News & Commentary

News

Malware-based attacks are out, phishing is in, along with credential stuffing and business email compromise. Microsoft recommends defensive tactics in its new report on rising threats. Robert Lemos ByContributing Writer, 9/29/2020 0 comments Read | Post a Comment

Quick Hits

News

In a least one instance, the Palmerworm APT group was able to remain undetected on a compromised system for nearly six months, according to Symantec. Jai Vijayan ByContributing Writer, 9/29/2020 0 comments Read | Post a Comment

Remote workers and scattered teams are relying on Slack more and more for messaging and collaboration. Here are a few extra tips for keeping data and systems more secure when using Slack. Pam Baker ByAuthor and freelance writer, 9/29/2020 0 comments Read | Post a Comment

Quick Hits

Synopsys issues an advisory for vulnerabilities affecting the chipsets of wireless routers from Qualcomm, Mediatek, and Realtek. Dark Reading Staff By, 9/29/2020 0 comments Read | Post a Comment

Commentary

Enabling engineers to share responsibility for security and empowering them to erase common vulnerabilities are good starting points. Matias Madou ByCTO and co-founder, Secure Code Warrior, 9/29/2020 0 comments Read | Post a Comment

News

Microsoft shuts down Azure Active Directory instances used by attackers to evade detection and warns that the use of open source tools by espionage groups is growing. Robert Lemos ByContributing Writer, 9/29/2020 0 comments Read | Post a Comment

Commentary

Step up, put the architecture and organization in place, and take responsibility. If you don't, who will? Dan Hubbard ByCEO at Lacework, 9/29/2020 0 comments Read | Post a Comment

Quick Hits

Quick Hits

UHS reportedly hit with ransomware that took down its network that supports hundreds of healthcare facilities and hospitals. Dark Reading Staff By, 9/28/2020 0 comments Read | Post a Comment

Commentary

News

While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue. Robert Lemos ByContributing Writer, 9/28/2020 0 comments Read | Post a Comment

News

Until all domain controllers are updated, the entire infrastructure remains vulnerable, the DHS' CISA warns. Jai Vijayan ByContributing Writer, 9/25/2020 0 comments Read | Post a Comment

News

At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare. Kelly Sheridan ByStaff Editor, Dark Reading, 9/25/2020 0 comments Read | Post a Comment

News

Application security in a DevOps world takes more than great teamwork among security, developers, and operations staff. Ericka Chickowski ByContributing Writer, 9/25/2020 0 comments Read | Post a Comment

News

The dream of RASP is to empower applications to protect themselves. How close do current implementations get to living the dream? Here's what to know. Nicole Ferraro ByContributing Writer, 9/25/2020 0 comments Read | Post a Comment

Commentary

The wide variety of devices attached to the Internet of Things offers a rich target for purveyors of ransomware. Ed Koehler ByDistinguished Principal Security Engineer, Office of CTO, at Extreme Network, 9/25/2020 0 comments Read | Post a Comment