darkreading
Media & Victims Find Common Ground Against Hackers
3 months 3 weeks ago
In a panel at Black Hat 2024, journalists and investigators explain their differing goals when a victim organization is breached.
Kristina Beek, Associate Editor, Dark Reading
Rubrik Partners With Mandiant for Cyber Resilience and Accelerated Incident Response Recovery
3 months 3 weeks ago
Tackling Vulnerabilities & Errors Head-on for Proactive Security
3 months 3 weeks ago
As attack surfaces increase, partner networks widen, and security teams remain stretched, vulnerabilities and errors continue to be a daunting challenge.
Rodman Ramezanian
Dark Reading News Desk Live From Black Hat USA 2024
3 months 3 weeks ago
The Dark Reading team spent two days on the Dark Reading News Desk interviewing the world's top cybersecurity experts.
Dark Reading Staff
Memory Safety Is Key to Preventing Hardware Hacks
3 months 3 weeks ago
Spectre and Meltdown exposed just how easy a target computer memory was for attackers. Several efforts are underway to protect memory.
Agam Shah, Contributing Writer
CrowdStrike's Legal Pressures Mount, Could Blaze Path to Liability
3 months 3 weeks ago
Following the July 19 outages caused by a bad update, the cybersecurity firm faces shareholder lawsuits and pressure to pay damages for at least one major customer, Delta Airlines. Will software liability follow?
Robert Lemos, Contributing Writer
How to Weaponize Microsoft Copilot for Cyberattackers
3 months 3 weeks ago
At Black Hat USA, security researcher Michael Bargury released a "LOLCopilot" ethical hacking module to demonstrate how attackers can exploit Microsoft Copilot — and offered advice for defensive tooling.
Jeffrey Schwartz, Contributing Writer
Microsoft on CISOs: Thriving Community Means Stronger Security
3 months 3 weeks ago
Microsoft execs detailed the company's reaction to the CrowdStrike incident and emphasized the value of a collective identity.
Kristina Beek, Associate Editor, Dark Reading
'0.0.0.0 Day' Flaw Puts Chrome, Firefox, Mozilla Browsers at RCE Risk
3 months 3 weeks ago
Attackers can use a seemingly innocuous IP address to exploit localhost APIs to conduct a range of malicious activity, including unauthorized access to user data and the delivery of malware.
Elizabeth Montalbano, Contributing Writer
Building an Effective Strategy to Manage AI Risks
3 months 3 weeks ago
As AI technologies continue to advance at a rapid pace, privacy, security and governance teams can't expect to achieve strong AI governance while working in isolation.
Sanket Kavishwar, Kenneth Moras
SaaS Apps Present an Abbreviated Kill Chain for Attackers
3 months 3 weeks ago
Black Hat presentation reveals adversaries don't need to complete all seven stages of a traditional kill chain to achieve their objectives.
Jai Vijayan, Contributing Writer
Critical AWS Vulnerabilities Allow S3 Attack Bonanza
3 months 3 weeks ago
Researchers at Aqua Security discovered the "Shadow Resource" attack vector and the "Bucket Monopoly" problem, where threat actors can guess the name of S3 buckets based on their public account IDs.
Jeffrey Schwartz, Contributing Writer
Hazy Issue in Entra ID Allows Privileged Users to Become Global Admins
3 months 4 weeks ago
Invisible authentication mechanisms in Microsoft allow any attacker to escalate from privileged to super-duper privileged in cloud environments, paving the way for complete takeover.
Nate Nelson, Contributing Writer
Monitoring Changes in KEV List Can Guide Security Teams
3 months 4 weeks ago
The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.
Robert Lemos, Contributing Writer
CrowdStrike Will Give Customers Control Over Falcon Sensor Updates
3 months 4 weeks ago
The security vendor has also implemented several changes to protect against the kind of snafu that crashed 8.5 million Windows computers worldwide last month.
Jai Vijayan, Contributing Writer
Knostic Wins 2024 Black Hat Startup Spotlight Competition
3 months 4 weeks ago
During a "Shark Tank"-like final, each startup's representative spent five minutes detailing their company and product, with an additional five minutes to take questions from eight judges from Omdia, investment firms, and top companies in cyber.
Kristina Beek, Associate Editor, Dark Reading
Chameleon Banking Trojan Makes a Comeback Cloaked as CRM App
3 months 4 weeks ago
The evolving malware is targeting hospitality and other B2C workers in Canada and Europe with capabilities that can evade Android 13 security restrictions.
Elizabeth Montalbano, Contributing Writer
Creating Insecure AI Assistants With Microsoft Copilot Studio Is Easy
3 months 4 weeks ago
Microsoft claims 50,000 organizations are using its new Copilot Creation tool, but researcher Michael Bargury demonstrated at Black Hat USA ways it could unleash insecure chatbots.
Jeffrey Schwartz, Contributing Writer
The API Security Crisis: Why Your Company Could Be Next
3 months 4 weeks ago
You're only as strong as your weakest security link.
Vaibhav Malik
Checked
3 hours 51 minutes ago
Public RSS feed
darkreading feed