AuthorKelly Sheridan Staff Editor, Dark Reading
Seasoned red teamers explain the value-add of a red team, how it operates, and how to maximize its effectiveness.
Security leaders are evolving from technicians to business executives as tech drives enterprise projects, applications, and goals.
More than 60% of organizations report the bulk of new applications are built in the cloud. What does this mean for security?
Remote desktop protocol access continues to thrive in underground markets, primarily to hackers who lack expertise to find exposed ports themselves.
Researchers bypass a Trusted Computing Group security measure to manipulate the firmware and steal data in memory.
A site spoofing the official Jaxx website was discovered packing several infections for Windows and Mac machines, and has been shut down.
A new version of Mirai exploits the Apache Struts flaw linked to the Equifax breach, while Gafgyt targets an old flaw in SonicWall.
After researchers found the security apps collecting and uploading users' browser histories, Apple removed the apps from its macOS app store and Trend Micro removed the apps' browser history collection capability.
These methods may not yet be on your security team's radar, but given their impact, they should be.
New research sheds light on the biggest threats to strike ICS systems in the first half of 2018, and what's in store for the rest of this year.