Dark Reading

How Cybercriminals Exploit Simple Human Mistakes

A new report explores how attackers identify psychological vulnerabilities to effectively manipulate targets.
Categories: Dark Reading

How Cybercriminals Exploit Simple Human Mistakes

A new report explores how attackers identify psychological vulnerabilities to effectively manipulate targets.
Categories: Dark Reading

How Cybercriminals Exploit Simple Human Mistakes

A new report explores how attackers identify psychological vulnerabilities to effectively manipulate targets.
Categories: Dark Reading

GitHub Becomes CVE Numbering Authority, Acquires Semmle

Dark Reading Threat Intelligence - 3 hours 41 min ago
Latest moves will make it much more likely that vulnerabilities in open source projects will be found and reported, GitHub says.
Categories: Dark Reading

GitHub Becomes CVE Numbering Authority, Acquires Semmle

Latest moves will make it much more likely that vulnerabilities in open source projects will be found and reported, GitHub says.
Categories: Dark Reading

DevSecOps: Recreating Cybersecurity Culture

Dark Reading Attacks and Breaches - 3 hours 41 min ago
Bringing developers and security teams together guided by a common goal requires some risk-taking. With patience and confidence, it will pay off. Here's how.
Categories: Dark Reading

One Arrested in Ecuador's Mega Data Leak

Dark Reading Threat Intelligence - 5 hours 46 min ago
Officials arrest a leader of consulting firm Novaestrat, which owned an unprotected server that exposed 20.8 million personal records.
Categories: Dark Reading

One Arrested in Ecuador's Mega Data Leak

Officials arrest a leader of consulting firm Novaestrat, which owned an unprotected server that exposed 20.8 million personal records.
Categories: Dark Reading

One Arrested in Ecuador's Mega Data Leak

Dark Reading Cloud - 5 hours 46 min ago
Officials arrest a leader of consulting firm Novaestrat, which owned an unprotected server that exposed 20.8 million personal records.
Categories: Dark Reading

Cryptominer Attacks Ramp Up, Focus on Persistence

Dark Reading Threat Intelligence - 6 hours 1 min ago
The latest attacks, such as Skidmap and Smominru, add capabilities to allow them to persist longer on Windows and Linux systems, surviving initial attempts at eliminating them.
Categories: Dark Reading

Cryptominer Attacks Ramp Up, Focus on Persistence

Dark Reading Attacks and Breaches - 6 hours 1 min ago
The latest attacks, such as Skidmap and Smominru, add capabilities to allow them to persist longer on Windows and Linux systems, surviving initial attempts at eliminating them.
Categories: Dark Reading

24.3M Unsecured Health Records Expose Patient Data, Images

Dark Reading Threat Intelligence - 6 hours 41 min ago
Several hundred servers storing medical data are connected to the Internet without any protection for sensitive information and images.
Categories: Dark Reading

24.3M Unsecured Health Records Expose Patient Data, Images

Several hundred servers storing medical data are connected to the Internet without any protection for sensitive information and images.
Categories: Dark Reading

How Ransomware Criminals Turn Friends into Enemies

Managed service providers are the latest pawns in ransomware's game of chess.
Categories: Dark Reading

How Ransomware Criminals Turn Friends into Enemies

Dark Reading Cloud - 7 hours 41 min ago
Managed service providers are the latest pawns in ransomware's game of chess.
Categories: Dark Reading

How Ransomware Criminals Turn Friends into Enemies

Dark Reading Attacks and Breaches - 7 hours 41 min ago
Managed service providers are the latest pawns in ransomware's game of chess.
Categories: Dark Reading

MITRE Releases 2019 List of Top 25 Software Weaknesses

Dark Reading Threat Intelligence - Tue, 09/17/2019 - 5:15pm
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.
Categories: Dark Reading

MITRE Releases 2019 List of Top 25 Software Weaknesses

Dark Readuing Vulnerability and Threats - Tue, 09/17/2019 - 5:15pm
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.
Categories: Dark Reading

Five Common Cloud Configuration Mistakes

Dark Readuing Vulnerability and Threats - Tue, 09/17/2019 - 2:00pm
It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain.
Categories: Dark Reading

Five Common Cloud Configuration Mistakes

Dark Reading Cloud - Tue, 09/17/2019 - 2:00pm
It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain.
Categories: Dark Reading

Pages