Dark Reading

School Is in Session: 5 Lessons for Future Cybersecurity Pros

10/06/2022
Opportunities in the field continue to grow — and show no signs of slowing down.

7 IoT Devices That Make Security Pros Cringe

10/06/2022
A look at everything from truly dumb smart devices to cool-looking IoT tech with huge cybersecurity and privacy implications.

New SonicWall Survey Data Reveals 91% of Organizations Fear Ransomware Attacks in 2022

10/06/2022
Amid an economic downturn, cybersecurity staffing shortages, and endless cyberattacks, financially motivated attacks are the top concern among IT professionals.

Research Reveals Microsoft Teams Security and Backup Flaws, With Over Half of Users Sharing Business-Critical Informatio

10/06/2022
Most backup and security vendors overlook this vital communication channel.

Contrast Security Launches Expanded Security Testing Tools for JavaScript and Popular Angular, React, and jQuery Framewo

10/06/2022
New language and framework support empowers developers to analyze front-end code for vulnerabilities throughout the development lifecycle.

Relentless Russian Cyberattacks on Ukraine Raise Important Policy Questions

10/05/2022
Microsoft cybersecurity executive John Hewie explained cyberwar developments and what they mean for Western democratic policy going forward.

Ikea Smart Light System Flaw Lets Attackers Turn Bulbs on Full Blast

10/05/2022
With just one malformed Zigbee frame, attackers could take over certain Ikea smart lightbulbs, leaving users unable to turn the lights down.

CISA: Multiple APT Groups Infiltrate Defense Organization

10/05/2022
Advanced attackers gained access to Microsoft Exchange services, conducted searches of email, and used an open source toolkit to collect data from the network for nearly a year.

Secure Your Application Layer, Secure Your Business

10/05/2022
Users and malicious actors interact with your business through the application layer. Build trust in your software by securing this first line of defense.

NullMixer Dropper Delivers a Multimalware Code Bomb

10/05/2022
In one shot, Trojan dropper NullMixer installs a suite of downloaders, banking Trojans, stealers, and spyware on victims' systems.

Giving Away the Keys to Your Backups? Here’s How to Keep Out Hackers

10/05/2022
As threat actors' sophistication has grown dramatically in the last few years, organizations haven't kept up with implementing the necessary countermeasure controls.

NetSPI Raises $410 Million in Growth Funding from KKR

10/05/2022
New investment to fuel the offensive security leader's record-breaking growth and innovation pipeline.

7 Practical Considerations for Effective Threat Intelligence

10/05/2022
If your security team is considering, planning, building, or operating a threat intelligence capability, this advice can help.

Why Don't CISOs Trust Their Employees?

10/05/2022
Executives fear "malicious insiders" as top cyber threat to companies, research shows. Reasonable steps to secure and monitor systems may prevent reputational damage but are not enough.

RatMilad Spyware Scurries onto Enterprise Android Phones

10/05/2022
A novel mobile malware found lurking behind a phone-spoofing app is being distributed via Telegram and a dedicated website, in a broad operation to monitor corporate victims.

The Insecurities of Cybersecurity Success

10/04/2022
Becoming a big wheel doesn't have to cost your happiness, but grind culture makes that likely.

Exposure Management? Understanding the Attacker Takes Center Stage

10/04/2022
Announcing its exposure management platform, Tenable joins other companies in offering ways — such as attack surface management — to look at business networks through the eyes of attackers.

Microsoft Updates Mitigation for Exchange Server Zero-Days

10/04/2022
Researchers had discovered that Microsoft's original mitigation steps for the so-called "ProxyNotShell" flaws was easily bypassed.

5 Attack Elements Every Organizations Should Be Monitoring

10/04/2022
Security teams have to protect an increasingly complex enterprise environment. Here are five elements of attack surface management they should consider.

Aussie Telco Telstra Breached, Reportedly Exposing 30,000 Employees' Data

10/04/2022
The Telstra cyber incident comes just weeks after its main rival Optus suffered a major compromise of its customer database.