Dark Reading – Includes 12 sections, each of which drills deeper into the enterprise security challenge: Analytics, Attacks & Breaches, Application Security, Cloud Security, Endpoint, IoT, Operations, Perimeter, Physical Security, Risk, Threat Intelligence, and Vulnerabilities and Threats.
Brought to you by technewsfavs.com
- Chatbot Army Deployed in Latest DHL Shipping Phish
- Partial Patching Still Provides Strong Protection Against APTs
- Quantum Key Distribution for a Post-Quantum World
- Microsoft Rushes a Fix After May Patch Tuesday Breaks Authentication
- Authentication Is Static, Yet Attackers Are Dynamic: Filling the Critical Gap
- New Open Source Project Brings Consistent Identity Access to Multicloud
- More Than 1,000 Cybersecurity Career Pursuers Complete the (ISC)² Entry-Level Cybersecurity Certification Pilot Exam
- Deadbolt Ransomware Targeting QNAP NAS Devices
- Pro-Russian Information Operations Escalate in Ukraine War
- DoJ Won't Charge 'Good Faith' Security Researchers
- Majority of Kubernetes API Servers Exposed to the Public Internet
- Dig Exits Stealth With $11M for Cloud Data Detection and Response Solution
- 6 Scary Tactics Used in Mobile App Attacks
- Phishing Attacks for Initial Access Surged 54% in Q1
- MITRE Creates Framework for Supply Chain Security
- CISA to Federal Agencies: Patch VMware Products Now or Take Them Offline
- How Pwn2Own Made Bug Hunting a Real Sport
- Lacework Integrates Kubernetes Features to Enhance Security Across Multi-Cloud Environments
- CISA: Unpatched F5 BIG-IP Devices Under Active Attack
- The Industry Must Better Secure Open Source Code From Threat Actors
- Microsoft Flags Attack Targeting SQL Servers With Novel Approach
- 2022: The Year Zero Trust Becomes Mainstream
- How Threat Actors Are a Click Away From Becoming Quasi-APTs
- Critical VMware Bug Exploits Continue, as Botnet Operators Jump In
- FBI: E-Tailers, Beware Web Injections for Scraping Credit-Card Data, Backdoors
- New Venture Capital Fund Focuses on Emerging Cybersecurity Tech
- (ISC)² Unveils 100K in the UK Scheme to Expand the UK Cybersecurity Workforce with 100,000 Free Entry-Level Certification Exams and Education Opportunities
- Rubrik Launches Rubrik Security Cloud to Secure Data, Wherever it Lives, Across Enterprise, Cloud, and SaaS
- Widespread Attack on WordPress Sites Targets Tatsu Builder Plug-in
- Training to Beat a Bad Cybersecurity Culture
- Local Government's Guide to Minimizing the Risk of a Cyberattack
- Google Cloud Aims to Share Its Vetted Open Source Ecosystem
- Barracuda Expands Cloud-Native SASE Platform to Protect Hybrid Cloud Deployments
- Qualys Adds Custom Assessment and Remediation to Its Cloud Platform
- YouMail Launches YouMail Protective Services for Carriers and Enterprises
- Ericom’s New ZTEdge Web Application Isolation Addresses Security Concerns Associated With Third-Party Contractor Application Access
- Bitdefender Launches Identity Theft Protection Service for U.S. Consumers
- How Mobile Networks Have Become a Front in the Battle for Ukraine
- RF Technologies Releases Safe Place Staff Protection for Healthcare Settings
- TorchLight Expands Cybersecurity Services With MDR Sentinel in Partnership With Microsoft
- 50% of Orgs Rely on Email to Manage Security
- iPhones Open to Attack Even When Off, Researchers Say
- Open Source Security Gets $30M Boost From Industry Heavy Hitters
- You Can't Opt Out of Citizen Development
- NSA Cyber Chief Vows 'No Backdoors' in Quantum Encryption Standards
- Name That Toon: Knives Out
- Critical Zyxel Firewall Bug Under Active Attack After PoC Exploit Debut
- US Cyber Director: Forging a Cybersecurity Social Contract Is Not Optional
- Me, My Digital Self, and I: Why Identity Is the Foundation of a Decentralized Future
- How to Turn a Coke Can Into an Eavesdropping Device
- US Agrees to International Electronic Cybercrime Evidence Swap
- CISO Shares Top Strategies to Communicate Security's Value to the Biz
- Black Hat Asia: Democracy's Survival Depends on Taming Technology
- Linux, OpenSSF Champion Plan to Improve Open Source Security
- Log4Shell Exploit Threatens Enterprise Data Lakes, AI Poisoning
- Data Transformation: 3 Sessions to Attend at RSA 2022
- How to Avoid Falling Victim to PayOrGrief's Next Rebrand
- Transforming SQL Queries Bypasses WAF Security
- Black Hat Asia: Firmware Supply Chain Woes Plague Device Security
- 3 Predictors of Cybersecurity Startup Success
- Egnyte Enhances Program for Managed Service Providers
- StackHawk Raises $20.7 Million in Series B Funding for Developer-First Application and API Security Testing
- Cloud Firm Appian Awarded $2B in Trade Secret Cyber-Theft Lawsuit
- Needs Improvement: Scoring Biden's Cyber Executive Order
- How Can Your Business Defend Itself Against Fraud-as-a-Service?
- Known macOS Vulnerabilities Led Researcher to Root Out New Flaws
- 5 Years That Altered the Ransomware Landscape
- On the Air With Dark Reading News Desk at Black Hat Asia 2022
- PlainID Debuts Authorization-as-a-Service Platform
- Threat Actors Are Stealing Data Now to Decrypt When Quantum Computing Comes
- Ready, IAM, Fire: How Weak IAM Makes You a Target
- Microsoft Simplifies Security Patching Process for Exchange Server
- Orca Security Unveils Context-Aware Shift Left Security to Identify and Prevent Cloud Application Security Issues Earlier
- Man Sentenced for Stealing from PayPal Accounts in Wire Fraud Scheme
- Fraudulent 'Bot-driven' College Enrollment up 50%, New Study Finds
- NSA Warns Managed Service Providers Are Now Prime Targets for Cyberattacks
- Keeper Security Partners with SHI International for New Fully Managed IT Service (SHI Complete)
- Top 6 Security Threats Targeting Remote Workers
- Concentric AI Raises Series A Funding Led by Ballistic Ventures to Autonomously Secure Business-Critical Data
- Breaking Down the Strengthening American Cybersecurity Act
- Quantum Ransomware Strikes Quickly, How to Prepare and Recover
- Material Security Reaches $1.1 Billion Valuation for ‘Zero Trust’ Security on Microsoft and Google Email
- SpyCloud Report: Fortune 1000 Employees Pose Elevated Cyber Risk to Companies
- Cyber-Espionage Attack Drops Post-Exploit Malware Framework on Microsoft Exchange Servers
- The Danger of Online Data Brokers
- Vanity URLs Could Be Spoofed for Social Engineering Attacks
- Google Will Use Mobile Devices to Thwart Phishing Attacks
- Novel Nerbian RAT Lurks Behind Faked COVID Safety Emails
- What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers
- US Pledges to Help Ukraine Keep the Internet and Lights On
- Lincoln College Set to Close After Crippling Cyberattack
- Cybercriminals Are Increasingly Exploiting Vulnerabilities in Windows Print Spooler
- Arctic Wolf Launches Arctic Wolf Labs Focused on Security Operations Research and Intelligence Reporting
- 5-Buck DCRat Malware Foretells a Worrying Cyber Future
- Onapsis Announces New Offering to Jumpstart Security for SAP Customers
- Mastering the New CISO Playbook
- Nokia Opens Cybersecurity Testing Lab
- How to Check If Your F5 BIG-IP Device Is Vulnerable
- Joker, Other Fleeceware Surges Back Into Google Play
- Costa Rica Declares State of Emergency Under Sustained Conti Cyberattacks