Latest Naked Security Live talk - watch now!
Read moreAttackers are using legitimate enterprise tools to execute attacks and carry out malicious actions. Security teams must take action now.
Read moreCartoon Caption Winner: Insider Threat
February 8 2021And the winner of Dark Reading's January cartoon caption contest is ...
Read moreNoxPlayer Android Emulator Supply-Chain Attack
February 8 2021
It seems to be the season of sophisticated supply-chain attacks.
This one is in the NoxPlayer Android emulator:
ESET says that based on evidence its researchers gathered, a threat...
Read more
Perl.com gets its domain back – normal service restored!
February 7 2021All's well that ends well.
Read moreFriday Squid Blogging: Live Giant Squid Found in Japan
February 5 2021A giant squid was found alive in the port of Izumo, Japan. Not a lot of news, just this Twitter thread (with a couple of videos). If confirmed, I believe...
Read moreSpotify Hit With Another Credential-Stuffing Attack
February 5 2021This marks the second credential-stuffing attack to hit the streaming platform in the last few months.
Read moreAn international program that pays out hefty sums for the discovery of software vulnerabilities could spur greater scrutiny of applications and lead to better security.
Read morePro Tip: Don’t Doubt Yourself
February 5 2021The Edge asked seasoned security pros what they wish they had known when they first got into the field.
Read moreCybercrime Goes Mainstream
February 5 2021Organized cybercrime is global in scale and the second-greatest risk over the next decade.
Read more
Recent Comments