The analysis shows potential attack paths and the most effective techniques for each tactic documented in CISA's Risk and Vulnerability Assessments.
Read moreAs attackers use more synthetic media in social engineering campaigns, a new framework is built to describe threats and provide countermeasures.
Read moreWhere do all those cybercrime payments go?
July 9 2021Yes, the headline is a rhetorical question. But sometimes we get literal answers, and they're well worth remembering.
Read moreThe ElectroRAT Trojan attacker's success highlights the increasingly sophisticated nature of threats to cryptocurrency exchanges, wallets, brokerages, investing, and other services.
Read moreIt’s in the Game (but It Shouldn’t Be)
July 9 2021Five ways that game developers (and others) can avoid falling victim to an attack like the one that hit EA.
Read moreCartoon Caption Winner: Sight Unseen
July 9 2021And the winner of Dark Reading's June contest is ...
Read moreMorgan Stanley Discloses Data Breach
July 8 2021Attackers were able to compromise customers' personal data by targeting the Accellion FTA server of a third-party vendor.
Read moreThe Trojan sends information back to the attackers' servers about the programming language of a target device.
Read moreLatest episode - listen now!
Read moreLast week cybercriminals deployed ransomware to 1,500 organizations that provide IT security and technical support to many other companies. The attackers exploited a vulnerability in software from Kaseya, a...
Read more
Recent Comments