Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //


News & Commentary
8 Security & Privacy Apps to Share With Family and Friends
Kelly Sheridan, Staff Editor, Dark Reading
Mobile apps to recommend to the people in your life who want to improve their online security and privacy.
By Kelly Sheridan Staff Editor, Dark Reading, 4/9/2021
Comment0 comments  |  Read  |  Post a Comment
NFT Thefts Reveal Security Risks in Coupling Private Keys & Digital Assets
Pratik Savla, Lead Security Engineer at VenafiCommentary
Compromised NFT accounts highlight security concerns inherent in the design of centralized systems.
By Pratik Savla Lead Security Engineer at Venafi, 4/6/2021
Comment0 comments  |  Read  |  Post a Comment
How Us Shady Geeks Put Others Off Security
Dr. Sauvik Das, Assistant Professor of Interactive Computing, Georgia TechCommentary
Early adopters of security and privacy tools may be perceived by others as paranoid, which, in turn, may repel non-experts from protecting themselves online.
By Dr. Sauvik Das Assistant Professor of Interactive Computing, Georgia Tech, 3/19/2021
Comment0 comments  |  Read  |  Post a Comment
Facebook Expands Security Key Support to iOS & Android
Kelly Sheridan, Staff Editor, Dark ReadingNews
Facebook's announcement arrives the same week Twitter enabled support for multiple security keys on user accounts.
By Kelly Sheridan Staff Editor, Dark Reading, 3/18/2021
Comment0 comments  |  Read  |  Post a Comment
COVID, Healthcare Data & the Dark Web: A Toxic Stew
Greg Foss, Senior Cybersecurity Strategist, VMware Security Business UnitCommentary
The growing treasure trove of healthcare data is proving irresistible -- and profitable -- to bad actors.
By Greg Foss Senior Cybersecurity Strategist, VMware Security Business Unit, 3/17/2021
Comment0 comments  |  Read  |  Post a Comment
NSA Releases Guidance on Zero-Trust Architecture
Dark Reading Staff, Quick Hits
A new document provides guidance for businesses planning to implement a zero-trust system management strategy.
By Dark Reading Staff , 2/26/2021
Comment0 comments  |  Read  |  Post a Comment
Strata Identity Raises $11M in Series A Round
Dark Reading Staff, Quick Hits
The series A round of funding, led by Menlo Ventures, will help Strata scale its distributed identity technology.
By Dark Reading Staff , 2/16/2021
Comment0 comments  |  Read  |  Post a Comment
7 Things We Know So Far About the SolarWinds Attacks
Jai Vijayan, Contributing Writer
Two months after the news first broke, many questions remain about the sophisticated cyber-espionage campaign.
By Jai Vijayan Contributing Writer, 2/11/2021
Comment0 comments  |  Read  |  Post a Comment
SolarWinds Attack Reinforces Importance of Principle of Least Privilege
Yash Prakash, Chief Strategy OfficerCommentary
Taking stock of least-privilege policies will go a long way toward hardening an organization's overall security posture.
By Yash Prakash Chief Strategy Officer, 2/9/2021
Comment0 comments  |  Read  |  Post a Comment
Digital Identity Is the New Security Control Plane
Charlie Winckless, Senior Director, Cybersecurity Solutions, at PresidioCommentary
Simplifying the management of security systems helps provide consistent protection for the new normal.
By Charlie Winckless Senior Director, Cybersecurity Solutions, at Presidio, 1/28/2021
Comment1 Comment  |  Read  |  Post a Comment
COVID-19's Acceleration of Cloud Migration & Identity-Centric Security
Dr. Jasson Casey, CTO of Beyond IdentityCommentary
Here are some tips for updating access control methods that accommodate new remote working norms without sacrificing security.
By Dr. Jasson Casey CTO of Beyond Identity, 1/4/2021
Comment0 comments  |  Read  |  Post a Comment
HelpSystems Acquires Data Security Firm Vera
Dark Reading Staff, Quick Hits
The purchase is intended to increase London-based HelpSystems' file collaboration security capabilities.
By Dark Reading Staff , 12/24/2020
Comment0 comments  |  Read  |  Post a Comment
White Ops Announces Its Acquisition
Dark Reading Staff, Quick Hits
A group including Goldman Sachs Merchant Banking Division, ClearSky Security, and NightDragon has purchased the human verification technology company.
By Dark Reading Staff , 12/23/2020
Comment0 comments  |  Read  |  Post a Comment
Corporate Credentials for Sale on the Dark Web: How to Protect Employees and Data
Raz Rafaeli, CEO and Co-Founder at Secret Double OctopusCommentary
It's past time to retire passwords in favor of other methods for authenticating users and securing systems.
By Raz Rafaeli CEO and Co-Founder at Secret Double Octopus, 12/16/2020
Comment0 comments  |  Read  |  Post a Comment
Why I'd Take Good IT Hygiene Over Security's Latest Silver Bullet
Avi Shua, Co-Founder, Orca SecurityCommentary
Bells and whistles are great, but you can stay safer by focusing on correct configurations, posture management, visibility, and patching.
By Avi Shua Co-Founder, Orca Security, 12/2/2020
Comment1 Comment  |  Read  |  Post a Comment
Evidence-Based Trust Gets Black Hat Europe Spotlight
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
An FPGA-based system could change the balance of power between hardware attackers and defenders within IT security.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 11/23/2020
Comment0 comments  |  Read  |  Post a Comment
Apple Issues Security Updates
Dark Reading Staff, Quick Hits
Vulnerabilities found in three most recent versions of macOS.
By Dark Reading Staff , 11/13/2020
Comment0 comments  |  Read  |  Post a Comment
Credential Stuffing Fills E-commerce Pipeline in 2020
Dark Reading Staff, Quick Hits
There were 1.3 billion attacks in the third quarter alone, according to new analysis from Arkose Labs.
By Dark Reading Staff , 11/12/2020
Comment0 comments  |  Read  |  Post a Comment
Barracuda to Acquire Fyde for Zero-Trust Capabilities
Dark Reading Staff, Quick Hits
Plans call for expanding the Barracuda CloudGen SASE platform.
By Dark Reading Staff , 11/11/2020
Comment0 comments  |  Read  |  Post a Comment
Claroty Details Vulnerabilities in Schneider PLCs
Dark Reading Staff, Quick Hits
The vulnerabilities in a common line of programmable logic controllers could allow attackers to gain control of industrial equipment.
By Dark Reading Staff , 11/10/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could allow unauthorized access to the driver's device object.
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could cause systems to experience a blue screen error.
PUBLISHED: 2021-04-13
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.