Dark Reading

FBI: Cybercrime Victims Suffered Losses of Over $6.9B in 2021

03/23/2022
The Internet Crime Complaint Center fielded 847,376 cybercrime reports last year, an increase of 7% from 2020.

Okta Says 366 Customers Impacted via Third-Party Breach

03/23/2022
Microsoft meanwhile confirms Lapsus$ group compromised it as well and issues warning on threat actor.

Could Gaming Close the Cyberskills Gap?

03/23/2022
The Wicked6 hackathon helps women to develop their professional cybersecurity skills while networking and playing games.

Cyber Insurance and War Exclusions

03/23/2022
Here's what a cybersecurity lawyer thinks security pros need to know in light of Russia's invasion of Ukraine.

F-Secure Rebrands as WithSecure, Spins Off Consumer Products

03/23/2022
Attempting to catch up with CrowdStrike, Microsoft, and Trend Micro, the Helsinki-based endpoint-protection firm "de-merges" its consumer-security business to focus on businesses.

Building a Red Team: How to Get Started

03/23/2022
These groups of authorized hackers work to infiltrate their customer's data, development environment, or any other business area to locate and identify vulnerabilities.

Vade Receives Patent on Anti-Phishing Tech

03/23/2022
The patent covers a technique to detect phishing kits even as the kits utilize defensive mechanisms to avoid detection.

Security Teams Need to Investigate the Okta Breach Themselves

03/22/2022
Trust, but verify. While organizations wait for official alerts and notifications from Okta, security teams should also begin their own investigations to determine whether they have been exposed.

Ransomware Group Claims Major Okta Breach

03/22/2022
Screenshots that ransomware gang Lapsus$ released this week suggest the threat actor also stole Microsoft source code.

Red Canary's Annual Threat Detection Report Reveals Top Threats and Techniques Targeting Most Organizations

03/22/2022
Report analyzes 30,000 threats in customer environments to uncover the trends, threats and techniques that comprised the 2021 threat landscape.

Logpoint Unleashes SaaS-Delivered Converged SIEM

03/22/2022
Only solution to deliver integrated cloud-based SIEM, SOAR, and UEBA services directly to organizations of all sizes.

Checkmarx Launches Comprehensive Supply Chain Security Solution

03/22/2022
Now available for use with Checkmarx Software Composition Analysis (SCA), the solution restores trust in modern application development while letting developers embrace open source code.

Trustero Exits Stealth Mode and Launches its Compliance as a Service Platform

03/22/2022
Proven best practices create integrity and trustworthiness.

Zscaler Unveils Security Service Edge Innovations to Protect Enterprises From Cyberattacks

03/22/2022
Advancements to the most deployed ZTNA solution strengthen the Zscaler Zero Trust Exchange with new private app protection, deception, and privileged remote access capabilities.

The Secret to Zero Trust You Need to Know

03/22/2022
If every application, device, and bot need access and authentication at some point, the need for managing and controlling the confidential data that allows those functions gets staggeringly large.

Binarly Coordinates Patches for 3 Firmware Flaws With Dell

03/21/2022
The latest three memory corruption flaws in Dell BIOS highlights the challenges of fixing firmware vulnerabilities.

'Unique Attack Chain' Drops Backdoor in New Phishing Campaign

03/21/2022
A threat group combines the use of steganography, open source tools, and Python scripts to target organizations in France.

ForAllSecure Raises $21M to Secure the World’s Software

03/21/2022
Strong demand for application security that supports DevSecOps initiatives drives investment from Koch Disruptive Technologies and New Enterprise Associates.

White House Warns of New Intel on Russia Mulling Cyberattack 'Options' Against US

03/21/2022
Biden administration doubles down on its previous warnings of possible Russian cyberattacks in the wake of hefty economic sanctions imposed on Russia by the US.

Embracing Security by Design: Constructing a More Secure Framework

03/21/2022
Designing a solid security interface, like most things, is more of a human problem than a technical one.