All Malware Data Breach Privacy APT Vulnerability General
Dark Reading General

What Organizations Need to Change When Managing Printers

Ask the Expert: Organizations need to close the ownership vacuum, establish durable security controls, and ensure printers are protected as rigorously as other endpoints.

Dark Reading General

[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses

Dark Reading Malware

'Reynolds' Bundles BYOVD With Ransomware Payload

Researchers discovered a newly disclosed vulnerable driver embedded in Reynolds' ransomware, illustrating the increasing popularity of the defense-evasion technique.

Dark Reading Malware

TeamPCP Turns Cloud Infrastructure Into Crime Bots

The threat actor has been compromising cloud environments at scale with automated worm-like attacks on exposed services and interfaces.

Dark Reading Malware

Warlock Gang Breaches SmarterTools Via SmarterMail Bugs

The ransomware group breached SmarterTools through a vulnerability in the company's own SmarterMail product.

Dark Reading General

TransUnion's Real Networks Deal Focuses on Robocall Blocking

The acquisition allows the credit reporting agency to add SMS spam and scam prevention to its robocall blocking capabilities.

Dark Reading General

OT Attacks Get Scary With 'Living-off-the-Plant' Techniques

Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.

Dark Reading General

Automaker Secures the Supply Chain With Developer-Friendly Platform

How a platform engineering team embeds supply chain security into infrastructure without slowing developers.

Dark Reading General

How to Stay on Top of Future Threats With a Cutting-Edge SOC

CISOs should focus on harnessing and securing AI and building new skills among their people. Vision and change management can transform security.

Dark Reading Vulnerability

Microsoft Patches 6 Actively Exploited Zero-Days

Three of those zero-days are security feature bypass flaws, which give attackers a way to slip past built-in protections in multiple Microsoft products.

Dark Reading APT

In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware'

With access to SIM, location data, and a preview of recent SMSes, attackers have everything they need for account takeover or targeted social engineering.

Dark Reading Data Breach

SolarWinds WHD Attacks Highlight Risks of Exposed Apps

Organizations that have exposed their instances of Web Help Desk to the public Internet have inadvertently made them prime targets for attackers.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33