Quarter

06/14/2021
But volume of malware, botnet, and other exploit activity declined because of the Emotet botnet takedown.

Cyber Analytics Database Exposed 5 Billion Records Online

06/14/2021
In an ironic twist, Cognyte's data alerts customers to third-party data exposures.

Google Workspace Adds Client-Side Encryption

06/14/2021
Users given control over encryption keys, Google says.

New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'

06/14/2021
Best practices guide encompasses integrity, hardening, resilience, and monitoring of PLCs in industrial networks.

Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work

06/14/2021
We lack reliable, representative, actionable data about ransomware's actual scope, scale, and impact. The Ransom Incident Response Network could change that.

Name That Toon: Sight Unseen

06/14/2021
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

Colonial Pipeline Cyberattack Proves a Single Password Isn't Enough

06/14/2021
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar -- but a focus on credentials is vital.

Trickbot Investigation Shows Details of Massive Cybercrime Effort

06/11/2021
Nearly a score of cybercriminals allegedly worked together to create the Trickbot malware and deploy it against more than a million users, an unsealed indictment claims.

McDonald's Data Breach Exposed Business & Customer Data

06/11/2021
An investigation has revealed company data has been breached in the United States, South Korea, and Taiwan.