Dark Reading
Quantifying the SaaS Supply Chain and Its Risks
06/14/2022
Organizations do not have good visibility into all the software-as-a-service applications that connect to and access data stored in core business.
Incognia Introduces Location-Based Liveness Spoofing Detection Solution
06/14/2022
Mobile apps that rely on facial recognition for identity proofing can now detect fraudulent attempts to fake liveness.
Google: SBOMs Effective Only if They Map to Known Vulns
06/14/2022
SBOMs should be connected with vulnerability databases to fulfill their promise of reducing risk, Google security team says.
Chinese Threat Actor Employs Fake Removable Devices as Lures in Cyber-Espionage Campaign
06/14/2022
"Aoqin Dragon" has been operating since at least 2013, with targets including government and telecommunications companies in multiple countries.
How Can Security Partnerships Help to Mitigate the Increasing Cyber Threat?
06/14/2022
Martyn Ryder from Morphean explains why forging trusted partnerships is integral to the future of physical security in a world of networks, systems, and the cloud.
Optiv MXDR Enhances Detection Coverage With Expanded Cloud Integration
06/14/2022
Service ingests AWS, GCP and Microsoft Azure data.
Beware the 'Secret Agent' Cloud Middleware
06/14/2022
New open source database details the software that cloud service providers typically silently install on enterprises' virtual machines — often unbeknownst to customers.
Understanding and Mitigating Single Sign-on Risk
06/14/2022
SSO's one-to-many architecture is both a big advantage and a weakness.
Corel Acquires Awingu
06/13/2022
The combination of Awingu and the Parallels Remote Application Server platform will enable end users to securely work from anywhere, at any time, on any device, or OS.
CISA Recommends Organizations Update to the Latest Version of Google Chrome
06/13/2022
Google last week reported seven vulnerabilities in the browser, four of which it rated as high severity.
Kaiser Permanente Breach Exposes Data on 70K Patients
06/13/2022
Employee email compromise potentially exposed patients' medical information, including lab test results and dates of services.
Exposed Travis CI API Leaves All Free-Tier Users Open to Attack
06/13/2022
Public Travis CI logs loaded with GitHub, AWS, Docker Hub account tokens, and other sensitive data could be leveraged for lateral cloud attacks.
In Security, Less Is More
06/13/2022
Cut away everything that costs more attention, storage, or time than its impact is worth.
Tony Jarvis on Shifting Security Gears as We Move to the Cloud
06/13/2022
In this new episode of Tech Talks, Darktrace's Tony Jarvis and Dark Reading's Terry Sweeney discuss how to protect networks after the death of the perimeter.
3 Big Takeaways From the Verizon DBIR 2022
06/13/2022
The annual report is always filled with useful security information. Here are several of the most important lessons from this year's edition.
DoS Vulnerability Allows Easy Envoy Proxy Crashes
06/13/2022
The DoS vulnerability allows an attacker to create a Brotli "zip bomb," resulting in acute performance issues on Envoy proxy servers.
Security Leaders Discuss Industry Drivers at Dark Reading's News Desk at RSAC 2022
06/12/2022
Tune into Dark Reading's News Desk interviews with the industry’s leaders, discussing news and hot topics, such as this year’s "Transofrm" theme, at RSA Conference 2022 in San Francisco
CrowdStrike Introduces Humio for Falcon, Redefining Threat Hunting with Unparalleled Scale and Speed
06/10/2022
Humio for Falcon provides long-term, cost-effective data retention with powerful index-free search and analysis of enriched security telemetry across enterprise environments
Symbiote Malware Poses Stealthy, Linux-Based Threat to Financial Industry
06/10/2022
A Linux-based banking Trojan is a master at staying under the radar.
CrowdStrike Introduces CrowdStrike Asset Graph to Help Organizations Proactively Identify and Eliminate Blind Spots
06/10/2022
CrowdStrike Asset Graph provides unprecedented visibility of assets in an IT environment to optimize cyber defense strategies and manage risk.
<< Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 Next >>