Dark Reading

The Playbook for Human-Operated Ransomware

10/13/2022
Ransomware attacks are on the rise, but organizations also have access to advanced tools and technologies they can use to fight back.

What You Need for a Strong Security Posture

10/13/2022
From the basics to advanced techniques, here's what you should know.

Cyberattackers Spoof Google Translate in Unique Phishing Tactic

10/13/2022
The campaign uses a combination of tactics and a common JavaScript obfuscation technique to fool both end users and email security scanners to steal credentials.

State of Security Data Management 2022 Report Reveals Overconfidence Masks a Pervasive Data Problem

10/13/2022
Despite dozens of tools and external vendors, 2 in 3 organizations believe their data strategy isn't sustainable beyond three years, which could leave businesses vulnerable.

Attackers Use Automation to Speed from Exploit to Compromise According to Lacework Labs Cloud Threat Report

10/13/2022
New open source Cloud Hunter tool, developed through Lacework Labs research, helps customers get better visibility to reduce response times for incident investigations.

What the Uber Breach Verdict Means for CISOs in the US

10/13/2022
Can already beleaguered CISOs now add possible legal charges to their smorgasbord of job considerations? Disclose a breach to comply and face dismissal, or cover it up and face personal punishment.

Thoma Bravo to Acquire ForgeRock in $2.3B Deal

10/12/2022
This marks the third identity and access management (IAM) company acquired by Thoma Bravo in just the past few months.

WhatsApp Users Beware: Dangerous Mobile Trojan Being Distributed via Malicious Mod

10/12/2022
Among other things, users who download the app could end up having their WhatsApp account details stolen.

KnowBe4 to Be Acquired for $4.6B by Private Equity Firm Vista

10/12/2022
Vista Equity Partners plans take the publicly traded security-awareness training vendor private.

Airborne Drones Are Dropping Cyber-Spy Exploits in the Wild

10/12/2022
Drone-based cyberattacks to spy on corporate targets are no longer hypothetical, one incident from this summer shows.

Key Takeaways From Omdia's IGA Market Radar

10/12/2022
Identity governance administration (IGA) started life as a tool for organizations to meet a sudden surge of legal and regulatory requirements, but´╗┐ it has grown into a key enabler of security.

Cyolo Receives Investment from IBM Ventures for Zero Trust Secure Access Platform

10/12/2022
The investment by IBM Ventures enables further collaboration to accelerate the adoption of modernized, identity-based connectivity for today's digital organizations.

Android Leaks Wi-Fi Traffic Even When VPN Protection Features Are On

10/12/2022
The platform lets network connectivity data escape outside of the secure tunnel when connected to a public network, posing a "privacy concern" for users with "certain threat models," researchers said.

E-Commerce Losses to Online Payment Fraud to Exceed $48B Globally in 2023, as Fraud Incursions Evolve

10/12/2022
Study estimates a 16% growth in e-commerce fraud losses in just 12 months.

5 Signs That It's Time to Invest in Data Loss Prevention

10/12/2022
Automation means more attacks. It also means smarter, easier-to-implement prevention techniques. Here are five signs it is time to put your own data loss prevention strategy into place.

Beachhead Solutions Adds Windows Security Management to the BeachheadSecure® Platform

10/12/2022
Included at no added cost, BeachheadSecure now provides accountwide management of Microsoft Defender AV, Firewall, and Controlled Folders for the most complete PC and device security available.

Refund Fraud-as-a-Service Ads on Hacker Forums Increase by 60%

10/12/2022
Research from Netacea reveals that as of September 2022, there are over 1,600 professional refund service adverts on hacker forums.

Vectra Advances Security AI to Deliver Attack Signal Intelligence™, Empowering Security Teams to Investigate and Respo

10/12/2022
Security AI-driven Attack Signal Intelligence automates cyber threat detection, triage, and prioritization across public cloud, SaaS, identity and networks.

Cloud Data Breaches Are Running Rampant. What Are the Common Characteristics?

10/12/2022
Protecting against data breaches requires detailed analysis of recent attacks for remediation and prevention.

2 Out of 3 Companies See Zero Trust Network Access as Key to Mitigate Work-From-Anywhere Risks, According to New EMA Rep

10/12/2022
Report also shows that cloud-based solutions minimize complexity to enable easy adoption by small to midsize businesses.