The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Risk
Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.
An Emerging Threat: Attacking 5G Via Network Slices
A successful attack against 5G networks could disrupt critical infrastructure, manipulate sensor data, or even cause physical harm to humans.
June 07, 2022
A successful attack against 5G networks could disrupt critical infrastructure, manipulate sensor data, or even cause physical harm to humans.
by Tara Seals, Managing Editor, News, Dark Reading
June 07, 2022
8 min read
Article
RSAC Opens With Message of Transformation
Cybersecurity needs to shift its thinking ahead of the next disruption, RSA's CEO said during the opening 2022 conference keynote.
June 07, 2022
Cybersecurity needs to shift its thinking ahead of the next disruption, RSA's CEO said during the opening 2022 conference keynote.
by Becky Bracken, Editor, Dark Reading
June 07, 2022
2 min read
Article
Communication Is Key to CISO Success
A panel of CISOs at the RSA Conference outlined what a successful first 90-day plan looks like, and it boiled down to effective communication and listening.
June 06, 2022
A panel of CISOs at the RSA Conference outlined what a successful first 90-day plan looks like, and it boiled down to effective communication and listening.
by Becky Bracken, Editor, Dark Reading
June 06, 2022
3 min read
Article
12K Misconfigured Elasticsearch Buckets Ravaged by Extortionists
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.
June 01, 2022
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.
by Tara Seals, Managing Editor, News, Dark Reading
June 01, 2022
2 min read
Article
Consumer Reports Launches IoT Cybersecurity 'Nutrition Label'
Stalwart consumer advocacy group says it intends to educate people about cybersecurity and how to choose the safest products.
June 01, 2022
Stalwart consumer advocacy group says it intends to educate people about cybersecurity and how to choose the safest products.
by Dark Reading Staff, Dark Reading
June 01, 2022
1 min read
Article
ChromeLoader Malware Hijacks Browsers With ISO Files
The malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.
May 27, 2022
The malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.
by Nathan Eddy, Contributing Writer, Dark Reading
May 27, 2022
4 min read
Article
The FDA's New Cybersecurity Guidance for Medical Devices Reminds Us That Safety & Security Go Hand in Hand
The new draft guidance on premarket submissions incorporates quality system regulations and doubles down on a life-cycle approach to product security.
May 26, 2022
The new draft guidance on premarket submissions incorporates quality system regulations and doubles down on a life-cycle approach to product security.
by Roman Kesler, VP of Research, Cybellum
May 26, 2022
5 min read
Article
VMware, Airline Targeted as Ransomware Chaos Reigns
Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the "GoodWill" strain.
May 26, 2022
Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the "GoodWill" strain.
by Nathan Eddy, Contributing Writer, Dark Reading
May 26, 2022
5 min read
Article
Big Cyber Hits on GM, Chicago Public Schools, & Zola Showcase the Password Problem
Credential-stuffing attacks against online accounts are still popular, and they work thanks to continuing password reuse.
May 26, 2022
Credential-stuffing attacks against online accounts are still popular, and they work thanks to continuing password reuse.
by Tara Seals, Managing Editor, News, Dark Reading
May 26, 2022
6 min read
Article
Act Now: Leveraging PCI Compliance to Improve Security
Let the threat landscape guide your company's timeline for complying with new data security standards for credit cards. Use the phase-in time to improve security overall — security as a process — not just comply with new standards.
May 26, 2022
Let the threat landscape guide your company's timeline for complying with new data security standards for credit cards. Use the phase-in time to improve security overall — security as a process — not just comply with new standards.
by Tim Erlin, VP of Product Management & Strategy, Tripwire
May 26, 2022
5 min read
Article
'There's No Ceiling': Ransomware's Alarming Growth Signals a New Era, Verizon DBIR Finds
Ransomware has become so efficient, and the underground economy so professional, that traditional monetization of stolen data may be on its way out.
May 24, 2022
Ransomware has become so efficient, and the underground economy so professional, that traditional monetization of stolen data may be on its way out.
by Tara Seals, Managing Editor, News, Dark Reading
May 24, 2022
5 min read
Article
Strong Password Policy Isn't Enough, Study Shows
New analysis reveals basic regulatory password requirements fall far short of providing protection from compromise.
May 24, 2022
New analysis reveals basic regulatory password requirements fall far short of providing protection from compromise.
by Dark Reading Staff, Dark Reading
May 24, 2022
1 min read
Article
Majority of Kubernetes API Servers Exposed to the Public Internet
Shadowserver Foundation researchers find 380,000 open Kubernetes API servers.
May 19, 2022
Shadowserver Foundation researchers find 380,000 open Kubernetes API servers.
by Ericka Chickowski, Contributing Writer, Dark Reading
May 19, 2022
4 min read
Article
Phishing Attacks for Initial Access Surged 54% in Q1
For the first time in a year, security incidents involving email compromises surpassed ransomware incidents, a new analysis shows.
May 19, 2022
For the first time in a year, security incidents involving email compromises surpassed ransomware incidents, a new analysis shows.
by Jai Vijayan, Contributing Writer, Dark Reading
May 19, 2022
5 min read
Article
MITRE Creates Framework for Supply Chain Security
System of Trust includes data-driven metrics for evaluating the integrity of software, services, and suppliers.
May 18, 2022
System of Trust includes data-driven metrics for evaluating the integrity of software, services, and suppliers.
by Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
May 18, 2022
4 min read
Article