It is with great sadness that the Dark Reading team shares the passing of our co-founder and editor-in-chief, Tim Wilson. Tim was a gifted reporter and editor, and a dear friend and colleague to many in the cybersecurity community. He will be deeply missed
DarkReading
@DarkReading
News and information on IT security, helping information security pros manage the balance between data protection and user access.
DarkReading.comJoined November 2008
DarkReading’s Tweets
What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers informatech.co/3FwH854 #PatchTuesday
7
4
US Pledges to Help Ukraine Keep the Internet and Lights On
1
3
3
"Rather than infiltration and breaches, we will see more backbone-level attack attempts ... that affect availability and continuity. This could also extend to major cloud providers and Internet resources." -Chaim Mazal,
2
3
Topics to follow
Sign up to get Tweets about the Topics you follow in your Home timeline.
Carousel
5-Buck DCRat Malware Foretells a Worrying Cyber Future by
3
2
Joker, Other Fleeceware Surges Back Into Google Play by
3
2
ICYMI: Costa Rica declared a state of emergency amid sustained Conti ransomware attacks, and the US is now offering a $15M bounty on the cybercrime group.
9
6
3
1
1
6
2
Implement and Use XDR to Improve Enterprise Cybersecurity | At this webinar experts will discuss the benefits of #XDR, the challenges in implementing it, & details on how to speed the #detection & #mitigation of new exploits. Register today>> informatech.co/3P34JPm
4
1
As orgs start incorporating nonfungible tokens into their business strategies, brand-awareness campaigns, and employee-communication efforts, they need to do with cybersecurity in mind: bit.ly/3vWinvW #NFTs
4
3
Joker, Other Fleecewear Surges Back Into Google Play by
3
5
Costa Rica Declares State of Emergency Under Sustained #Conti Cyberattacks informatech.co/399vhhn #ransomware
13
7
1
6
4
The world doesn't stop moving after a security breach. "There are still threats looming, possibly waiting to attack your infrastructure while it's at its weakest." -Tyler Farrar,
4
6
Cloud containers are increasingly part of the cybercrime playbook, with researchers flagging ongoing scanning for Docker weaknesses along with rapid exploitation to infect systems with coin-miners, denial-of-service tools, and ransomware.
8
11
How Data Breaches Happen & What To Do When They Happen To You
A free full-day virtual event on the #vulnerabilities that lead to security incidents - and how to respond in the event of a #databreach.
Learn more>> informatech.co/39bMgiU
6
5
An operational slip-up led security researchers to an attacker associated with Nigerian letter scams and malware distribution, after he infected himself with Agent Tesla. bit.ly/3MZOO2u via #AgentTesla
4
5
4
4
Building an Effective Active Directory Security Strategy
At this webinar experts describe tools, processes, and strategies for improving user and system security, and for integrating AD into an effective #security architecture.
Register now>> informatech.co/3kmaaL8
3
1
Implement and Use XDR to Improve Enterprise Cybersecurity | At this webinar experts will discuss the benefits of #XDR, the challenges in implementing it, & details on how to speed the #detection & #mitigation of new exploits. Register today>> informatech.co/3P34JPm
5
3
8
2
How Data Breaches Happen & What To Do When They Happen To You
A free full-day virtual event on the #vulnerabilities that lead to security incidents - and how to respond in the event of a #databreach.
Learn more>> informatech.co/39bMgiU
9
10
Building an Effective Active Directory Security Strategy
At this webinar experts describe tools, processes, and strategies for improving user and system security, and for integrating AD into an effective #security architecture.
Register now>> informatech.co/3kmaaL8
4
5
Implement and Use XDR to Improve Enterprise Cybersecurity | At this webinar experts will discuss the benefits of #XDR, the challenges in implementing it, & details on how to speed the #detection & #mitigation of new exploits. Register today>> informatech.co/3P34JPm
3
3
Ikea Canada Breach Exposes 95K Customer Records
15
8
White House Moves to Shore Up US Post-Quantum Cryptography Posture
7
7
Scammer Infects His Own Machine with Spyware, Reveals True Identity by
8
7
Colonial Pipeline 1 Year Later: What Has Yet to Change?
3
2
SideWinder (aka Rattlesnake or T-APT4) group has been on a tear over the past two years, launching more than 1,000 targeted attacks.
5
2