Dark Reading

We Have the Tech to Scale Up Open Source Vulnerability Fixes — Now It's Time to Leverage It

08/08/2022
Q&A with Jonathan Leitschuh, inaugural HUMAN Dan Kaminsky Fellow, in advance of his upcoming Black Hat USA presentation.

What Adjustable Dumbbells Can Teach Us About Risk Management

08/08/2022
A new workout leads to five smart lessons about the importance of converging security and fraud into a unified risk function.

Pipeline Operators Are Headed in the Right Direction, With or Without TSA's Updated Security Directives

08/08/2022
A worsening threat landscape, increased digitization, and the long-term positive effects of modern security strategies are pushing critical infrastructure operators to do better.

What Worries Security Teams About the Cloud?

08/05/2022
What issues are cybersecurity professionals concerned about in 2022? You tell us!

Genesis IAB Market Brings Polish to the Dark Web

08/05/2022
As the market for initial access brokers matures, services like Genesis — which offers elite access to compromised systems and slick, professional services — are raising the bar in the underground economy.

A Ransomware Explosion Fosters Thriving Dark Web Ecosystem

08/05/2022
For the right price, threat actors can get just about anything they want to launch a ransomware attack — even without technical skills or any previous experience.

Stolen Data Gives Attackers Advantage Against Text-Based 2FA

08/05/2022
With names, email addresses, and mobile numbers from underground databases, one person in five is at risk of account compromise even with SMS two-factor authentication in place.

Fresh RapperBot Malware Variant Brute-Forces Its Way Into SSH Servers

08/05/2022
Over the past few weeks, a Mirai variant appears to have made a pivot from infecting new servers to maintaining remote access.

How to Resolve Permission Issues in CI/CD Pipelines

08/05/2022
This Tech Tip outlines how DevOps teams can address security integration issues in their CI/CD pipelines.

A Digital Home Has Many Open Doors

08/05/2022
Development of digital gateways to protect the places where we live, work, and converse need to be secure and many doors need to offer restricted access.

Dark Reading News Desk: Live at Black Hat USA 2022

08/05/2022
Coming soon: Dark Reading News Desk at Black Hat USA 2022

Cyberattackers Increasingly Target Cloud IAM as a Weak Link

08/04/2022
At Black Hat USA, Igal Gofman plans to address how machine identities in the cloud and the explosion of SaaS apps are creating risks for IAM, amid escalating attention from attackers.

Amazon, IBM Move Swiftly on Post-Quantum Cryptographic Algorithms Selected by NIST

08/04/2022
A month after the algorithms were revealed, some companies have already begun incorporating the future standards into their products and services.

Time to Patch VMware Products Against a Critical New Vulnerability

08/04/2022
A dangerous VMware authentication-bypass bug could give threat actors administrative access over virtual machines.

High-Severity Bug in Kaspersky VPN Client Opens Door to PC Takeover

08/04/2022
The CVE-2022-27535 local privilege-escalation security vulnerability in the security software threatens remote and work-from-home users.

How Email Security Is Evolving

08/04/2022
Securing email communication has never been more critical for organizations, and it has never been more challenging to do so. Attack volumes have increased and become more sophisticated.

Massive China-Linked Disinformation Campaign Taps PR Firm for Help

08/04/2022
A global network of inauthentic news sites present themselves as independent news outlets, offering content favoring China's government and articles critical of the US.

Phylum Releases a Free Community Edition to Make Software Supply Chain Security More Accessible

08/04/2022
Users can identify risks across five domains, work on multiple projects, and take advantage of exclusive community benefits.

The Myth of Protection Online — and What Comes Next

08/04/2022
It's a myth that consuming and processing alerts qualifies as security. Today's technology allows better detection and prevention, rather than accepting the low bar for protection set by ingrained incident response reactions.

Deep Instinct Pioneers Deep-Learning Malware Prevention to Protect Mission-Critical Business Applications at Scale

08/04/2022
Agentless approach meets the attacker earlier to protect financial services and other large enterprises from an underserved attack vector.