Dark Reading

Snowflake Debuts Cybersecurity Workload to Aid Visibility, Automation

06/07/2022
The tool underpins cybersecurity capabilities including SIEM, SOAR, compliance automation, and vulnerability management.

Fortinet Unveils New Digital Risk Protection Offering

06/07/2022
FortiRecon combines machine learning, automation, and human intelligence to continually monitor an organization’s external attack surface.

Ransomware's ROI Retreat Will Drive More BEC Attacks

06/06/2022
Crackdowns are driving down ransomware profits, and analysts see signs that operators are pivoting to business email compromise attacks, security researcher warned.

Communication Is Key to CISO Success

06/06/2022
A panel of CISOs at the RSA Conference outlined what a successful first 90-day plan looks like, and it boiled down to effective communication and listening.

Optiv Launches Cyber Recovery Solution Focused on Protection and Rapid Recovery

06/06/2022
CMS helps minimize the impact a cyberattack has on business operations, finances and reputation.

BigID Introduces Cloud Data Security On Demand

06/06/2022
New SmallID offering brings cloud-native data privacy and protection to organizations of all sizes.

IBM to Buy Attack Surface-Management Firm Randori

06/06/2022
Randori’s attack-surface management software will be integrated into IBM Security QRadar extended detection and response (XDR) features.

Cybersecurity M&A Activity Shows No Signs of Slowdown

06/06/2022
But valuations have dropped — and investors are paying closer attention to revenues and profitability, industry analysts say.

The CISO Shortlist: Top Priorities at RSAC 2022

06/06/2022
The buzz on the show floor during RSA Conference is about aligning the organization's security priorities with the right technology. Will Lin, managing director and founding member at Forgepoint Capital, weighs in on the biggest security priorities for 2022 — and what kind of tech senior-level executives are looking for.

Are You Ready for a Breach in Your Organization's Slack Workspace?

06/06/2022
A single compromised Slack account can easily be leveraged to deceive other users and gain additional access to other users and multiple Slack channels.

Name That Edge Toon: Hey, Batter Batter!

06/06/2022
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

Gathering Momentum: 3 Steps Forward to Expand SBoM Use

06/06/2022
New studies show less than a third of organizations use software bills of materials (SBoMs), but momentum is building to boost that number.

FDA: Patch Illumina DNA Sequencing Instruments, Stat

06/03/2022
A critical security bug could lead to remote device control, altered lab results, and more, putting patients in danger, agency warns.

YourCyanide Ransomware Propagates With PasteBin, Discord, Microsoft Links

06/03/2022
The latest iteration of CMD-based ransomware is sophisticated and tricky to detect – and integrates token theft and worming capabilities into its feature set.

Iconium Software Releases DataLenz v1.3 for IBM zSystems

06/03/2022
DataLenz delivers real-time, machine learning-based breach detection with user behavior modeling for IBM zSystems.

Microsoft Disables Iran-Linked Lebanese Hacking Group Polonium

06/03/2022
The attack on Israeli organizations is the latest in a long line of attempts to compromise supply chains, as the APT looks to leverage that access to target a multitude of potential victims.

Actively Exploited Atlassian Zero-Day Bug Allows Full System Takeover

06/03/2022
An remote code execution (RCE) vulnerability in all versions of the popular Confluence collaboration platform can be abused in credential harvesting, cyber espionage, and network backdoor attacks.

Why Network Object Management Is Critical for Managing Multicloud Network Security

06/03/2022
If you want your IT and security administrators to get buried in trivial workloads and productivity bottlenecks, having poor network object management is a great way to accomplish that.

For Ransomware, Speed Matters

06/03/2022
Someone interested in putting together a ransomware campaign has to consider several factors. The LockBit group touts its speed over competing families to attract potential buyers for its ransowmare-as-a-service.

Cerberus Sentinel Completes Acquisition of Creatrix, Inc.

06/02/2022
U.S. cybersecurity services firm expands security and identity management services with woman-owned business.