AuthorKelly Sheridan Staff Editor, Dark Reading

Think Like An Attacker: How a Red Team Operates

Seasoned red teamers explain the value-add of a red team, how it operates, and how to maximize its effectiveness.

As Tech Drives the Business, So Do CISOs

Security leaders are evolving from technicians to business executives as tech drives enterprise projects, applications, and goals.

The Security Costs of Cloud-Native Applications

More than 60% of organizations report the bulk of new applications are built in the cloud. What does this mean for security?

RDP Ports Prove Hot Commodities on the Dark Web

Remote desktop protocol access continues to thrive in underground markets, primarily to hackers who lack expertise to find exposed ports themselves.

New Cold Boot Attack Gives Hackers the Keys to PCs, Macs

Researchers bypass a Trusted Computing Group security measure to manipulate the firmware and steal data in memory.

Malware Campaign Targeting Jaxx Wallet Holders Shut Down

A site spoofing the official Jaxx website was discovered packing several infections for Windows and Mac machines, and has been shut down.

Mirai, Gafgyt Botnets Resurface with New Tricks

A new version of Mirai exploits the Apache Struts flaw linked to the Equifax breach, while Gafgyt targets an old flaw in SonicWall.

Three Trend Micro Apps Caught Collecting MacOS User Data

After researchers found the security apps collecting and uploading users' browser histories, Apple removed the apps from its macOS app store and Trend Micro removed the apps' browser history collection capability.

8 Attack Vectors Puncturing Cloud Environments

These methods may not yet be on your security team's radar, but given their impact, they should be.

Take (Industrial) Control: A Look at the 2018 ICS Threat Landscape

New research sheds light on the biggest threats to strike ICS systems in the first half of 2018, and what's in store for the rest of this year.