www.darkreading.com Open in urlscan Pro
2606:4700::6811:7963  Public Scan

URL: https://www.darkreading.com/
Submission: On January 31 via manual from JP — Scanned from JP

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Technology - March 24 Dark Reading Virtual Event
   
 * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More
   

Webinars
 * Developing an Effective Threat Intelligence Program for Your Enterprise
   Feb 10, 2022
 * 2021 DDoS Attack Trends: Year in Review
   Feb 09, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Crowdstrike >
Partner Perspectives: Darktrace >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Technology - March 24 Dark Reading Virtual Event
   
 * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More
   

Webinars
 * Developing an Effective Threat Intelligence Program for Your Enterprise
   Feb 10, 2022
 * 2021 DDoS Attack Trends: Year in Review
   Feb 09, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Crowdstrike >
Partner Perspectives: Darktrace >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Technology - March 24 Dark Reading Virtual Event
   
 * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More
   

Webinars
 * Developing an Effective Threat Intelligence Program for Your Enterprise
   Feb 10, 2022
 * 2021 DDoS Attack Trends: Year in Review
   Feb 09, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Crowdstrike >
Partner Perspectives: Darktrace >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 
 3. 
 4. 

Event
Developing an Effective Threat Intelligence Program for Your Enterprise |
February 10 Webinar | <REGISTER NOW>
Event
Best Practices for Extending Identity & Access Management to the Cloud |
February 15 Webinar | <REGISTER NOW>
Event
2021 DDoS Attack Trends: Year in Review | February 9 Webinar | <REGISTER NOW>
Event
Cybersecurity Technology: Where It's Going & How To Get There | March 24 Virtual
Event | <REGISTER NOW>
PreviousNext
TOP STORIES
More Security Flaws Found in Apple's OS Technologies

Jan 28, 2022

Apple's updates this week included fixes for two zero-day flaws, several code
execution bugs, and vulnerabilities that allowed attackers to bypass its core
security protections.

The Looming CISO Mental Health Crisis — and What to Do About It, Part 1
Jan 28, 2022
The next big threat to corporate security may not be a new strain of malware or
innovative attacker tactics, techniques, and processes. It may be our own mental
health.

Navigating Nobelium: Lessons From Cloud Hopper & NotPetya
Jan 28, 2022
Nearly every organization should assume that it is at risk, but there are ways
of countering the tactics used by advanced persistent threats.
Phishing Simulation Study Shows Why These Attacks Remain Pervasive
Jan 27, 2022
Email purportedly from human resources convinced more than one-fifth of
recipients to click, the majority of whom did so within an hour of receiving the
fraudulent message.

--------------------------------------------------------------------------------

Latest News

More Security Flaws Found in Apple's OS Technologies

Apple's updates this week included fixes for two zero-day flaws, several code
execution bugs, and vulnerabilities that allowed attackers to bypass its core
security protections.

Apple's updates this week included fixes for two zero-day flaws, several code
execution bugs, and vulnerabilities that allowed attackers to bypass its core
security protections.

by Jai Vijayan, Contributing Writer

Jan 28, 2022

Vulnerabilities/Threats
6 min read

Article

--------------------------------------------------------------------------------

Phishing Simulation Study Shows Why These Attacks Remain Pervasive

Email purportedly from human resources convinced more than one-fifth of
recipients to click, the majority of whom did so within an hour of receiving the
fraudulent message.

Email purportedly from human resources convinced more than one-fifth of
recipients to click, the majority of whom did so within an hour of receiving the
fraudulent message.

by Robert Lemos, Contributing Writer

Jan 27, 2022

Threat Intelligence
5 min read

Article

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

With Cloud the Norm, Insiders Are Everywhere — and Pose Greater Risk

After companies accelerated their adoption of cloud infrastructure, remote
workers are now insiders and pose significant risks, and costs, to companies.

After companies accelerated their adoption of cloud infrastructure, remote
workers are now insiders and pose significant risks, and costs, to companies.

by Robert Lemos, Contributing Writer

Jan 27, 2022

Vulnerabilities/Threats
4 min read

Article

--------------------------------------------------------------------------------

JFrog's New Tools Flag Malicious JavaScript Packages

The three open source tools flag malicious JavaScript packages before they are
downloaded and installed from the npm package manager.

The three open source tools flag malicious JavaScript packages before they are
downloaded and installed from the npm package manager.

by Dark Reading Staff, Dark Reading

Jan 26, 2022

DR Tech
4 min read

Article

--------------------------------------------------------------------------------

Millions of Routers, IoT Devices at Risk as Malware Source Code Surfaces on
GitHub

"BotenaGo" contains exploits for more than 30 vulnerabilities in multiple vendor
products and is being used to spread Mirai botnet malware, security vendor says.

"BotenaGo" contains exploits for more than 30 vulnerabilities in multiple vendor
products and is being used to spread Mirai botnet malware, security vendor says.

by Jai Vijayan, Contributing Writer

Jan 26, 2022

Vulnerabilities/Threats
4 min read

Article

--------------------------------------------------------------------------------

OMB Issues Zero-Trust Strategy for Federal Agencies

Federal officials tout the strategy as a more proactive approach to securing
government networks.

Federal officials tout the strategy as a more proactive approach to securing
government networks.

by Dark Reading Staff, Dark Reading

Jan 26, 2022

Risk
1 min read

Article

--------------------------------------------------------------------------------

Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit

The memory corruption vulnerability in a policy component installed by default
on most Linux distributions allows any user to become root. Researchers have
already reproduced the exploit.

The memory corruption vulnerability in a policy component installed by default
on most Linux distributions allows any user to become root. Researchers have
already reproduced the exploit.

by Robert Lemos, Contributing Writer

Jan 26, 2022

Vulnerability Management
4 min read

Article

--------------------------------------------------------------------------------

VPNLab.net Shuttered in Latest Spate of Global Takedowns

Europol and 10 nations seized servers and disconnected the anonymous network
allegedly used by many cybercriminals in the latest effort to hobble cybercrime
groups.

Europol and 10 nations seized servers and disconnected the anonymous network
allegedly used by many cybercriminals in the latest effort to hobble cybercrime
groups.

by Robert Lemos, Contributing Writer

Jan 26, 2022

Attacks/Breaches
4 min read

Article

--------------------------------------------------------------------------------

More News

Latest Commentary

Navigating Nobelium: Lessons From Cloud Hopper & NotPetya

Nearly every organization should assume that it is at risk, but there are ways
of countering the tactics used by advanced persistent threats.

by James Campbell, Co-Founder and CEO, Cado Security

Jan 28, 2022

--------------------------------------------------------------------------------

IFSEC Seeks Security Pros for New Survey on Physical Access Control

Take part in an IFSEC Global survey to better understand the state of access
control in 2022.

by IFSEC Global, Staff

Jan 27, 2022

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

Log4j Proved Public Disclosure Still Helps Attackers

Disclosure also puts organizations in the awkward position of trying to mitigate
a vulnerability without something like a vendor patch to do the job.

by Alex Haynes, Chief Information Security Officer, CDL

Jan 27, 2022

--------------------------------------------------------------------------------

Cybersecurity Is Broken: How We Got Here & How to Start Fixing It

It's not just your imagination — malicious threats have exponentially increased
organizational risk.

by David Ratner, CEO, Hyas

Jan 26, 2022

--------------------------------------------------------------------------------

Why It's Time to Rethink Incident Response

The incident response landscape has changed drastically, largely from shifting
attitudes among insurance companies and, to some extent, business customers
feeling the pain of security incidents.

by J.R. Cunningham, Chief Security Officer, Nuspire

Jan 26, 2022

--------------------------------------------------------------------------------

More Commentary



Partner Perspectives

How Modern Log Management Strengthens Enterprises’ Security PostureIf security
teams are not logging everything, they are increasing security risk and making
it more difficult to investigate and recover from a data breach. Modern log
management goes beyond just a SIEM.
Dec 21, 2021
Read More From Crowdstrike


PRODUCTS & RELEASES



Barracuda Expands Email and Endpoint Protection Capabilities in MSP Security
OfferingsCensys Completes $35 Million Series B Funding Round Led by Intel
Capital ArmorCode Closes $11 Million Seed Funding RoundLink11 Sets New Standards
in DDoS Protection as Test WinnerRegistration for the (ISC)² Entry-Level
Cybersecurity Certification Exam Pilot Program Is Now Open(ISC)² Appoints Jon
France, CISSP, as Chief Information Security OfficerCisco's Kenna Security
Research Shows the Relative Likelihood of an Organization Being Exploited(ISC)²
Launches Entry-Level Cybersecurity CourseKaspersky Announces Takedown Service
More Products & Releases
Resources
White Papers
 * Zero Trust and the Power of Isolation for Threat Prevention
 * Zero Trust in Real Life
 * How to avoid a data breach
 * 6 Steps to Build & Scale a Risk-Based AppSec Program
 * Forrester TEI Spotlight: Prisma Access

More White Papers
Events
 * Cybersecurity Technology - March 24 Dark Reading Virtual Event
 * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV

More Events
Webinars
 * Developing an Effective Threat Intelligence Program for Your EnterpriseFeb
   10, 2022
 * 2021 DDoS Attack Trends: Year in ReviewFeb 09, 2022
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable CodeDec 07, 2021
 * Bringing Zero Trust to Cloud Native ApplicationsJan 27, 2022
 * Monitoring and Securing Remote and Work-From-Home EnvironmentsFeb 02, 2022

More Webinars

CONNECT WITH US

REGISTER FOR A

SUBSCRIBE TO THE

FOLLOW US

DARK READING ACCOUNT

DARK READING NEWSLETTER

@DARKREADING

REGISTER FOR A

DARK READING ACCOUNT

 * Gain full access to resources (events, white paper, webinars, reports, etc.)
 * Single sign-on to all Informa products

REGISTER

SUBSCRIBE TO THE

DARK READING NEWSLETTER

Get daily Dark Reading top stories every morning straight into your inbox

SUBSCRIBE

FOLLOW US

@DARKREADING

Follow us @darkreading to stay up-to-date with the latest news & insider
information about events & more

 * 
 * 
 * 
 * 



DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2022 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept