The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Attacks/Breaches
Breaking news, news analysis, and expert commentary on cyberattacks and data breaches, as well as the tools, technologies, and practices for defense.
Scammer Behind $568M International Cybercrime Syndicate Gets 4 Years
The 14th defendant behind The Infraud Organization contraband marketplace has been sentenced, this time for one count of racketeering.
May 27, 2022
The 14th defendant behind The Infraud Organization contraband marketplace has been sentenced, this time for one count of racketeering.
by Dark Reading Staff, Dark Reading
May 27, 2022
1 min read
Article
ChromeLoader Malware Hijacks Browsers With ISO Files
The malware’s abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.
May 27, 2022
The malware’s abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.
by Nathan Eddy, Contributing Writer, Dark Reading
May 27, 2022
4 min read
Article
Twitter Fined $150M for Security Data Misuse
Twitter is charged with using emails and phone numbers ostensibly collected for account security to sell targeted ads.
May 26, 2022
Twitter is charged with using emails and phone numbers ostensibly collected for account security to sell targeted ads.
by Dark Reading Staff, Dark Reading
May 26, 2022
2 min read
Article
VMware, Airline Targeted as Ransomware Chaos Reigns
Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the "GoodWill" strain.
May 26, 2022
Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the "GoodWill" strain.
by Nathan Eddy, Contributing Writer, Dark Reading
May 26, 2022
5 min read
Article
Big Cyber Hits on GM, Chicago Public Schools, & Zola Showcase the Password Problem
Credential-stuffing attacks against online accounts are still popular, and they work thanks to continuing password reuse.
May 26, 2022
Credential-stuffing attacks against online accounts are still popular, and they work thanks to continuing password reuse.
by Tara Seals, Managing Editor, News, Dark Reading
May 26, 2022
6 min read
Article
Forescout Launches Forescout Frontline to Help Organizations Tackle Ransomware and Real Time Threats
New threat hunting and risk identification service provides organizations with an enterprise-wide baseline of their threat landscape and risk exposure.
May 25, 2022
New threat hunting and risk identification service provides organizations with an enterprise-wide baseline of their threat landscape and risk exposure.
May 25, 2022
4 min read
Article
Interpol's Massive 'Operation Delilah' Nabs BEC Bigwig
A sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.
May 25, 2022
A sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.
by Jai Vijayan, Contributing Writer, Dark Reading
May 25, 2022
4 min read
Article
Mastercard Launches Cybersecurity “Experience Centre”
Experience Centre features emerging Mastercard products and solutions for securing digital payments on a global scale, including those developed locally in Vancouver.
May 25, 2022
Experience Centre features emerging Mastercard products and solutions for securing digital payments on a global scale, including those developed locally in Vancouver.
May 25, 2022
4 min read
Article
Vishing Attacks Reach All Time High, According to Latest Agari and PhishLabs Report
According to the findings, vishing attacks have overtaken business email compromise as the second most reported response-based email threat since Q3 2021.
May 25, 2022
According to the findings, vishing attacks have overtaken business email compromise as the second most reported response-based email threat since Q3 2021.
May 25, 2022
5 min read
Article
Industry 4.0 Points Up Need for Improved Security for Manufacturers
With manufacturing ranking as the fourth most targeted sector, manufacturers that understand their exposure will be able to build the necessary security maturity.
May 25, 2022
With manufacturing ranking as the fourth most targeted sector, manufacturers that understand their exposure will be able to build the necessary security maturity.
by Jordan Kendall, President, Security Compass Advisory
May 25, 2022
5 min read
Article
DDoS Extortion Attack Flagged as Possible REvil Resurgence
A DDoS campaign observed by Akamai from actors claiming to be REvil would represent a major pivot in tactics for the gang.
May 25, 2022
A DDoS campaign observed by Akamai from actors claiming to be REvil would represent a major pivot in tactics for the gang.
by Nathan Eddy, Contributing Writer, Dark Reading
May 25, 2022
4 min read
Article
'There's No Ceiling': Ransomware's Alarming Growth Signals a New Era, Verizon DBIR Finds
Ransomware has become so efficient, and the underground economy so professional, that traditional monetization of stolen data may be on its way out.
May 24, 2022
Ransomware has become so efficient, and the underground economy so professional, that traditional monetization of stolen data may be on its way out.
by Tara Seals, Managing Editor, News, Dark Reading
May 24, 2022
5 min read
Article
New Attack Shows Weaponized PDF Files Remain a Threat
Notable new infection chain uses PDF to embed malicious files, load remote exploits, shellcode encryption, and more, new research shows.
May 24, 2022
Notable new infection chain uses PDF to embed malicious files, load remote exploits, shellcode encryption, and more, new research shows.
by Dark Reading Staff, Dark Reading
May 24, 2022
1 min read
Article
DeFi Is Getting Pummeled by Cybercriminals
Decentralized finance lost $1.8 billion to cyberattacks last year — and 80% of those events were the result of vulnerable code, analysts say.
May 24, 2022
Decentralized finance lost $1.8 billion to cyberattacks last year — and 80% of those events were the result of vulnerable code, analysts say.
by Becky Bracken, Editor, Dark Reading
May 24, 2022
7 min read
Article
XM Cyber Adds New Security Capability for Microsoft Active Directory
Company to debut its AD capabilities at the 2022 RSA Conference.
May 24, 2022
Company to debut its AD capabilities at the 2022 RSA Conference.
May 24, 2022
4 min read
Article