AuthorCurtis Franklin Jr. Senior Editor at Dark Reading

New Intel Vulnerabilities Bring Fresh CPU Attack Dangers

Four newly discovered vulns from the speculative-execution family bring Meltdown-like threats to Intel's processors.

Website Attack Attempts Rose by 69% in 2018

Millions of websites have been compromised, but the most likely malware isn't cyptomining: it's quietly stealing files and redirecting traffic, a new Sitelock report shows.

Effective Pen Tests Follow These 7 Steps

Third-party pen tests are part of every comprehensive security plan. Here's how to get the most from this mandatory investment.

Real-World Use, Risk of Open Source Code

Organizations are using more open source software than ever before, but managing that code remains a challenge.

Peer-to-Peer Vulnerability Exposes Millions of IoT Devices

A flaw in the software used to remotely access cameras and monitoring devices could allow hackers to easily take control of millions of pieces of the IoT.

Peer-to-Peer Vulnerability Exposes Millions of IoT Devices

A flaw in the software used to remotely access cameras and monitoring devices could allow hackers to easily take control of millions of pieces of the IoT.

Malware Makes Itself at Home in Set-Top Boxes

Low-cost boxes that promise free TV streaming services often come complete with malware, according to a new study.

New EternalBlue Family Member Takes Aim at Asian Web Servers

Beapy is a new malware variant that's storming across China, leaving cryptominers in its wake.

New EternalBlue Family Member Takes Aim at Asian Web Servers

Beapy is a new malware variant that's storming across China, leaving cryptominers in its wake.

Regulations, Insider Threat Handicap Healthcare IT Security

Healthcare IoT is expanding opportunities for hackers as the sector struggles to keep up security-wise.