- Introducing 'Secure Access Service Edge'
The industry's latest buzzword is largely a repackaging exercise that bundles a collection of capabilities together and offers them as a cloud-delivered service.
- Cybersecurity's Lament: There are No Cooks in Space
Cybersecurity staff are on edge for the same reason that there are no cooks on the ISS: Organizations are carefully watching expenses for jobs that don't require dedicated team members.
- Building Security Strategies in Sub-Saharan Africa: Trends and Concerns
Security experts discuss the rise in cybercrime affecting sub-Saharan Africa and the necessary changes to improve security.
- BG-IP Vulnerabilities Could be Big Trouble for Customers
Left unpatched, pair of vulnerabilities could give attackers wide access to a victim's application delivery network.
- Anatomy of a Long-Con Phish
A fraudster on LinkedIn used my online profile in an apparent attempt to pull off a wide-ranging scam business venture.
- Making Sense of EARN IT & LAED Bills' Implications for Crypto
After Senate Judiciary Committee pushes EARN IT Act a step closer to ratification, raising further concerns for privacy advocates, here's what to know.
- Considerations for Seamless CCPA Compliance
Three steps to better serve consumers, ensure maximum security, and achieve compliance with the California Consumer Privacy Act.
- 22,900 MongoDB Databases Affected in Ransomware Attack
An attacker scanned for databases misconfigured to expose information and wiped the data, leaving a ransom note behind.
- Lessons from COVID-19 Cyberattacks: Where Do We Go Next?
We need to learn from the attacks and attempts that have occurred in order to prepare for the future.
- COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
- 7 IoT Tips for Home Users
Whether for business or pleasure, you're on your own once you walk into the house with a new Internet of Things device. Here's how to keep everyone secure.
- Attackers Compromised Dozens of News Websites as Part of Ransomware Campaign
Malware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says.
- Chinese Software Company Aisino Uninstalls GoldenSpy Malware
Follow-up sandbox research confirms Aisino knew about the malware in its tax software, though it's still unclear whether it was culpable.
- Businesses Invest in Cloud Security Tools Despite Concerns
A majority of organizations say the acceleration was driven by a need to support more remote employees.
- DHS Shares Data on Top Cyber Threats to Federal Agencies
Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.
- New MacOS Ransomware Hides in Pirated Program
A bogus installer for Little Snitch carries a ransomware hitchhiker.
- Microsoft Issues Out-of-Band Patches for RCE Flaws
Vulnerabilities had not been exploited or publicly disclosed before fixes were released, Microsoft reports.
- 4 Steps to a More Mature Identity Program
Security has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.
- Another COVID-19 Side Effect: Rising Nation-State Cyber Activity
While financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs.
- Ripple20 Threatens Increasingly Connected Medical Devices
A series of IoT vulnerabilities could put hospital networks, medical data, and patient safety at risk.