AuthorEricka Chickowski Contributing Writer, Dark Reading
SafeBreach researchers extend leaky sandbox research to show how services like VirusTotal and Hybrid Analysis could be used to steal data from air-gapped systems.
As quantum computing approaches real-world viability, it also poses a huge threat to today's encryption measures.
New Dragos report finds rising number of public vulnerability advisories around ICS with not enough reasonable guidance around how to deal with these flaws.
Updated data on zero-days, IoT threats, cryptomining, and economic costs should keep eyebrows raised in 2018.
Attacks using SSL to obfuscate malicious traffic finding fertile ground for growth.
IoT devices are a botherder's dream attack-vector.
Some bug hunters make 16 times the median salary of software engineers in their home countries.
Popular exploit kit turns its sights to drive-by cryptomining in what security researchers believe will be a trend to follow in 2018.
VCs splashed a record $4B in funding in the cybersecurity pool - here are some highlights among the early- to middle-stage startups who snagged big deals last year.
If CISOs could make a wish to solve a problem, these would be among the top choices.