Dark Reading

China-Sponsored Cyberattackers Target Networking Gear to Build Widespread Attack Infrastructure

06/08/2022
Compromised routers, VPNs, and NAS devices from Cisco, Citrix, Pulse, Zyxel, and others are all being used as part of an extensive cyber espionage campaign.

Concentric: How To Maximize Your AI Returns, In and Out of the SOC

06/08/2022
Concentric AI's Karthik Krishnan joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how artificial intelligence has transformed the security landscape.

Cracking the Email Security Code: 12 Best Practices for Small and Midsize Businesses

06/08/2022
It only takes one successful attack to spell disaster for a company. Learn how to protect your company with this email security best practice guide.

Lookout: Getting It Right at the Secure Service Edge

06/08/2022
Lookout's Jim Dolce joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss the advantages of Secure Service Edge.

Talon Grasps Victory at a Jubilant RSAC Innovation Sandbox

06/08/2022
Spirits were high at the return of the in-person contest, which kicked off by bringing last year's virtual event winner on stage.

Black Basta Ransomware Targets ESXi Servers in Active Campaign

06/08/2022
The new ransomware strain Black Basta is now actively targeting VMware ESXi servers in an ongoing campaign, encrypting files inside a targeted volumes folder.

How Do We Secure Our Cities From Attack?

06/08/2022
Physical access matters in keeping people and buildings safe. Points to consider when establishing a physical security protocol are ways to lock down an area to keep people safe, approaches to communicate clear safety directions, and access control.

Now Is the Time to Plan for Post-Quantum Cryptography

06/07/2022
Panelists from an RSA Conference keynote agreed that organizations need to begin work on PQC migration, if they haven't already.

An Emerging Threat: Attacking 5G Via Network Slices

06/07/2022
A successful attack against 5G networks could disrupt critical infrastructure, manipulate sensor data, or even cause physical harm to humans.

Mandia: Keep 'Shields Up' to Survive the Current Escalation of Cyberattacks

06/07/2022
As Mandiant CEO Kevin Mandia's company prepares to become part of Google, the incident response company continues to investigate many of the most critical cyber incidents.

Multilevel Extortion: DeadBolt Ransomware Targets Internet-Facing NAS Devices

06/07/2022
The innovative ransomware targets NAS devices, has a multitiered payment and extortion scheme as well as a flexible configuration, and takes a heavily automated approach.

How the C-Suite Puts Shoulders Into Zero Trust in 2022

06/07/2022
A full 77% of tech executives say they'll increase spending in zero-trust architecture in the coming year.

RSAC Opens With Message of Transformation

06/07/2022
Cybersecurity needs to shift its thinking ahead of the next disruption, RSA's CEO said during the opening 2022 conference keynote.

Enterprise Security Around the Dinner Table

06/07/2022
Enterprise cybersecurity awareness training has evolved to include informal lessons for employees' family members, and it has many benefits.

7 NFT Scams That Could Be Targeting Your Brand

06/07/2022
Brands should be vigilant to ensure sites and listings promoting NFTs for sale are legitimate and not being used as an instrument by fraudsters to swindle customers.

Harnessing AI to Proactively Thwart Threats

06/07/2022
By using artificial intelligence to predict how an attacker would carry out their attack, we can deploy defenses and preemptively shut down vulnerable entry points.

Akamai Launches New Malware Protection for Uploaded Files

06/07/2022
Edge-based solution detects and blocks malicious files uploaded to Web apps and APIs.

Cybersecurity Industry Leaders Launch Campaign to Close the Cybersecurity Talent Gap

06/07/2022
A coalition of over 25 industry leaders, led by NightDragon and non-profit NextGen Cyber Talent, partner to raise $1 million for collegiate cybersecurity education

CISA Challenges Partners and Public to Push for 'More Than a Password' in New Social Media Campaign

06/07/2022
Nation’s cyber defense agency urges America to enable multifactor authentication.

Forescout Announces Intent to Acquire Cysiv to Deliver Data-Powered Threat Detection and Response

06/07/2022
Acquisition will leverage Forescout’s automated cybersecurity with Cysiv's cloud-native platform to deliver data-powered analytics for 24/7 threat detection and response.