AuthorKelly Jackson Higgins Executive Editor at Dark Reading

Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says

Attackers 'weaponized' Active Directory to spread the ransomware.

Elaborate Honeypot ‘Factory’ Network Hit with Ransomware, RAT, and Cryptojacking

A fictitious industrial company with phony employees personas, website, and PLCs sitting on a simulated factory network fooled malicious hackers - and raised alarms for at least one white-hat researcher who stumbled upon it.

Elaborate Honeypot ‘Factory’ Network Hit with Ransomware, RAT, and Cryptojacking

A fictitious industrial company with phony employees personas, website, and PLCs sitting on a simulated factory network fooled malicious hackers - and raised alarms for at least one white-hat researcher who stumbled upon it.

Cloudflare Adds New Endpoint, Web Security Service

"Teams" and a new browser security acquisition expand the cloud firm's security offerings.

Ransomware ‘Crisis’ in US Schools: More Than 1,000 Hit So Far in 2019

Meanwhile, the mayor of the city of New Orleans says no ransom money demands were made as her city struggles to recover from a major ransomware attack launched last week.

Intel Issues Fix for ‘Plundervolt’ SGX Flaw

Researchers were able to extract AES encryption key using SGX's voltage-tuning function.

Data Leak Week: Billions of Sensitive Files Exposed Online

A total of 2.7 billion email addresses, 1 billion email account passwords, and nearly 800,000 applications for copies of birth certificate were found on unsecured cloud buckets.

When Rogue Insiders Go to the Dark Web

Employees gone bad sell stolen company information, sometimes openly touting their companies, researchers say.

Siemens Offers Workarounds for Newly Found PLC Vulnerability

An undocumented hardware-based special access feature recently found by researchers in Siemens' S7-1200 can be used by attackers to gain control of the industrial devices.

Anatomy of a BEC Scam

A look at the characteristics of real-world business email compromise attacks - and what makes them tick.