With the fresh capital, Scrut aims to focus on simplifying risk management and infosec compliance for cloud-native SaaS, Fintech, and Healthtech companies
Making the option available only to paid subscribers โ while also claiming SMS authentication is broken โ doesn't make sense, some say. Is it a cash grab?
By Robert Lemos, Contributing Writer, Dark Reading
Nation-state adversaries, new reporting regulations, and a fast-paced threat landscape mean that financial services and technology firms need to bolster their security posture.
By Elizabeth Montalbano, Contributor, Dark Reading
Some employees' personal data was leaked, but the company responded swiftly to a socially engineered incident that gained access to legitimate employee login credentials.
An Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send a political message โ and maybe something more.
By Szilveszter Szebeni, Co-Founder & CISO, Tresorit
By implementing tools that enable internal users to do their jobs efficiently and securely, companies reduce insider threat risk by building insider trust.
New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access to data theft.
By Jeffrey Schwartz, Contributing Writer, Dark Reading
Established network security players like Check Point are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains.
The primary victims so far have been employees of telcos in the Middle East, who were hit with custom backdoors via the cloud, in a likely precursor to a broader attack.
BEC gangs Midnight Hedgehog and Mandarin Capybara show how online marketing and translation tools are making it easy for these threat groups to scale internationally.
Weeks after an exploit was first announced in a popular cloud-based file transfer service, could some organizations still be vulnerable? The answer is yes.
By Deepen Desai, CISO and VP, Security Research, Zscaler
It's a classic attacker move: Use security protections against those who deploy them. But organizations can still defuse and prevent these encrypted attacks.
Powered by WatchGuardโs Unified Security Platformยฎ architecture, new Fireboxes deliver enhanced performance and added security capabilities that MSPs and IT admins can easily manage in WatchGuard Cloud.
By Robert Lemos, Contributing Writer, Dark Reading
Only 10% of corporate executives expect to lay off members of cybersecurity teams in 2023, much lower than other areas, as companies protect hard-to-find skill sets.
Thistle's technology will give device makers a way to easily integrate features for secure updates, memory management, and communications into their products, Snyder says.
By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
Developers don't have to build authentication and user management from scratch, and can devote their energies to the core functions of the application, instead.
By Robert Lemos, Contributing Writer, Dark Reading
Incident response triage and software vulnerability discovery are two areas where the large language model has demonstrated success, although false positives are common.
Factoring user experience and convenience into how employees and tenants access buildings is top concern for security professionals says benchmark industry survey.
Here are some of the easily avoidable mistakes most companies made last year, gleaned from hundreds of cybersecurity engagements by red and blue teams.
By Robert Lemos, Contributing Writer, Dark Reading
The National Institute of Standards and Technology has settled on a standard for encrypting Internet of Things (IoT) communications, but many devices remain vulnerable and unpatched.
De-shaming security mistakes and taking the blame and punishment out of incident reporting can strengthen security efforts both inside and outside of the workplace.
By Elizabeth Montalbano, Contributor, Dark Reading
Vladislav Klyushin and co-conspirators used SEC filings stolen from the networks of Tesla, Roku, and other publicly traded companies to earn nearly $100 million in illegal trades.
By Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
How newly exposed security weaknesses in industrial wireless, cloud-based interfaces, and nested PLCs serve as a wake-up call for hardening the physical process control layer of the OT network.
By Elizabeth Montalbano, Contributor, Dark Reading
Researchers flag common misconfiguration errors and a template injection technique that could let an attacker take over the IT management network and connected systems.