Dark Reading

NIST Releases New Cybersecurity Framework Draft

Dark Reading Cloud - Wed, 12/06/2017 - 6:50pm
Updated version includes changes to some existing guidelines - and adds some new ones.
Categories: Dark Reading

Nearly 2/3 of Industrial Companies Lack Security Monitoring

Dark Reading Threat Intelligence - Wed, 12/06/2017 - 3:50pm
New Honeywell survey shows more than half of industrial sector organizations have suffered cyberattacks.
Categories: Dark Reading

Nearly 2/3 of Industrial Companies Lack Security Monitoring

Dark Readuing Vulnerability and Threats - Wed, 12/06/2017 - 3:50pm
New Honeywell survey shows more than half of industrial sector organizations have suffered cyberattacks.
Categories: Dark Reading

Nearly 2/3 of Industrial Companies Lack Security Monitoring

Dark Reading Attacks and Breaches - Wed, 12/06/2017 - 3:50pm
New Honeywell survey shows more than half of industrial sector organizations have suffered cyberattacks.
Categories: Dark Reading

Most Retailers Haven't Fully Tested Their Breach Response Plans

Dark Reading Threat Intelligence - Wed, 12/06/2017 - 3:30pm
More than 20% lack a breach response plan altogether, a new survey shows.
Categories: Dark Reading

Most Retailers Haven't Fully Tested Their Breach Response Plans

Dark Readuing Vulnerability and Threats - Wed, 12/06/2017 - 3:30pm
More than 20% lack a breach response plan altogether, a new survey shows.
Categories: Dark Reading

Most Retailers Haven't Fully Tested Their Breach Response Plans

Dark Reading Cloud - Wed, 12/06/2017 - 3:30pm
More than 20% lack a breach response plan altogether, a new survey shows.
Categories: Dark Reading

Most Retailers Haven't Fully Tested Their Breach Response Plans

Dark Reading Attacks and Breaches - Wed, 12/06/2017 - 3:30pm
More than 20% lack a breach response plan altogether, a new survey shows.
Categories: Dark Reading

Why Cybersecurity Must Be an International Effort

Dark Readuing Vulnerability and Threats - Wed, 12/06/2017 - 2:30pm
The former head of cyber for the US State Department calls for agreements across countries to improve government cybersecurity.
Categories: Dark Reading

Why Cybersecurity Must Be an International Effort

Dark Reading Attacks and Breaches - Wed, 12/06/2017 - 2:30pm
The former head of cyber for the US State Department calls for agreements across countries to improve government cybersecurity.
Categories: Dark Reading

How the Major Intel ME Firmware Flaw Lets Attackers Get 'God Mode' on a Machine

Dark Readuing Vulnerability and Threats - Wed, 12/06/2017 - 11:30am
Researchers at Black Hat Europe today revealed how a buffer overflow they discovered in the chip's firmware can be abused to take control of a machine - even when it's turned 'off.'
Categories: Dark Reading

How the Major Intel ME Firmware Flaw Lets Attackers Get 'God Mode' on a Machine

Dark Reading Attacks and Breaches - Wed, 12/06/2017 - 11:30am
Researchers at Black Hat Europe today revealed how a buffer overflow they discovered in the chip's firmware can be abused to take control of a machine - even when it's turned 'off.'
Categories: Dark Reading

Cyberattack: It Can't Happen to Us (Until It Does)

Dark Readuing Vulnerability and Threats - Wed, 12/06/2017 - 10:30am
Just because your small or medium-sized business isn't as well known as Equifax or Yahoo doesn't mean you're immune to becoming a cybercrime victim.
Categories: Dark Reading

Cyberattack: It Can't Happen to Us (Until It Does)

Dark Reading Attacks and Breaches - Wed, 12/06/2017 - 10:30am
Just because your small or medium-sized business isn't as well known as Equifax or Yahoo doesn't mean you're immune to becoming a cybercrime victim.
Categories: Dark Reading

Study: Simulated Attacks Uncover Real-World Problems in IT Security

Dark Reading Threat Intelligence - Tue, 12/05/2017 - 5:15pm
Some 70% of simulated attacks on real networks were able to move laterally within the network, while more than half infiltrated the perimeter and exfiltrated data.
Categories: Dark Reading

Study: Simulated Attacks Uncover Real-World Problems in IT Security

Dark Readuing Vulnerability and Threats - Tue, 12/05/2017 - 5:15pm
Some 70% of simulated attacks on real networks were able to move laterally within the network, while more than half infiltrated the perimeter and exfiltrated data.
Categories: Dark Reading

Study: Simulated Attacks Uncover Real-World Problems in IT Security

Dark Reading Cloud - Tue, 12/05/2017 - 5:15pm
Some 70% of simulated attacks on real networks were able to move laterally within the network, while more than half infiltrated the perimeter and exfiltrated data.
Categories: Dark Reading

Study: Simulated Attacks Uncover Real-World Problems in IT Security

Dark Reading Attacks and Breaches - Tue, 12/05/2017 - 5:15pm
Some 70% of simulated attacks on real networks were able to move laterally within the network, while more than half infiltrated the perimeter and exfiltrated data.
Categories: Dark Reading

Bitcoin Sites Become Hot Targets for DDoS Attacks

Dark Readuing Vulnerability and Threats - Tue, 12/05/2017 - 1:45pm
The Bitcoin industry is now one of the top 10 most-targeted industries for DDoS campaigns. Price manipulation could be one goal, Imperva says.
Categories: Dark Reading

6 Personality Profiles of White-Hat Hackers

Dark Readuing Vulnerability and Threats - Tue, 12/05/2017 - 12:20pm
From making the Internet safer to promoting their security careers, bug bounty hunters have a broad range of motivators for hacking - most just like the challenge.
Categories: Dark Reading

Pages