Dark Reading
Business Apps Spoofed in 45% of Impersonation Attacks
Business-related applications like those from Microsoft, Zoom, and DocuSign are most often impersonated in brand phishing attacks.
Categories: Dark Reading
Business Apps Spoofed in 45% of Impersonation Attacks
Business-related applications like those from Microsoft, Zoom, and DocuSign are most often impersonated in brand phishing attacks.
Categories: Dark Reading
Business Apps Spoofed in 45% of Impersonation Attacks
Business-related applications like those from Microsoft, Zoom, and DocuSign are most often impersonated in brand phishing attacks.
Categories: Dark Reading
Healthcare Still Seeing High Level of Attacker Activity
Interest in vaccines is driving all sorts of activity, reports say, from vaccine-specific phishing to growing bot traffic on healthcare sites.
Categories: Dark Reading
Healthcare Still Seeing High Level of Attacker Activity
Interest in vaccines is driving all sorts of activity, reports say, from vaccine-specific phishing to growing bot traffic on healthcare sites.
Categories: Dark Reading
Healthcare Still Seeing High Level of Attacker Activity
Interest in vaccines is driving all sorts of activity, reports say, from vaccine-specific phishing to growing bot traffic on healthcare sites.
Categories: Dark Reading
Microsoft, FireEye Uncover More Malware Used in the SolarWinds Campaign
Newly discovered tools were designed for late-stage use after the attackers had already established a relatively firm presence on a breached network, vendors say.
Categories: Dark Reading
Secure Laptops & the Enterprise of the Future
The enterprise of the future will depend upon organizations' ability to extend the company firewall to everywhere people are working.
Categories: Dark Reading
New Social Security Scam Spoofs Government Badges
Criminals text or email photos of fake government identification badges to trick people into sending money.
Categories: Dark Reading
New Social Security Scam Spoofs Government Badges
Criminals text or email photos of fake government identification badges to trick people into sending money.
Categories: Dark Reading
Qualys Is the Latest Victim of Accellion Data Breach
Security vendor confirms attackers exploited a previously disclosed vulnerability in the enterprise firewall technology to breach its network.
Categories: Dark Reading
Why We Need More Blue Team Voices at the Table
The red team draws attention, but the blue team has the expertise to keep networks secure day in and day out.
Categories: Dark Reading
Intel: More Than 90% of Our Vulnerabilities Found via Research
Internal research and external bug-bounty programs combined to discover the vast majority of reported security issues in the company's software.
Categories: Dark Reading
More Details Emerge on the Microsoft Exchange Server Attacks
The attacks are more widespread than initially reported, researchers say, and a look at why the Microsoft Exchange Server zero-days patched this week are so dangerous.
Categories: Dark Reading
Intel: Paid Research Caught More Than 90% of Our Vulnerabilities
Internal research and external bug-bounty programs combined to discover the vast majority of reported security issues in the company's software.
Categories: Dark Reading
More Details Emerge on the Microsoft Exchange Server Attacks
The attacks are more widespread than initially reported, researchers say, and a look at why the Microsoft Exchange Server zero-days patched this week are so dangerous.
Categories: Dark Reading
More Details Emerge on the Microsoft Exchange Server Attacks
The attacks are more widespread than initially reported, researchers say, and a look at why the Microsoft Exchange Server zero-days patched this week are so dangerous.
Categories: Dark Reading
CISA to Federal Agencies: Immediately Patch or 'Disconnect' Microsoft Exchange Servers
The US Department of Homeland Security agency's new emergency directive comes in the wake of major zero-day attacks on email servers revealed by Microsoft this week.
Categories: Dark Reading
How SolarWinds Busted Up Our Assumptions About Code Signing
With so much automation in code writing process, results are rarely double-checked, which opens the door to vulnerabilities and downright danger.
Categories: Dark Reading