Dark Reading

Researchers Bypass Next-Generation Endpoint Protection

Dark Reading Attacks and Breaches - 1 hour 33 min ago
Machine learning-based products can be tricked to classify malware as a legitimate file, new findings show.
Categories: Dark Reading

From FUD to Fix: Why the CISO-Vendor Partnership Needs to Change Now

CISOs and their staffs are up against too many systems, screens, and alerts, with too few solutions to effectively address pain points.
Categories: Dark Reading

From FUD to Fix: Why the CISO-Vendor Partnership Needs to Change Now

Dark Reading Attacks and Breaches - 4 hours 13 min ago
CISOs and their staffs are up against too many systems, screens, and alerts, with too few solutions to effectively address pain points.
Categories: Dark Reading

Open Source Flaws Take Years to Find But Just a Month to Fix

Dark Readuing Vulnerability and Threats - Wed, 12/02/2020 - 6:30pm
Companies need to embrace automation and dependency tracking to keep software secure, GitHub says in its annual security report.
Categories: Dark Reading

Open Source Flaws Take Years to Find But Just a Month to Fix

Dark Reading Cloud - Wed, 12/02/2020 - 6:30pm
Companies need to embrace automation and dependency tracking to keep software secure, GitHub says in its annual security report.
Categories: Dark Reading

Cybersecurity in the Biden Administration: Experts Weigh In

Dark Reading Threat Intelligence - Wed, 12/02/2020 - 6:20pm
Security pros and former government employees share their expectations and concerns for the new administration - and their hope for a "return to normal."
Categories: Dark Reading

FBI: BEC Scammers Could Abuse Email Auto-Forwarding

Dark Reading Threat Intelligence - Wed, 12/02/2020 - 4:25pm
Private Industry Notification warns of the role email auto-forwarding could be used in business email compromise attacks.
Categories: Dark Reading

FBI: BEC Scammers Could Abuse Email Auto-Forwarding

Dark Readuing Vulnerability and Threats - Wed, 12/02/2020 - 4:25pm
Private Industry Notification warns of the role email auto-forwarding could be used in business email compromise attacks.
Categories: Dark Reading

FBI: BEC Scammers Could Abuse Email Auto-Forwarding

Dark Reading Attacks and Breaches - Wed, 12/02/2020 - 4:25pm
Private Industry Notification warns of the role email auto-forwarding could be used in business email compromise attacks.
Categories: Dark Reading

Automated Pen Testing: Can It Replace Humans?

Dark Readuing Vulnerability and Threats - Wed, 12/02/2020 - 2:00pm
These tools have come a long way, but are they far enough along to make human pen testers obsolete?
Categories: Dark Reading

Security Slipup Exposes Health Records & Lab Results

Dark Reading Threat Intelligence - Wed, 12/02/2020 - 1:35pm
NTreatment failed to add password protection to a cloud server, exposing thousands of sensitive medical records online.
Categories: Dark Reading

Security Slipup Exposes Health Records & Lab Results

Dark Readuing Vulnerability and Threats - Wed, 12/02/2020 - 1:35pm
NTreatment failed to add password protection to a cloud server, exposing thousands of sensitive medical records online.
Categories: Dark Reading

Security Slipup Exposes Health Records & Lab Results

Dark Reading Cloud - Wed, 12/02/2020 - 1:35pm
NTreatment failed to add password protection to a cloud server, exposing thousands of sensitive medical records online.
Categories: Dark Reading

Why I'd Take Good IT Hygiene Over Security's Latest Silver Bullet

Dark Reading Threat Intelligence - Wed, 12/02/2020 - 10:00am
Bells and whistles are great, but you can stay safer by focusing on correct configurations, posture management, visibility, and patching.
Categories: Dark Reading

Why I'd Take Good IT Hygiene Over Security's Latest Silver Bullet

Dark Readuing Vulnerability and Threats - Wed, 12/02/2020 - 10:00am
Bells and whistles are great, but you can stay safer by focusing on correct configurations, posture management, visibility, and patching.
Categories: Dark Reading

Why I'd Take Good IT Hygiene Over Security's Latest Silver Bullet

Dark Reading Attacks and Breaches - Wed, 12/02/2020 - 10:00am
Bells and whistles are great, but you can stay safer by focusing on correct configurations, posture management, visibility, and patching.
Categories: Dark Reading

Unmanaged Devices Heighten Risks for School Networks

Dark Readuing Vulnerability and Threats - Tue, 12/01/2020 - 8:00pm
Gaming consoles, Wi-Fi Pineapples, and building management systems are among many devices Armis says it discovered on K-12 school networks.
Categories: Dark Reading

Inside North Korea's Rapid Evolution to Cyber Superpower

Dark Reading Threat Intelligence - Tue, 12/01/2020 - 5:30pm
Researchers examine North Korea's rapid evolution from destructive campaigns to complex and efficient cyber operations.
Categories: Dark Reading

Inside North Korea's Rapid Evolution to Cyber Superpower

Dark Readuing Vulnerability and Threats - Tue, 12/01/2020 - 5:30pm
Researchers examine North Korea's rapid evolution from destructive campaigns to complex and efficient cyber operations.
Categories: Dark Reading

Inside North Korea's Rapid Evolution to Cyber Superpower

Dark Reading Attacks and Breaches - Tue, 12/01/2020 - 5:30pm
Researchers examine North Korea's rapid evolution from destructive campaigns to complex and efficient cyber operations.
Categories: Dark Reading

Pages