Credential Canaries Create Minefield for Attackers
August 1 2022Canary tokens — also known as honey tokens — force attackers to second-guess their potential good fortune when they come across user and application secrets.
Read moreCanary tokens — also known as honey tokens — force attackers to second-guess their potential good fortune when they come across user and application secrets.
Read more"Bruggling" emerges as a novel technique for pilfering data out from a compromised environment — or for sneaking in malicious code and attack tools.
Read more"Bruggling" emerges as a novel technique for pilfering data out from a compromised environment — or for sneaking in malicious code and attack tools.
Read moreCome up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreTech companies play a vital role in global communication, which has profound effects on how politics, policies, and human rights issues play out.
Read moreIdentity and access management was front and center at AWS re:inforce this week.
Read moreWhile attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.
Read moreDark Reading's digest of other "don't-miss" stories of the week — including a Microsoft alert connecting disparate cybercrime activity together, and an explosion of Luca Stealer variants after an...
Read moreIn a Black Hat USA talk, Katie Moussouris will discuss why bug-bounty programs are failing in their goals, and what needs to happen next to use bounties in a...
Read more
Recent Comments