The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Vendors as Your Largest BEC Threat
Jun 22, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Vendors as Your Largest BEC Threat
Jun 22, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Vendors as Your Largest BEC Threat
Jun 22, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
The Value Drivers of Attack Surface Management, Revealed | May 26 Webinar | <REGISTER NOW>
Event
Implementing and Using XDR to Improve Enterprise Cybersecurity | May 25 Webinar | <REGISTER NOW>
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Threat Intelligence
Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools & technologies.
Partial Patching Still Provides Strong Protection Against APTs
Organizations that deploy updates only after a vulnerability is disclosed apply far fewer updates and do so at a lower cost than those that stay up to date on all of their software, university researchers say.
May 20, 2022
Organizations that deploy updates only after a vulnerability is disclosed apply far fewer updates and do so at a lower cost than those that stay up to date on all of their software, university researchers say.
by Jai Vijayan, Contributing Writer, Dark Reading
May 20, 2022
4 min read
Article
Pro-Russian Information Operations Escalate in Ukraine War
In the three months since the war started, Russian operatives and those allied with the nation's interests have unleashed a deluge of disinformation and fake news to try and sow fear and confusion in Ukraine, security vendor says.
May 19, 2022
In the three months since the war started, Russian operatives and those allied with the nation's interests have unleashed a deluge of disinformation and fake news to try and sow fear and confusion in Ukraine, security vendor says.
by Jai Vijayan, Contributing Writer, Dark Reading
May 19, 2022
6 min read
Article
Phishing Attacks for Initial Access Surged 54% in Q1
For the first time in a year, security incidents involving email compromises surpassed ransomware incidents, a new analysis shows.
May 19, 2022
For the first time in a year, security incidents involving email compromises surpassed ransomware incidents, a new analysis shows.
by Jai Vijayan, Contributing Writer, Dark Reading
May 19, 2022
5 min read
Article
Microsoft Flags Attack Targeting SQL Servers With Novel Approach
Attackers appear to have found a way around PowerShell monitoring by using a default utility instead.
May 18, 2022
Attackers appear to have found a way around PowerShell monitoring by using a default utility instead.
by Dark Reading Staff, Dark Reading
May 18, 2022
1 min read
Article
How Threat Actors Are a Click Away From Becoming Quasi-APTs
As demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.
May 18, 2022
As demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.
by Omer Carmi, VP, Cyber Threat Intelligence, Cybersixgill
May 18, 2022
5 min read
Article
Critical VMware Bug Exploits Continue, as Botnet Operators Jump In
A critical VMware bug tracked as CVE-2022-22954 continues to draw cybercriminal moths to its remote code-execution flame, with recent attacks focused on botnets and Log4Shell.
May 17, 2022
A critical VMware bug tracked as CVE-2022-22954 continues to draw cybercriminal moths to its remote code-execution flame, with recent attacks focused on botnets and Log4Shell.
by Tara Seals, Managing Editor, News, Dark Reading
May 17, 2022
5 min read
Article
Name That Toon: Knives Out
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
May 16, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
May 16, 2022
1 min read
Article
US Cyber Director: Forging a Cybersecurity Social Contract Is Not Optional
In a Black Hat Asia keynote fireside chat, US national cyber director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.
May 16, 2022
In a Black Hat Asia keynote fireside chat, US national cyber director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.
by Becky Bracken, Editor, Dark Reading
May 16, 2022
2 min read
Article
How to Turn a Coke Can Into an Eavesdropping Device
Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.
May 14, 2022
Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.
by Robert Lemos, Contributing Writer
May 14, 2022
4 min read
Article
US Agrees to International Electronic Cybercrime Evidence Swap
The Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals.
May 13, 2022
The Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals.
by Dark Reading Staff, Dark Reading
May 13, 2022
1 min read
Article
Black Hat Asia: Democracy's Survival Depends on Taming Technology
The conference opens with stark outlook on the future of global democracy — currently squeezed between Silicon Valley and China.
May 13, 2022
The conference opens with stark outlook on the future of global democracy — currently squeezed between Silicon Valley and China.
by Becky Bracken, Editor, Dark Reading
May 13, 2022
3 min read
Article
Transforming SQL Queries Bypasses WAF Security
A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.
May 12, 2022
A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.
by Robert Lemos, Contributing Writer
May 12, 2022
5 min read
Article
5 Years That Altered the Ransomware Landscape
WannaCry continues to be a reminder of the challenges that organizations face dealing with the ransomware threat.
May 12, 2022
WannaCry continues to be a reminder of the challenges that organizations face dealing with the ransomware threat.
by Jai Vijayan, Contributing Writer
May 12, 2022
7 min read
Article
Microsoft Simplifies Security Patching Process for Exchange Server
Delivering hotfixes and system updates separately will allow manual patching without requiring elevated permissions, Microsoft said.
May 11, 2022
Delivering hotfixes and system updates separately will allow manual patching without requiring elevated permissions, Microsoft said.
by Dark Reading Staff, Dark Reading
May 11, 2022
1 min read
Article
Cyber-Espionage Attack Drops Post-Exploit Malware Framework on Microsoft Exchange Servers
IceApple's 18 separate modules include those for data exfiltration, credential harvesting, and file and directory deletion, CrowdStrike warns.
May 11, 2022
IceApple's 18 separate modules include those for data exfiltration, credential harvesting, and file and directory deletion, CrowdStrike warns.
by Jai Vijayan, Contributing Writer
May 11, 2022
4 min read
Article