Dark Reading

Contrast Security Launches Expanded Security Testing Tools for JavaScript and Popular Angular, React, and jQuery Framewo

10/06/2022
New language and framework support empowers developers to analyze front-end code for vulnerabilities throughout the development lifecycle.

Relentless Russian Cyberattacks on Ukraine Raise Important Policy Questions

10/05/2022
Microsoft cybersecurity executive John Hewie explained cyberwar developments and what they mean for Western democratic policy going forward.

Ikea Smart Light System Flaw Lets Attackers Turn Bulbs on Full Blast

10/05/2022
With just one malformed Zigbee frame, attackers could take over certain Ikea smart lightbulbs, leaving users unable to turn the lights down.

CISA: Multiple APT Groups Infiltrate Defense Organization

10/05/2022
Advanced attackers gained access to Microsoft Exchange services, conducted searches of email, and used an open source toolkit to collect data from the network for nearly a year.

Secure Your Application Layer, Secure Your Business

10/05/2022
Users and malicious actors interact with your business through the application layer. Build trust in your software by securing this first line of defense.

NullMixer Dropper Delivers a Multimalware Code Bomb

10/05/2022
In one shot, Trojan dropper NullMixer installs a suite of downloaders, banking Trojans, stealers, and spyware on victims' systems.

Giving Away the Keys to Your Backups? Here’s How to Keep Out Hackers

10/05/2022
As threat actors' sophistication has grown dramatically in the last few years, organizations haven't kept up with implementing the necessary countermeasure controls.

NetSPI Raises $410 Million in Growth Funding from KKR

10/05/2022
New investment to fuel the offensive security leader's record-breaking growth and innovation pipeline.

7 Practical Considerations for Effective Threat Intelligence

10/05/2022
If your security team is considering, planning, building, or operating a threat intelligence capability, this advice can help.

Why Don't CISOs Trust Their Employees?

10/05/2022
Executives fear "malicious insiders" as top cyber threat to companies, research shows. Reasonable steps to secure and monitor systems may prevent reputational damage but are not enough.

RatMilad Spyware Scurries onto Enterprise Android Phones

10/05/2022
A novel mobile malware found lurking behind a phone-spoofing app is being distributed via Telegram and a dedicated website, in a broad operation to monitor corporate victims.

The Insecurities of Cybersecurity Success

10/04/2022
Becoming a big wheel doesn't have to cost your happiness, but grind culture makes that likely.

Exposure Management? Understanding the Attacker Takes Center Stage

10/04/2022
Announcing its exposure management platform, Tenable joins other companies in offering ways — such as attack surface management — to look at business networks through the eyes of attackers.

Microsoft Updates Mitigation for Exchange Server Zero-Days

10/04/2022
Researchers had discovered that Microsoft's original mitigation steps for the so-called "ProxyNotShell" flaws was easily bypassed.

5 Attack Elements Every Organizations Should Be Monitoring

10/04/2022
Security teams have to protect an increasingly complex enterprise environment. Here are five elements of attack surface management they should consider.

Aussie Telco Telstra Breached, Reportedly Exposing 30,000 Employees' Data

10/04/2022
The Telstra cyber incident comes just weeks after its main rival Optus suffered a major compromise of its customer database.

Former NSA Employee Faces Death Penalty for Selling Secrets

10/04/2022
Suspect allegedly thought he was swapping secrets with a foreign government for crypto — but the contact turned out to be an FBI agent.

Workforce Data Privacy in the Modern Work Era

10/04/2022
It takes culture as well as individual and corporate responsibilities to ensure workforce data privacy and compliance.

Steam Gaming Phish Showcases Browser-in-Browser Threat

10/04/2022
Attackers are using the recently emerged browser-in-the-browser phishing technique to steal accounts from Valve's popular gaming platform, but it's a warning shot to businesses.

More Than 30% of All Malicious Attacks Target Shadow APIs

10/04/2022
New research spotlights how attackers are capitalizing on API-driven innovation.