Security researchers found hundreds of pieces of vulnerable code in the Qualcomm Snapdragon chips powering Android phones.
Read moreResearcher Finds New Office Macro Attacks for MacOS
August 7 2020Building successful macro attacks means getting past several layers of security, but a Black Hat speaker found a way through.
Read moreBEC Campaigns Target Financial Execs via Office 365
August 7 2020A series of business email compromise campaigns has been targeting executives of more than 1,000 companies, most recently in the US and Canada.
Read moreVigilance and ongoing training combined with an integrated security framework are key aspects of a successful strategy in the fight against the latest crop of pandemic opportunists.
Read moreGoogle Project Zero researcher Maddie Stone explains the importance of identifying flaws exploited in the wild and techniques used to do it.
Read moreGoogle Project Zero researcher Maddie Stone explains the importance of identifying flaws exploited in the wild and techniques used to do it.
Read moreApproaches based on questionnaires and self-evaluation are not always a good indicator of how well a user can mitigate social engineering threats.
Read moreDHS CISA's Christopher Krebs and Georgetown University's Matt Blaze at Black Hat USA give the lowdown on where things stand so far and what still needs to happen before...
Read moreWhere Dark Reading Goes Next
August 6 2020Dark Reading Editor-in-Chief gives a complete rundown of all the Dark Reading projects you might not even know about, his insight into the future of the security industry, and...
Read more
Recent Comments