New & Notable

News

Researchers warn of 'hidden risks' in passwordless account recovery

Passwordless authentication is becoming more common, but account recovery poses increased risks that can lead to account takeovers. It's especially dangerous because even low-skilled attackers can achieve success.

— Dark Reading

News

The latest from Black Hat USA 2025

This is your guide to the breaking news, trending topics and more from Black Hat USA 2025, one of the world's top cybersecurity conferences.

News

Utilities, factories at risk From encryption holes in industrial protocol

The OPC UA communication protocol is widely used in industrial settings, but despite its complex cryptography, the open source protocol appears to be vulnerable in a number of different ways.

— Dark Reading

News

REvil actor accuses Russia of planning 2021 Kaseya attack

REvil affiliate Yaroslav Vasinskyi, who was convicted last year for his role in the 2021 Kaseya ransomware supply chain attack, said the Russian government was instrumental to the attack's execution.

— Dark Reading

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is governance, risk and compliance (GRC)?

    Governance, risk and compliance (GRC) refers to an organization's strategy, or framework, for handling the interdependencies of the following three components: corporate governance policies, enterprise risk management programs, and regulatory and ...

  • Get Started

    How to use Nmap to scan ports: A complete tutorial

    Nmap is a versatile open source security tool that scans ports to identify vulnerabilities, test firewall rules, inventory networks and troubleshoot connectivity issues.

  • Get Started

    What is integrated risk management (IRM)?

    Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization's security, risk tolerance profile and strategic decisions.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security