Dark Reading

Google Emergency Update Fixes Chrome Zero-Day

04/15/2022
Google patches a critical flaw in its Chrome browser, bringing its count of zero-day vulnerabilities fixed in 2022 to four.

Cloud Cost, Reliability Raise IT Concerns

04/15/2022
IT professionals worry most about cloud security, but other questions arise about training, functionality, and performance.

Lazarus Targets Chemical Sector With 'Dream Jobs,' Then Trojans

04/15/2022
Chemical companies are the latest to be targeted by the well-known North Korean group, which has targeted financial firms, security researchers, and technology companies in the past.

CISA Alert on ICS, SCADA Devices Highlights Growing Enterprise IoT Security Risks

04/15/2022
Omdia Senior Analyst Hollie Hennessy says the new threat to multiple ICS and SCADA devices underscores the importance of a rapid response to IoT and OT security risks.

Cybersecurity Act of 2022: A Step in the Right Direction With a Significant Loophole

04/15/2022
The act contains a loophole added late in the process that will impede progress toward the goal of increasing US cybersecurity: a complete carve-out of DNS from the reporting requirements and other obligations outlined in the bill.

greymatter.io Closes $7.1 Million Series A to Meet Rising Need for Its Enterprise Microservices Platform

04/14/2022
Elsewhere Partners invests in proven service mesh and API management innovator as it grows team and breaks into new markets.

New Malware Tools Pose 'Clear and Present Threat' to ICS Environments

04/14/2022
The recent discovery of highly customized malware targeting programmable logic controllers has renewed concerns about the vulnerability of critical infrastructure.

Data Scientists, Watch Out: Attackers Have Your Number

04/14/2022
Researchers should take extra care in deploying data-science applications to the cloud, as cybercriminals are already targeting popular data-science tools such as Jupyter Notebook.

Inside a Data Center Outage: Lessons About Resilience

04/14/2022
A power failure at a major London data center shows that a truly resilient network is flexible, not just redundant.

The Misconceptions of 2021's Black Swan Cyber Events

04/14/2022
Organizations can defend themselves from future unknows attacks by implementing targeted security hardening measures, turning on built-in security protections, and leveraging existing technology stack to achieve microsegmentation and credential hygiene.

Secure Systems Need Hardware-Enhanced Tools, Intel Says

04/13/2022
A new Intel study finds that while adoption of hardware-assisted security is still low, there is a lot of interest in how it can secure system layers such as the operating system and hypervisor.

Microsoft Leads Operation to Disrupt Zloader Botnet

04/13/2022
The banking Trojan-turned-ransomware-distribution tool has been a potent threat since late 2019.

KKR to Acquire Barracuda Networks

04/13/2022
The transaction is anticipated to close by the end of the year.

More Than 60% of Organizations Suffered a Breach in the Past 12 Months

04/13/2022
Firms focus too narrowly on external attackers when it's insiders, third parties, and stolen assets that cause many breaches, new study shows.

Palo Alto Networks Extends SASE to Protect Home Networks With Okyo Garde Enterprise Edition

04/13/2022
Okyo Garde Enterprise Edition includes an option for at-home employees to create separate private and personal networks.

The XDR Revolution: Threat Detection and Response for All!

04/13/2022
In this webinar replay, Omdia outlines the ways in which XDR facilitates faster and easier threat detection and response, and key points organizations should consider when evaluating XDR technology.

Securing the Stopgap: Controlling Access to SaaS Applications

04/13/2022
If enterprises continue to use emergency measures as long-term solutions, they must protect their IT estate.

Supply and Demand Hits Cybersecurity: Navigating the Skills Shortage

04/13/2022
As everyone feels the pain of the skills crunch, what can companies do to secure the talent they desperately need? It comes down to making two key changes.

Identifying a Vulnerability in the SAP Software Supply Chain

04/13/2022
Make sure you're using the patch to block this supply chain attack.