www.darkreading.com Open in urlscan Pro
2606:4700::6811:7863  Public Scan

Submitted URL: http://www.darkreading.com/
Effective URL: https://www.darkreading.com/
Submission: On December 07 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 

Event
Cybersecurity Outlook 2022 | A FREE Dark Reading & Black Hat Virtual Event |
December 8, 2021 <REGISTER NOW>
Alert
Check out our NEW section called "DR Tech" for comprehensive coverage of new &
emerging cybersecurity technology.
PreviousNext
TOP STORIES
Russian Actors Behind SolarWinds Attack Hit Global Business & Government Targets

Dec 06, 2021

Clusters of activity associated with the attack group behind last year's supply
chain breach reveal novel techniques, researchers say.

In Appreciation: Dark Reading's Tim Wilson
Nov 24, 2021
Dark Reading co-founder and editor-in-chief Tim Wilson passed away on Nov. 23.
5 Ways to Keep Fraudsters at Bay Over the Holidays
Dec 06, 2021
Organizations want to focus on customer satisfaction and increased revenues
during the holiday shopping season. Here are some smart security and fraud
protections to keep in mind.
Why the C-Suite Doesn't Need Access to All Corporate Data
Dec 06, 2021
If zero trust is to work properly, then it must apply to everyone.
USB Devices the Common Denominator in All Attacks on Air-Gapped Systems
Dec 03, 2021
A new study of 17 malware frameworks shows threat actors always use USB drives
to sneak malware into air-gapped environments and then steal data from there.

--------------------------------------------------------------------------------

Latest News

Microsoft Seizes Malicious Websites Used by Prolific Chinese APT Group

The so-called Nikel cyber espionage attack group - aka APT15, Vixen Panda,
KE3CHANG, Royal APT, and Playful Dragon - has been in Microsoft's sights since
2016.

The so-called Nikel cyber espionage attack group - aka APT15, Vixen Panda,
KE3CHANG, Royal APT, and Playful Dragon - has been in Microsoft's sights since
2016.

by Dark Reading Staff, Dark Reading

Dec 06, 2021

Threat Intelligence
1 min read

Article

--------------------------------------------------------------------------------

US Military Has Acted Against Ransomware Groups: Report

Gen. Paul Nakasoke, head of US Cyber Command and director of the NSA, said the
military has taken offensive action against ransomware groups.

Gen. Paul Nakasoke, head of US Cyber Command and director of the NSA, said the
military has taken offensive action against ransomware groups.

by Dark Reading Staff, Dark Reading

Dec 06, 2021

Threat Intelligence
1 min read

Article

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

Russian Actors Behind SolarWinds Attack Hit Global Business & Government Targets

Clusters of activity associated with the attack group behind last year's supply
chain breach reveal novel techniques, researchers say.

Clusters of activity associated with the attack group behind last year's supply
chain breach reveal novel techniques, researchers say.

by Kelly Sheridan, Senior Editor

Dec 06, 2021

Threat Intelligence
5 min read

Article

--------------------------------------------------------------------------------

One-Third of Black Friday Shoppers Were Bots, Fake Users

Fake traffic observed on Nov. 26 included malicious scrapers, sophisticated
botnets, fake accounts, and click farms.

Fake traffic observed on Nov. 26 included malicious scrapers, sophisticated
botnets, fake accounts, and click farms.

by Dark Reading Staff, Dark Reading

Dec 03, 2021

Endpoint
1 min read

Article

--------------------------------------------------------------------------------

NSO Group Spyware Used to Breach US State Dept. Phones

At least nine US State Department employee iPhones were targeted with
sophisticated spyware developed by the Israeli firm NSO Group.

At least nine US State Department employee iPhones were targeted with
sophisticated spyware developed by the Israeli firm NSO Group.

by Dark Reading Staff, Dark Reading

Dec 03, 2021

Endpoint
2 min read

Article

--------------------------------------------------------------------------------

Logiq.ai Tackles Observability Problem With LogFlow

LogFlow addresses data risks associated with machine data pipelines.

LogFlow addresses data risks associated with machine data pipelines.

by Dark Reading Staff, Dark Reading

Dec 03, 2021

DR Tech
2 min read

Article

--------------------------------------------------------------------------------

USB Devices the Common Denominator in All Attacks on Air-Gapped Systems

A new study of 17 malware frameworks shows threat actors always use USB drives
to sneak malware into air-gapped environments and then steal data from there.

A new study of 17 malware frameworks shows threat actors always use USB drives
to sneak malware into air-gapped environments and then steal data from there.

by Jai Vijayan, Contributing Writer

Dec 03, 2021

Attacks/Breaches
6 min read

Article

--------------------------------------------------------------------------------

Planned Parenthood LA Breach Compromises 400,000 Patients' Data

The breach, which compromised data such as insurance details and prescription
information, took place between Oct. 9 and Oct. 17.

The breach, which compromised data such as insurance details and prescription
information, took place between Oct. 9 and Oct. 17.

by Dark Reading Staff, Dark Reading

Dec 02, 2021

Attacks/Breaches
2 min read

Article

--------------------------------------------------------------------------------

More News

Latest Commentary

Why the C-Suite Doesn't Need Access to All Corporate Data

If zero trust is to work properly, then it must apply to everyone.

by Rajesh Ganesan, Vice President of Product at ManageEngine

Dec 06, 2021

--------------------------------------------------------------------------------

An Insider's Account of Disclosing Vulnerabilities

Vendors drag their heels when it comes to identifying software vulnerabilities
and are often loath to expedite the fixes.

by Elisa Costante, VP of Research of Forescout Labs at Forescout

Dec 03, 2021

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

Breaking the Black Mirror and Other Lessons From Day of Shecurity

Diversity brings more varied solutions to major challenges in cybersecurity,
just as it does in every other industry.

by Kristina Balaam, Senior Security Intelligence Engineer, Lookout

Dec 02, 2021

--------------------------------------------------------------------------------

How Will Cyber Threats Impact the Beijing Winter Olympics?

NTT helped the International Olympic Committee dodge a security bullet in Tokyo.
The world will watch to see if it can pull off a similar feat in Beijing for the
upcoming Winter Games.

by Daniel Smith, Head of Research for Radware’s Cyber Threat Intelligence
division

Dec 01, 2021

--------------------------------------------------------------------------------

The Cyber Threats Facing Retailers This Holiday Shopping Season

With supply chain delays and an online shopping boom, attacks will come from
multiple angles.

by Dave Cronin, VP, Cyber Strategy Lead at Capgemini Americas

Dec 01, 2021

--------------------------------------------------------------------------------

More Commentary



PRODUCTS & RELEASES



MITRE Engenuity & Cybrary Surpass 25,000 Users in MITRE ATT&CK Defender
Certification ProgramIGI Cybersecurity Introduces CISO
Team-as-a-ServiceRansomware, Carding, and Initial Access Brokers: Group-IB
Presents Report on Trending CrimesDarktrace Reports 30% More Ransomware Attacks
Targeting Organizations During the Holiday PeriodReliaQuest Valued At More Than
$1 Billion Following Growth Round Led by KKRCISA Names 23 Members to New
Cybersecurity Advisory CommitteeCyCognito Secures $100M to Accelerate Next
Evolution of Attack Surface ManagementArmis Now Valued at $3.4BStellar Cyber
Raises $38M Series B to Address Need to Provide 360-Degree Visibility Across
Entire Attack Surface
More Products & Releases
Resources
White Papers
 * Protecting Your Mainframe Against Relentless Ransomware
 * 2021 Ransomware Threat Report
 * Elastic Cloud Networking: Six Tests You Need Now
 * Simple Solutions for Continuous Visibility to Active Directory Exposures &
   Live Attacks
 * Questions to Ask in Evaluating a Deception-Based Cybersecurity Solution

More White Papers
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV

More Events
Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of
   rain?Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable CodeDec 07, 2021
 * How to Evolve from DevOps to DevSecOpsNov 10, 2021
 * Creating an Encryption Strategy for Your EnterpriseNov 11, 2021
 * Security Alert Fatigue: Tips for Taking ControlMar 18, 2020

More Webinars

CONNECT WITH US

REGISTER FOR A

SUBSCRIBE TO THE

FOLLOW US

DARK READING ACCOUNT

DARK READING NEWSLETTER

@DARKREADING

REGISTER FOR A

DARK READING ACCOUNT

 * Gain full access to resources (events, white paper, webinars, reports, etc.)
 * Single sign-on to all Informa products

REGISTER

SUBSCRIBE TO THE

DARK READING NEWSLETTER

Get daily Dark Reading top stories every morning straight into your inbox

SUBSCRIBE

FOLLOW US

@DARKREADING

Follow us @darkreading to stay up-to-date with the latest news & insider
information about events & more

 * 
 * 
 * 
 * 



DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2021 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept