Dark Readuing Vulnerability and Threats
Dark Reading: Connecting the Information and Security Community
Updated: 53 min 35 sec ago
The cybercrime group blamed for attacks on the SWIFT financial network launches a spearphishing campaign to steal employee credentials at a London cryptocurrency company.
Samsung is the latest to join a small group of smartphone makers to cast their net wide on catching vulnerabilities in their devices.
The pace at which information security evolves means organizations must work smarter, not harder. Here's how to stay ahead of the threats.
Bluetooth vulnerabilities let attackers control devices running Linux or any OS derived from it, putting much of the Internet of Things at risk, including popular consumer products.
White hat hackers bring value to organizations and help them defend against today's advanced threats.
Avast's RetDec machine-code decompiler now available for free on Github.
Nearly half of survey respondents use unsecured WiFi networks and a third open unsolicited email attachment, a report finds.
Experts say the healthcare industry is underestimating security threats as attackers continue to seek data and monetary gain.
Third-party AndroidAPKDescargar store carried the most blacklisted mobile apps.
Sticking workers with tedious jobs that AI can't do leads to burnout, but there is a way to achieve balance.
The costs of complying with data protection requirements are steep, but the costs of non-compliance are even higher, a new study shows.
An improper default configuration gives employees unnecessary administrative privilege without their knowledge, making them ideal targets for hackers.
Security policies for USB drivers are severely outdated or inadequate, a report finds.
Corporate leaders know little about common security threats like ransomware and phishing, driving their risk for attack.
Employees' corporate mobile devices are connected to WiFi networks on average 74% of the time.
Design principles observed in nature serve as a valuable model to improve organizations' security approaches.
Remote code execution vulnerability in Microsoft Malware Protection Engine was found by UK spy agency's National Cyber Security Centre (NCSC).
More than 5,000 Android ransomware kit listings have been spotted so far this year, with the median price range hitting $200.
Offensive security researcher Joanna Rutkowska explains why trust in technology can put users at risk.