AuthorEricka Chickowski Contributing Writer, Dark Reading

6 Security Training Hacks to Increase Cyber IQ Org-Wide

Move beyond generic, annual security awareness training with these important tips.

Military, Government Users Just as Bad About Password Hygiene as Civilians

New report comes out just as group of US senators chastise Secretary of State Mike Pompeo for not using multifactor authentication.

8 Cryptomining Malware Families to Keep on the Radar

Cryptojacking attacks at the hands of cryptomining malware is on the rise as these variants of Trojans, worms, and exploit kits make their rounds.

Cryptocurrency Scams Replacing Ransomware as Attackers’ Fave

Cryptojacking miners and fileless malware see biggest growth in first half of 2018.

Why CISOs Should Make Friends With Their CMOs

A partnership between IT security and marketing could offer many benefits to each group - and to the entire enterprise.

Active Third-Party Content the Bane of Web Security

New reports shows many of the world's most popular sites serve up active content from risky sources.

New PHP Exploit Chain Highlights Dangers of Deserialization

PHP unserialization can be triggered by other vulnerabilities previously considered low-risk.

6 Eye-Raising Third-Party Breaches

This year's headlines have featured a number of high-profile exposures caused by third parties working on behalf of major brands.

GoDaddy Exposes System Map and Business Strategy Info on AWS

Publicly accessible S3 bucket included configuration data about tens of thousands of systems, as well as sensitive pricing and business model information.

AWS Employee Flub Exposes S3 Bucket Containing GoDaddy Server Configuration and Pricing Models

Publicly accessible S3 bucket included configuration data modeling tens of thousands of systems, as well as sensitive pricing information.