www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7863
Public Scan
Submitted URL: http://www.darkreading.com/
Effective URL: https://www.darkreading.com/
Submission: On December 07 via api from US — Scanned from DE
Effective URL: https://www.darkreading.com/
Submission: On December 07 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Outlook 2022 - December 8 Virtual Event * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain? Dec 09, 2021 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code Dec 07, 2021 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Videos > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Outlook 2022 - December 8 Virtual Event * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain? Dec 09, 2021 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code Dec 07, 2021 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Videos > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Outlook 2022 - December 8 Virtual Event * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain? Dec 09, 2021 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code Dec 07, 2021 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Videos > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. Event Cybersecurity Outlook 2022 | A FREE Dark Reading & Black Hat Virtual Event | December 8, 2021 <REGISTER NOW> Alert Check out our NEW section called "DR Tech" for comprehensive coverage of new & emerging cybersecurity technology. PreviousNext TOP STORIES Russian Actors Behind SolarWinds Attack Hit Global Business & Government Targets Dec 06, 2021 Clusters of activity associated with the attack group behind last year's supply chain breach reveal novel techniques, researchers say. In Appreciation: Dark Reading's Tim Wilson Nov 24, 2021 Dark Reading co-founder and editor-in-chief Tim Wilson passed away on Nov. 23. 5 Ways to Keep Fraudsters at Bay Over the Holidays Dec 06, 2021 Organizations want to focus on customer satisfaction and increased revenues during the holiday shopping season. Here are some smart security and fraud protections to keep in mind. Why the C-Suite Doesn't Need Access to All Corporate Data Dec 06, 2021 If zero trust is to work properly, then it must apply to everyone. USB Devices the Common Denominator in All Attacks on Air-Gapped Systems Dec 03, 2021 A new study of 17 malware frameworks shows threat actors always use USB drives to sneak malware into air-gapped environments and then steal data from there. -------------------------------------------------------------------------------- Latest News Microsoft Seizes Malicious Websites Used by Prolific Chinese APT Group The so-called Nikel cyber espionage attack group - aka APT15, Vixen Panda, KE3CHANG, Royal APT, and Playful Dragon - has been in Microsoft's sights since 2016. The so-called Nikel cyber espionage attack group - aka APT15, Vixen Panda, KE3CHANG, Royal APT, and Playful Dragon - has been in Microsoft's sights since 2016. by Dark Reading Staff, Dark Reading Dec 06, 2021 Threat Intelligence 1 min read Article -------------------------------------------------------------------------------- US Military Has Acted Against Ransomware Groups: Report Gen. Paul Nakasoke, head of US Cyber Command and director of the NSA, said the military has taken offensive action against ransomware groups. Gen. Paul Nakasoke, head of US Cyber Command and director of the NSA, said the military has taken offensive action against ransomware groups. by Dark Reading Staff, Dark Reading Dec 06, 2021 Threat Intelligence 1 min read Article -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- Russian Actors Behind SolarWinds Attack Hit Global Business & Government Targets Clusters of activity associated with the attack group behind last year's supply chain breach reveal novel techniques, researchers say. Clusters of activity associated with the attack group behind last year's supply chain breach reveal novel techniques, researchers say. by Kelly Sheridan, Senior Editor Dec 06, 2021 Threat Intelligence 5 min read Article -------------------------------------------------------------------------------- One-Third of Black Friday Shoppers Were Bots, Fake Users Fake traffic observed on Nov. 26 included malicious scrapers, sophisticated botnets, fake accounts, and click farms. Fake traffic observed on Nov. 26 included malicious scrapers, sophisticated botnets, fake accounts, and click farms. by Dark Reading Staff, Dark Reading Dec 03, 2021 Endpoint 1 min read Article -------------------------------------------------------------------------------- NSO Group Spyware Used to Breach US State Dept. Phones At least nine US State Department employee iPhones were targeted with sophisticated spyware developed by the Israeli firm NSO Group. At least nine US State Department employee iPhones were targeted with sophisticated spyware developed by the Israeli firm NSO Group. by Dark Reading Staff, Dark Reading Dec 03, 2021 Endpoint 2 min read Article -------------------------------------------------------------------------------- Logiq.ai Tackles Observability Problem With LogFlow LogFlow addresses data risks associated with machine data pipelines. LogFlow addresses data risks associated with machine data pipelines. by Dark Reading Staff, Dark Reading Dec 03, 2021 DR Tech 2 min read Article -------------------------------------------------------------------------------- USB Devices the Common Denominator in All Attacks on Air-Gapped Systems A new study of 17 malware frameworks shows threat actors always use USB drives to sneak malware into air-gapped environments and then steal data from there. A new study of 17 malware frameworks shows threat actors always use USB drives to sneak malware into air-gapped environments and then steal data from there. by Jai Vijayan, Contributing Writer Dec 03, 2021 Attacks/Breaches 6 min read Article -------------------------------------------------------------------------------- Planned Parenthood LA Breach Compromises 400,000 Patients' Data The breach, which compromised data such as insurance details and prescription information, took place between Oct. 9 and Oct. 17. The breach, which compromised data such as insurance details and prescription information, took place between Oct. 9 and Oct. 17. by Dark Reading Staff, Dark Reading Dec 02, 2021 Attacks/Breaches 2 min read Article -------------------------------------------------------------------------------- More News Latest Commentary Why the C-Suite Doesn't Need Access to All Corporate Data If zero trust is to work properly, then it must apply to everyone. by Rajesh Ganesan, Vice President of Product at ManageEngine Dec 06, 2021 -------------------------------------------------------------------------------- An Insider's Account of Disclosing Vulnerabilities Vendors drag their heels when it comes to identifying software vulnerabilities and are often loath to expedite the fixes. by Elisa Costante, VP of Research of Forescout Labs at Forescout Dec 03, 2021 -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- Breaking the Black Mirror and Other Lessons From Day of Shecurity Diversity brings more varied solutions to major challenges in cybersecurity, just as it does in every other industry. by Kristina Balaam, Senior Security Intelligence Engineer, Lookout Dec 02, 2021 -------------------------------------------------------------------------------- How Will Cyber Threats Impact the Beijing Winter Olympics? NTT helped the International Olympic Committee dodge a security bullet in Tokyo. The world will watch to see if it can pull off a similar feat in Beijing for the upcoming Winter Games. by Daniel Smith, Head of Research for Radware’s Cyber Threat Intelligence division Dec 01, 2021 -------------------------------------------------------------------------------- The Cyber Threats Facing Retailers This Holiday Shopping Season With supply chain delays and an online shopping boom, attacks will come from multiple angles. by Dave Cronin, VP, Cyber Strategy Lead at Capgemini Americas Dec 01, 2021 -------------------------------------------------------------------------------- More Commentary PRODUCTS & RELEASES MITRE Engenuity & Cybrary Surpass 25,000 Users in MITRE ATT&CK Defender Certification ProgramIGI Cybersecurity Introduces CISO Team-as-a-ServiceRansomware, Carding, and Initial Access Brokers: Group-IB Presents Report on Trending CrimesDarktrace Reports 30% More Ransomware Attacks Targeting Organizations During the Holiday PeriodReliaQuest Valued At More Than $1 Billion Following Growth Round Led by KKRCISA Names 23 Members to New Cybersecurity Advisory CommitteeCyCognito Secures $100M to Accelerate Next Evolution of Attack Surface ManagementArmis Now Valued at $3.4BStellar Cyber Raises $38M Series B to Address Need to Provide 360-Degree Visibility Across Entire Attack Surface More Products & Releases Resources White Papers * Protecting Your Mainframe Against Relentless Ransomware * 2021 Ransomware Threat Report * Elastic Cloud Networking: Six Tests You Need Now * Simple Solutions for Continuous Visibility to Active Directory Exposures & Live Attacks * Questions to Ask in Evaluating a Deception-Based Cybersecurity Solution More White Papers Events * Cybersecurity Outlook 2022 - December 8 Virtual Event * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV More Events Webinars * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?Dec 09, 2021 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable CodeDec 07, 2021 * How to Evolve from DevOps to DevSecOpsNov 10, 2021 * Creating an Encryption Strategy for Your EnterpriseNov 11, 2021 * Security Alert Fatigue: Tips for Taking ControlMar 18, 2020 More Webinars CONNECT WITH US REGISTER FOR A SUBSCRIBE TO THE FOLLOW US DARK READING ACCOUNT DARK READING NEWSLETTER @DARKREADING REGISTER FOR A DARK READING ACCOUNT * Gain full access to resources (events, white paper, webinars, reports, etc.) * Single sign-on to all Informa products REGISTER SUBSCRIBE TO THE DARK READING NEWSLETTER Get daily Dark Reading top stories every morning straight into your inbox SUBSCRIBE FOLLOW US @DARKREADING Follow us @darkreading to stay up-to-date with the latest news & insider information about events & more * * * * DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2021 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept