The DEF CON Social Engineering Capture the Flag contest inspired a new event aimed at teaching both security and non-security professionals on the fine art of hacking human behavior.
Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services.
There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020.
You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.
Looking to change jobs? Watch out for fraudsters who use legitimate job services, slick websites, and an interview process to convince applicants to part with sensitive personal details.
In two years, the adware-dropping Shlayer Trojan has spread to infect one in 10 MacOS systems, Kaspersky says.
Emotet is considered one of the most damaging banking Trojans, primarily through its ability to carry other malware into an organization.
A new document separates cloud vulnerabilities into four classes and offers mitigations to help businesses protect cloud resources.
Expect cache attacks to get worse before they get better. The problem is that we don't yet have a good solution.
CISA has released an advisory for six high-severity CVEs for GE Carescape patient monitors, Apex Pro, and Clinical Information Center systems.
A general approach to privacy, no matter the regulation, is the only way companies can avoid a data protection disaster in 2020 and beyond.
Attackers 'weaponized' Active Directory to spread the ransomware.
For all the cautions against doing so, one-third of organizations in a Proofpoint survey said they paid their attackers after getting infected with ransomware.
New research finds security operations centers suffer high turnover and yield mediocre results for the investment they require.
An attack chain of vulnerabilities in ConnectWise's software for MSPs has similarities to some of the details of the August attack on Texas local and state agencies.
Recent data protection laws mean that the data protection officer and CISO must work in tandem to make sure users' data is protected.
Some the records, found on five identically configured servers, might have contained data in clear text.
Exactly who is king of the castle here?
The company today disclosed an approach to data security designed to protect against modern threats at a lower cost than complex network tools.
They're especially relevant regarding several issues we face now, including biometrics, secure data management, and human error with passwords.
Dark Reading: Connecting the Information and Security CommunitySubscribe to Dark Reading: feed