The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Endpoint
Breaking news, news analysis, and expert commentary on endpoint security, including tools & technologies.
An Emerging Threat: Attacking 5G Via Network Slices
A successful attack against 5G networks could disrupt critical infrastructure, manipulate sensor data, or even cause physical harm to humans.
June 07, 2022
A successful attack against 5G networks could disrupt critical infrastructure, manipulate sensor data, or even cause physical harm to humans.
by Tara Seals, Managing Editor, News, Dark Reading
June 07, 2022
8 min read
Article
How the C-Suite Puts Shoulders Into Zero Trust in 2022
A full 77% of tech executives say they'll increase spending in zero-trust architecture in the coming year.
June 07, 2022
A full 77% of tech executives say they'll increase spending in zero-trust architecture in the coming year.
by Ericka Chickowski, Contributing Writer, Dark Reading
June 07, 2022
4 min read
Article
CISA Challenges Partners and Public to Push for 'More Than a Password' in New Social Media Campaign
Nation’s cyber defense agency urges America to enable multifactor authentication.
June 07, 2022
Nation’s cyber defense agency urges America to enable multifactor authentication.
June 07, 2022
4 min read
Article
Cybersecurity M&A; Activity Shows No Signs of Slowdown
But valuations have dropped — and investors are paying closer attention to revenues and profitability, industry analysts say.
June 06, 2022
But valuations have dropped — and investors are paying closer attention to revenues and profitability, industry analysts say.
by Jai Vijayan, Contributing Writer, Dark Reading
June 06, 2022
5 min read
Article
Cerberus Sentinel Completes Acquisition of Creatrix, Inc.
U.S. cybersecurity services firm expands security and identity management services with woman-owned business.
June 02, 2022
U.S. cybersecurity services firm expands security and identity management services with woman-owned business.
June 02, 2022
4 min read
Article
12K Misconfigured Elasticsearch Buckets Ravaged by Extortionists
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.
June 01, 2022
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.
by Tara Seals, Managing Editor, News, Dark Reading
June 01, 2022
2 min read
Article
Lookout Acquires SaferPass To Address The Rising Threat Of Identity Theft
Password management solution delivers proactive, seamless approach to protecting privacy and login credentials for consumers and businesses; Password Management market expected to reach $3 billion by 2026.
June 01, 2022
Password management solution delivers proactive, seamless approach to protecting privacy and login credentials for consumers and businesses; Password Management market expected to reach $3 billion by 2026.
June 01, 2022
3 min read
Article
Consumer Reports Launches IoT Cybersecurity 'Nutrition Label'
Stalwart consumer advocacy group says it intends to educate people about cybersecurity and how to choose the safest products.
June 01, 2022
Stalwart consumer advocacy group says it intends to educate people about cybersecurity and how to choose the safest products.
by Dark Reading Staff, Dark Reading
June 01, 2022
1 min read
Article
New Microsoft Zero-Day Attack Underway
"Follina" vulnerability in Microsoft Support Diagnostic Tool (MSDT) affects all currently supported Windows versions and can be triggered via specially crafted Office documents.
May 31, 2022
"Follina" vulnerability in Microsoft Support Diagnostic Tool (MSDT) affects all currently supported Windows versions and can be triggered via specially crafted Office documents.
by Jai Vijayan, Contributing Writer, Dark Reading
May 31, 2022
6 min read
Article
New Chaos Malware Variant Ditches Wiper for Encryption
The Chaos ransomware-builder was known for creating destructor malware that overwrote files and made them unrecoverable -- but the new Yashma version finally generates binaries that can encrypt files of all sizes.
May 27, 2022
The Chaos ransomware-builder was known for creating destructor malware that overwrote files and made them unrecoverable -- but the new Yashma version finally generates binaries that can encrypt files of all sizes.
by Tara Seals, Managing Editor, News, Dark Reading
May 27, 2022
7 min read
Article
ChromeLoader Malware Hijacks Browsers With ISO Files
The malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.
May 27, 2022
The malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.
by Nathan Eddy, Contributing Writer, Dark Reading
May 27, 2022
4 min read
Article
Broadcom Snaps Up VMware in $61B Deal
Massive merger will put Broadcom's Symantec and VMware's Carbon Black under one roof.
May 26, 2022
Massive merger will put Broadcom's Symantec and VMware's Carbon Black under one roof.
by Dark Reading Staff, Dark Reading
May 26, 2022
1 min read
Article
VMware, Airline Targeted as Ransomware Chaos Reigns
Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the "GoodWill" strain.
May 26, 2022
Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the "GoodWill" strain.
by Nathan Eddy, Contributing Writer, Dark Reading
May 26, 2022
5 min read
Article
Zero-Click Zoom Bug Allows Code Execution Just by Sending a Message
Google has disclosed a nasty set of six bugs affecting Zoom chat that can be chained together for MitM and RCE attacks, no user interaction required.
May 25, 2022
Google has disclosed a nasty set of six bugs affecting Zoom chat that can be chained together for MitM and RCE attacks, no user interaction required.
by Tara Seals, Managing Editor, News, Dark Reading
May 25, 2022
6 min read
Article
Spring Cleaning Checklist for Keeping Your Devices Safe at Work
Implement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and employees' devices secure.
May 25, 2022
Implement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and employees' devices secure.
by Alex Lisle, Chief Technology Officer, Kryptowire
May 25, 2022
4 min read
Article