A Linux maintainer pledges to stop taking code submissions from the University of Minnesota after a research team purposely submitted vulnerabilities to show software supply chain weaknesses.
Read moreName That Toon: Greeting, Earthlings
April 22 2021Caption time! Come up with something out of this world for Dark Reading's latest contest, and our panel of experts will reward the winner with a $25 Amazon gift...
Read more10 Free Security Tools at Black Hat Asia 2021
April 22 2021Researchers are set to demonstrate a plethora of tools for conducting pen tests, vulnerability assessments, data forensics, and a wide range of other use cases.
Read moreAfter 40 years of navigating catastrophes, video game character Mario can help us with a more intelligent approach to DevOps and improving security culture.
Read moreOn North Korea’s Cyberattack Capabilities
April 22 2021Excellent New Yorker article on North Korea’s offensive cyber capabilities.
Read moreRapid7 Acquires Velociraptor Open Source Project
April 21 2021The company plans to use Velociraptor's technology and insights to build out its own incident response capabilities.
Read moreOne goal of the group is to take down the criminal ecosystem that enables ransomware, officials say.
Read moreThree zero-day vulnerabilities helped an attacker install a backdoor, access files and emails, and move laterally into a target network.
Read moreRansomware gets the headlines, but business paid out $1.8 billion last year to resolve BEC issues, according to an FBI report.
Read more
Recent Comments