The Russian military group has been exploiting a flaw in the Exim mail transfer agent since last August, the NSA reports.
Small and midsize businesses are better at cyber resilience than you might think.
Even with more security issues published on Patch Tuesdays, the total number of software flaws dropped for the first three months of 2020, according to one tally.
Attackers are preying on users' inclination to click on familiar-looking websites, but instead trick them into sharing usernames and passwords.
Two new reports suggest a massive gap between how organizations have prepared their cybersecurity defenses and the reality of their efficacy.
There is no silver bullet for cybersecurity. It takes the right people, with the right mindset, applying the right elements of good security from the data center to the SOC.
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
Malware and related files show that ransomware operators don't need a cutting-edge arsenal to be effective.
A variety of sites saw as much as seven times the number of domain requests in late March and early April, suggesting attackers attempted massive denial-of-service attacks.
Nearly 70% of businesses struggle to recruit, hire, and retain cybersecurity talent, and many link security incidents to lack of skills.
A carefully crafted attack can convince a database to reveal all its secrets. Understanding the basics of what the attack looks like and how to protect against it can go a long way toward limiting the threat.
The bug-hunting platform has now paid more than $100 million in bounties since October 2013.
The credential is a commodity and will continue to be breached. As a result, focus and spending must shift toward the access that the credentials provide.
The European Union has given some organizations more breathing room to remedy violations, yet no one should think regulators are planning to abandon the privacy legislation in the face of COVID-19.
PonyFinal is deployed in human-operated ransomware attacks, in which adversaries tailor their techniques based on knowledge of a target system.
How to protect anyone and anything, from the perspective of a career Secret Service agent and former special operations marine.
Without the luxury of an IT security team to help them after a breach or credit card compromise, consumers will want to keep these tips in mind.
Attendees can look forward to the same high-quality Briefings and Trainings from the comfort of their own desk.
The vulnerability, which exists in almost every version of Android, is both more dangerous and harder to detect than its predecessor.
Most Americans say they're very concerned about online security but still behave in insecure ways, according to a new survey.
Dark Reading: Connecting the Information and Security CommunitySubscribe to Dark Reading: feed