Dark Reading

Cyera Launches From Stealth With $60M to Identify, Secure, and Remediate Cloud Data Security Risks

03/29/2022
Backed by Sequoia, Accel, and Cyberstarts, Cyera is building the security layer for the data plane in the cloud and enabling enterprises to identify and reduce risks across all cloud-based data repositories.

Exploring the Intersection of Physical Security and Cybersecurity

03/29/2022
Residential, commercial, and public buildings are getting smarter; fitting them with a network of connected systems allows buildings to regulate their environment, save energy, and be more secure.

Low-Code/No-Code Tools Are Popular, But Untrusted

03/28/2022
While low-code and no-code tools make application development more flexible, they open up security flaws.

Zero-Day Surge Led to More Rapid Exploitation of Bugs in 2021

03/28/2022
New vulnerability study shows how "attacker economies of scale" have shaped the risk landscape.

Triton Malware Still Targeting Energy Firms

03/28/2022
The FBI's latest Private Industry Notification warns the energy sector that the group behind Triton is still up to no good.

Vodafone Portugal: The Attack on Brand Reputations and Public Confidence Through Cybercrime

03/28/2022
Companies must prepare effective, data-driven threat-response strategies as they monitor for reputational risks as well as cyberattacks.

Security's Life Cycle Isn't the Developers' Life Cycle

03/28/2022
Whether it's PCI-DSS, SSDLC, or GDPR, the criteria that security standards expect businesses to uphold are neither realistic or feasible.

Indictment of Russian National Offers Glimpse Into Methodical Targeting of Energy Firm

03/25/2022
Evgeny Viktorovich Gladkikh tried to cause catastrophic damage to Saudi oil refinery in 2017 via the Triton/Trisis malware, the US has alleged.

How Do I Demonstrate the ROI of My Security Program?

03/25/2022
Security teams must shift away from saying no, align security initiatives to business goals, and report metrics in a way business leaders can understand.

WiCyS Members Now Have Access to Cyber Defense Challenge Through Target

03/25/2022
Target's cybersecurity team has designed a Cyber Defense Challenge exclusively for members of Women in CyberSecurity (WiCyS).

Here's How Fast Ransomware Encrypts Files

03/25/2022
New analysis shows how long it takes for each of the top 10 ransomware families to encrypt 100,000 files.

HR Alone Can't Solve the Great Resignation

03/25/2022
Here's how IT teams and decision-makers can step up to support the workforce. Creating a culture of feedback and introducing automation can mitigate burnout, inspire employees, and reduce turnover.

Russian Nationals Indicted for Epic Triton/Trisis and Dragonfly Cyberattacks on Energy Firms

03/24/2022
Four Russian government employees were charged by the DoJ for attack campaigns targeting hundreds of energy sector companies and organizations in 135 countries, including the US.

Downloaders Currently the Most Prevalent Android Malware

03/24/2022
Of the top 10 Trojans targeting Android devices, downloaders and infostealers accounted for 87% of detections in February, Bitdefender says.

How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud

03/24/2022
As casinos go digital, their loyalty programs and authentic accounts are at risk.

Ransomware Payments, Demands Rose Dramatically in 2021

03/24/2022
New data pulled from incident response cases by Unit 42 shows cyber-extortion attacks jumped by 85%.

Pandemic Leaves Firms Scrambling for Cybersecurity Specialists

03/24/2022
Companies have trouble retaining workers, with almost two-thirds of business reporting unfilled positions and massive unmet demand for technical cybersecurity professionals, study shows.

For MSPs, Next-Gen Email Security Is a Must

03/24/2022
Stay one step ahead of the constantly evolving cyber threats with the right MSP email security solution. Discover how to evaluate and select the best service and solutions for your clients.

APIs & the Software Supply Chain — Evolving Security for Today's Digital Ecosystem

03/24/2022
Securing APIs requires both a "shift left" methodology and "shield right" action.

What the Conti Ransomware Group Data Leak Tells Us

03/24/2022
Knowing the inner workings of Conti will not only help ransomware negotiators but also help organizations to better handle a ransomware attack when it happens.