MonthJanuary 2020

What It’s Like to Be a CISO: Check Point Security Leader Weighs In

Jony Fischbein shares the concerns and practices that are top-of-mind in his daily work leading security at Check Point Software.

‘George’ the Most Popular Password That’s a Name

A new study of stolen passwords reflects the consequences of password overload.

Ashley Madison Breach Returns with Extortion Campaign

The recent attack messages use new techniques to extort Bitcoin payments from Ashley Madison users hit in massive 2015 data breach.

Name That Toon: Private (Button) Eye

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

AppSec Concerns Drove 61% of Businesses to Change Applications

According to new Dark Reading research, some respondents have even left behind commercial off-the-shelf software and migrated to open-source or in-house homegrown applications. Click image to read more.

Embracing a Prevention Mindset to Protect Critical Infrastructure

A zero-trust, prevention-first approach is necessary to keep us safe, now and going forward.

Embracing a Prevention Mindset to Protect Critical Infrastructure

A zero-trust, prevention-first approach is necessary to keep us safe, now and going forward.

Two Vulnerabilities Found in Microsoft Azure Infrastructure

Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched.

Android Malware for Mobile Ad Fraud Spiked Sharply in 2019

Some 93% of all mobile transactions across 20 countries were blocked as fraudulent, Upstream says.

Russian Cybercrime Forum Contests Bring Cash, Visibility to Winners

Competitions for users are a long-time tradition on underground cybercrime forums for members looking for money - and cred with major criminal syndicates.