News & Commentary

Commentary

Mining malware ebbs and flows with the price of cryptocurrencies, and given the momentum on price is upward, cryptojacking is a very present threat. Matt Honea BySenior Director, Cybersecurity, Guidewire Software, 10/1/2020 0 comments Read | Post a Comment

News

With twice as much malware now targeting Macs, IT pros need to scramble to adapt to a large, and likely permanent, work-from-home population, experts say. Robert Lemos ByContributing Writer, 10/1/2020 0 comments Read | Post a Comment

News

News

A look at the state of Iran's cyber operations as the US puts the squeeze on it with a pile of indictments and sanctions. Kelly Jackson Higgins ByExecutive Editor at Dark Reading, 9/30/2020 0 comments Read | Post a Comment

News

Scanner, which just became generally available, lets developers spot problems before code gets into production. Jai Vijayan ByContributing Writer, 9/30/2020 0 comments Read | Post a Comment

News

Cloud security experts explain which misconfigurations are most common and highlight other areas of the cloud likely to threaten businesses. Kelly Sheridan ByStaff Editor, Dark Reading, 9/30/2020 0 comments Read | Post a Comment

At times, vague coverage can actually work for you. By Edge Editors Dark Reading, 9/30/2020 0 comments Read | Post a Comment

News

With cybersecurity threats growing exponentially, it has never been more important to put together an efficient cyber-risk management policy, and NIST's framework can help. By By Julian Hall, Freelance Journalist and Copywriter, Textual Healing , 9/30/2020 0 comments Read | Post a Comment

Commentary

Operations technology was once considered low risk, at least until the virus came along and re-arranged the threat landscape. John Livingston ByCEO of Verve Industrial Protection, 9/30/2020 0 comments Read | Post a Comment

Quick Hits

Cyberattacker TA2552 primarily targets Spanish speakers with messages that leverage a narrow range of themes and popular brands. Dark Reading Staff By, 9/30/2020 0 comments Read | Post a Comment

Commentary

News

Malware-based attacks are out, phishing is in, along with credential stuffing and business email compromise. Microsoft recommends defensive tactics in its new report on rising threats. Robert Lemos ByContributing Writer, 9/29/2020 0 comments Read | Post a Comment

Quick Hits

News

In a least one instance, the Palmerworm APT group was able to remain undetected on a compromised system for nearly six months, according to Symantec. Jai Vijayan ByContributing Writer, 9/29/2020 0 comments Read | Post a Comment

Remote workers and scattered teams are relying on Slack more and more for messaging and collaboration. Here are a few extra tips for keeping data and systems more secure when using Slack. Pam Baker ByContributing Writer, 9/29/2020 0 comments Read | Post a Comment

Quick Hits

Synopsys issues an advisory for vulnerabilities affecting the chipsets of wireless routers from Qualcomm, Mediatek, and Realtek. Dark Reading Staff By, 9/29/2020 0 comments Read | Post a Comment

Commentary

Enabling engineers to share responsibility for security and empowering them to erase common vulnerabilities are good starting points. Matias Madou ByCTO and co-founder, Secure Code Warrior, 9/29/2020 0 comments Read | Post a Comment

News

Microsoft shuts down Azure Active Directory instances used by attackers to evade detection and warns that the use of open source tools by espionage groups is growing. Robert Lemos ByContributing Writer, 9/29/2020 0 comments Read | Post a Comment

Commentary

Step up, put the architecture and organization in place, and take responsibility. If you don't, who will? Dan Hubbard ByCEO at Lacework, 9/29/2020 0 comments Read | Post a Comment