www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7963
Public Scan
URL:
https://www.darkreading.com/
Submission: On January 31 via manual from JP — Scanned from JP
Submission: On January 31 via manual from JP — Scanned from JP
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Technology - March 24 Dark Reading Virtual Event * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More Webinars * Developing an Effective Threat Intelligence Program for Your Enterprise Feb 10, 2022 * 2021 DDoS Attack Trends: Year in Review Feb 09, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Crowdstrike > Partner Perspectives: Darktrace > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Technology - March 24 Dark Reading Virtual Event * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More Webinars * Developing an Effective Threat Intelligence Program for Your Enterprise Feb 10, 2022 * 2021 DDoS Attack Trends: Year in Review Feb 09, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Crowdstrike > Partner Perspectives: Darktrace > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Cybersecurity Technology - March 24 Dark Reading Virtual Event * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More Webinars * Developing an Effective Threat Intelligence Program for Your Enterprise Feb 10, 2022 * 2021 DDoS Attack Trends: Year in Review Feb 09, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Crowdstrike > Partner Perspectives: Darktrace > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. 4. Event Developing an Effective Threat Intelligence Program for Your Enterprise | February 10 Webinar | <REGISTER NOW> Event Best Practices for Extending Identity & Access Management to the Cloud | February 15 Webinar | <REGISTER NOW> Event 2021 DDoS Attack Trends: Year in Review | February 9 Webinar | <REGISTER NOW> Event Cybersecurity Technology: Where It's Going & How To Get There | March 24 Virtual Event | <REGISTER NOW> PreviousNext TOP STORIES More Security Flaws Found in Apple's OS Technologies Jan 28, 2022 Apple's updates this week included fixes for two zero-day flaws, several code execution bugs, and vulnerabilities that allowed attackers to bypass its core security protections. The Looming CISO Mental Health Crisis — and What to Do About It, Part 1 Jan 28, 2022 The next big threat to corporate security may not be a new strain of malware or innovative attacker tactics, techniques, and processes. It may be our own mental health. Navigating Nobelium: Lessons From Cloud Hopper & NotPetya Jan 28, 2022 Nearly every organization should assume that it is at risk, but there are ways of countering the tactics used by advanced persistent threats. Phishing Simulation Study Shows Why These Attacks Remain Pervasive Jan 27, 2022 Email purportedly from human resources convinced more than one-fifth of recipients to click, the majority of whom did so within an hour of receiving the fraudulent message. -------------------------------------------------------------------------------- Latest News More Security Flaws Found in Apple's OS Technologies Apple's updates this week included fixes for two zero-day flaws, several code execution bugs, and vulnerabilities that allowed attackers to bypass its core security protections. Apple's updates this week included fixes for two zero-day flaws, several code execution bugs, and vulnerabilities that allowed attackers to bypass its core security protections. by Jai Vijayan, Contributing Writer Jan 28, 2022 Vulnerabilities/Threats 6 min read Article -------------------------------------------------------------------------------- Phishing Simulation Study Shows Why These Attacks Remain Pervasive Email purportedly from human resources convinced more than one-fifth of recipients to click, the majority of whom did so within an hour of receiving the fraudulent message. Email purportedly from human resources convinced more than one-fifth of recipients to click, the majority of whom did so within an hour of receiving the fraudulent message. by Robert Lemos, Contributing Writer Jan 27, 2022 Threat Intelligence 5 min read Article -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- With Cloud the Norm, Insiders Are Everywhere — and Pose Greater Risk After companies accelerated their adoption of cloud infrastructure, remote workers are now insiders and pose significant risks, and costs, to companies. After companies accelerated their adoption of cloud infrastructure, remote workers are now insiders and pose significant risks, and costs, to companies. by Robert Lemos, Contributing Writer Jan 27, 2022 Vulnerabilities/Threats 4 min read Article -------------------------------------------------------------------------------- JFrog's New Tools Flag Malicious JavaScript Packages The three open source tools flag malicious JavaScript packages before they are downloaded and installed from the npm package manager. The three open source tools flag malicious JavaScript packages before they are downloaded and installed from the npm package manager. by Dark Reading Staff, Dark Reading Jan 26, 2022 DR Tech 4 min read Article -------------------------------------------------------------------------------- Millions of Routers, IoT Devices at Risk as Malware Source Code Surfaces on GitHub "BotenaGo" contains exploits for more than 30 vulnerabilities in multiple vendor products and is being used to spread Mirai botnet malware, security vendor says. "BotenaGo" contains exploits for more than 30 vulnerabilities in multiple vendor products and is being used to spread Mirai botnet malware, security vendor says. by Jai Vijayan, Contributing Writer Jan 26, 2022 Vulnerabilities/Threats 4 min read Article -------------------------------------------------------------------------------- OMB Issues Zero-Trust Strategy for Federal Agencies Federal officials tout the strategy as a more proactive approach to securing government networks. Federal officials tout the strategy as a more proactive approach to securing government networks. by Dark Reading Staff, Dark Reading Jan 26, 2022 Risk 1 min read Article -------------------------------------------------------------------------------- Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit. The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit. by Robert Lemos, Contributing Writer Jan 26, 2022 Vulnerability Management 4 min read Article -------------------------------------------------------------------------------- VPNLab.net Shuttered in Latest Spate of Global Takedowns Europol and 10 nations seized servers and disconnected the anonymous network allegedly used by many cybercriminals in the latest effort to hobble cybercrime groups. Europol and 10 nations seized servers and disconnected the anonymous network allegedly used by many cybercriminals in the latest effort to hobble cybercrime groups. by Robert Lemos, Contributing Writer Jan 26, 2022 Attacks/Breaches 4 min read Article -------------------------------------------------------------------------------- More News Latest Commentary Navigating Nobelium: Lessons From Cloud Hopper & NotPetya Nearly every organization should assume that it is at risk, but there are ways of countering the tactics used by advanced persistent threats. by James Campbell, Co-Founder and CEO, Cado Security Jan 28, 2022 -------------------------------------------------------------------------------- IFSEC Seeks Security Pros for New Survey on Physical Access Control Take part in an IFSEC Global survey to better understand the state of access control in 2022. by IFSEC Global, Staff Jan 27, 2022 -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- Log4j Proved Public Disclosure Still Helps Attackers Disclosure also puts organizations in the awkward position of trying to mitigate a vulnerability without something like a vendor patch to do the job. by Alex Haynes, Chief Information Security Officer, CDL Jan 27, 2022 -------------------------------------------------------------------------------- Cybersecurity Is Broken: How We Got Here & How to Start Fixing It It's not just your imagination — malicious threats have exponentially increased organizational risk. by David Ratner, CEO, Hyas Jan 26, 2022 -------------------------------------------------------------------------------- Why It's Time to Rethink Incident Response The incident response landscape has changed drastically, largely from shifting attitudes among insurance companies and, to some extent, business customers feeling the pain of security incidents. by J.R. Cunningham, Chief Security Officer, Nuspire Jan 26, 2022 -------------------------------------------------------------------------------- More Commentary Partner Perspectives How Modern Log Management Strengthens Enterprises’ Security PostureIf security teams are not logging everything, they are increasing security risk and making it more difficult to investigate and recover from a data breach. Modern log management goes beyond just a SIEM. Dec 21, 2021 Read More From Crowdstrike PRODUCTS & RELEASES Barracuda Expands Email and Endpoint Protection Capabilities in MSP Security OfferingsCensys Completes $35 Million Series B Funding Round Led by Intel Capital ArmorCode Closes $11 Million Seed Funding RoundLink11 Sets New Standards in DDoS Protection as Test WinnerRegistration for the (ISC)² Entry-Level Cybersecurity Certification Exam Pilot Program Is Now Open(ISC)² Appoints Jon France, CISSP, as Chief Information Security OfficerCisco's Kenna Security Research Shows the Relative Likelihood of an Organization Being Exploited(ISC)² Launches Entry-Level Cybersecurity CourseKaspersky Announces Takedown Service More Products & Releases Resources White Papers * Zero Trust and the Power of Isolation for Threat Prevention * Zero Trust in Real Life * How to avoid a data breach * 6 Steps to Build & Scale a Risk-Based AppSec Program * Forrester TEI Spotlight: Prisma Access More White Papers Events * Cybersecurity Technology - March 24 Dark Reading Virtual Event * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV More Events Webinars * Developing an Effective Threat Intelligence Program for Your EnterpriseFeb 10, 2022 * 2021 DDoS Attack Trends: Year in ReviewFeb 09, 2022 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable CodeDec 07, 2021 * Bringing Zero Trust to Cloud Native ApplicationsJan 27, 2022 * Monitoring and Securing Remote and Work-From-Home EnvironmentsFeb 02, 2022 More Webinars CONNECT WITH US REGISTER FOR A SUBSCRIBE TO THE FOLLOW US DARK READING ACCOUNT DARK READING NEWSLETTER @DARKREADING REGISTER FOR A DARK READING ACCOUNT * Gain full access to resources (events, white paper, webinars, reports, etc.) * Single sign-on to all Informa products REGISTER SUBSCRIBE TO THE DARK READING NEWSLETTER Get daily Dark Reading top stories every morning straight into your inbox SUBSCRIBE FOLLOW US @DARKREADING Follow us @darkreading to stay up-to-date with the latest news & insider information about events & more * * * * DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept