Dark Reading

Tulsa Deals With Aftermath of Ransomware Attack

05/10/2021
Weekend attack shuts down several city sites and service.

Four Plead Guilty to RICO Conspiracy Involving Hosting Services for Cybercrime

05/10/2021
The "bulletproof hosting" organization hosted malware including Zeus, SpyEye, Citadel, and the Blackhole Exploit Kit.

10 Security Awareness Training Mistakes to Avoid

05/10/2021
Give your cybersecurity culture a boost by adding these to the "don't" column of your cybersecurity awareness training do's and don'ts list.

Exchange Exploitation: Not Dead Yet

05/10/2021
The mass exploitation of Exchange Servers has been a wake-up call, and it will take all parties playing in concert for the industry to react, respond, and recover.

How North Korean APT Kimsuky Is Evolving Its Tactics

05/07/2021
Researchers find differences in Kimsuky's operations that lead them to divide the APT into two groups: CloudDragon and KimDragon.

Most Organizations Feel More Vulnerable to Breaches Amid Pandemic

05/07/2021
More than half of business see the need for significant long-term changes to IT due to COVID-19, research finds.

FBI, NSA, CISA & NCSC Issue Joint Advisory on Russian SVR Activity

05/07/2021
The report provides additional details on tactics of Russia's Foreign Intelligence Service following public attribution of the group to last year's SolarWinds attack.

The Edge Pro Quote: Password Empowerment

05/07/2021
Despite being a pain in the neck, passwords may hold a psychological purpose that security pros should take into account.

Defending Against Web Scraping Attacks

05/07/2021
Web scraping attacks, like Facebook's recent data leak, can easily lead to more significant breaches.

11 Reasons Why You Sorta Love Passwords

05/07/2021
We asked you to tell the truth about why you secretly love passwords. From the heartfelt to the hilarious, here's what you had to say.

Troy Hunt: Organizations Make Security Choices Tough for Users

05/06/2021
The Have I Been Pwned founder took the virtual stage at Black Hat Asia to share stories about his work and industrywide challenges.

Google Plans to Automatically Enable Two-Factor Authentication

05/06/2021
The company plans to automatically enroll users in two-step verification if their accounts are properly configured.

CISA Publishes Analysis on New 'FiveHands' Ransomware

05/06/2021
Attackers used publicly available tools, FiveHands ransomware, and SombRAT to successfully target an organization, officials report.

Cloud-Native Businesses Struggle with Security

05/06/2021
More companies moved to cloud-native infrastructure in the past year, and security incidents and malware moved right along with them.

Securing the Internet of Things in the Age of Quantum Computing

05/06/2021
Internet security, privacy, and authentication aren't new issues, but IoT presents unique security challenges.

Biden's Supply Chain Initiative Depends on Cybersecurity Insights

05/06/2021
Those helming the US supply chain executive order need to leverage standards, measurement, and the lessons cybersecurity leaders have learned.

How to Move Beyond Passwords and Basic MFA

05/06/2021
It's not a question of whether passwordless is coming -- it's simply a question of when. How should your organization prepare? (Part two of a two-part series.)

Black Hat Asia Speakers Share Secrets About Sandboxes, Smart Doors, and Security

05/06/2021
Find video interviews with some of the coolest Black Hat Asia experts right here, as part of the Dark Reading News Desk this week.

Attackers Seek New Strategies to Improve Macros' Effectiveness

05/05/2021
The ubiquity of Microsoft Office document formats means attackers will continue to use them to spread malware and infect systems.

Gap Between Security and Networking Teams May Hinder Tech Projects

05/05/2021
Professionals in each field describe a poor working relationship between the two teams