An in-depth analysis of system-destroying malware families presented at Black Hat Middle East & Africa shows a growing nuance in terms of how they're deployed.
Read moreModern CISO: More Than a Security Officer
November 16 2022YL Ventures CISO-in-Residence Frank Kim weighs in on the top security concerns facing CISOs in a Dark Reading Q&A interview.
Read moreWhere Can Third-Party Governance and Risk Management Take Us?
November 16 2022Part 2 in our series addressing the top 10 unanswered questions in security: How will TPGRM evolve?
Read moreMisconfigurations, Vulnerabilities Found in 95% of Applications
November 16 2022Weak configurations for encryption and missing security headers topped the list of software issues found during a variety of penetration and application security tests.
Read moreTesting is an ongoing mission, not a one-and-done fix.
Read moreLog4Shell-like code execution hole in popular Backstage dev tool
November 16 2022Good old "string templating", also known as "string interpolation", in the spotlight again...
Read moreA misleading location-tracking practice ensnared the search-engine giant in massive privacy case spanning 40 states.
Read moreTop Zeus Botnet Suspect “Tank” Arrested in Geneva
November 15 2022Vyacheslav “Tank” Penchukov, the accused 40-year-old Ukrainian leader of a prolific cybercriminal group that stole tens of millions of dollars from small to mid-sized businesses in the United States...
Read more
Recent Comments