Dark Reading Threat Intelligence
Dark Reading: Connecting the Information and Security Community
Updated: 54 min 53 sec ago
The cybercrime group blamed for attacks on the SWIFT financial network launches a spearphishing campaign to steal employee credentials at a London cryptocurrency company.
Samsung is the latest to join a small group of smartphone makers to cast their net wide on catching vulnerabilities in their devices.
Avast's RetDec machine-code decompiler now available for free on Github.
Nearly half of survey respondents use unsecured WiFi networks and a third open unsolicited email attachment, a report finds.
Experts say the healthcare industry is underestimating security threats as attackers continue to seek data and monetary gain.
Third-party AndroidAPKDescargar store carried the most blacklisted mobile apps.
Corporate leaders know little about common security threats like ransomware and phishing, driving their risk for attack.
Security policies for USB drivers are severely outdated or inadequate, a report finds.
Employees' corporate mobile devices are connected to WiFi networks on average 74% of the time.
More than 5,000 Android ransomware kit listings have been spotted so far this year, with the median price range hitting $200.
Offensive security researcher Joanna Rutkowska explains why trust in technology can put users at risk.
Breach occurred just prior to bitcoin's debut on two major US exchanges, the AP reports.
Real-world incident response investigation data from CrowdStrike reveals attacker trends with fileless malware, ransomware, and other weapons.
New Honeywell survey shows more than half of industrial sector organizations have suffered cyberattacks.
More than 20% lack a breach response plan altogether, a new survey shows.
Some 70% of simulated attacks on real networks were able to move laterally within the network, while more than half infiltrated the perimeter and exfiltrated data.
Several of the most popular cloud-based and downloadable tools Android developers use are affected.
By intelligently managing signatures, correlation rules, filters and searches, you can see where your security architecture falls down, and how your tools can better defend the network.
Nghia Hoang Pho faces up to eight years in prison for removing highly classified NSA data from workplace and storing it at home.
PayPal states TIO Networks, a payment processing company it acquired this summer, is not part of its network and PayPal remains unaffected by the breach.