Network security
Enterprise cyberdefense strategies must include network security best practices. Get advice on essential network security topics such as remote access, VPNs, zero-trust security, NDR, endpoint management, IoT security, hybrid security, Secure Access Service Edge, mobile security and more.
Top Stories
- 
				Opinion
					24 Oct 2025
					
									
										  Cybersecurity Awareness Month: The endpoint security issueDevice diversity and hybrid work models challenge IT teams. New research reveals the gap between managed endpoints and actual security coverage. Continue Reading By- Gabe Knuth, Principal Analyst
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
				Opinion
					21 Oct 2025
					
									
										  How single-vendor SASE can deliver better security resultsSASE vendor deployment trends show gradual change, with single-vendor adoption rising from 2% in 2023 to 17% in 2025, according to research findings. Continue Reading By- John Grady, Principal Analyst
 
- 
                Tip
                21 Dec 2023
                  Best practices for secure network automation workflowsIt's not enough to build network automation workflows. It's important to secure those workflows, as well. Access control, encryption and collaboration all play important roles. Continue Reading 
- 
                News
                19 Dec 2023
                  FBI leads Alphv/BlackCat takedown, decrypts victims' dataThe latest law enforcement effort to halt the surge of ransomware attacks was successful in disrupting one of the most active ransomware-as-a-service groups. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                14 Dec 2023
                  Russian APT exploiting JetBrains TeamCity vulnerabilityThe Russian hackers behind the SolarWinds attacks are the latest nation-state group to exploit a critical TeamCity vulnerability to gain initial access to victims' servers. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                13 Dec 2023
                  How ransomware gangs are engaging -- and using -- the mediaNew Sophos research shows that ransomware groups are not only attacking technical systems, but taking advantage of information systems as well to pressure victims into paying. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Opinion
                12 Dec 2023
                  Application security consolidation remains nuancedAs web application and API protection converge into cloud-based WAAP, Enterprise Strategy Group research shows enterprise interest, but security concerns remain. Continue Reading By- John Grady, Principal Analyst
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
                News
                06 Dec 2023
                  Forescout uncovers 21 Sierra Wireless router vulnerabilitiesForescout is urging enterprises to patch software for affected OT/IoT routers as attackers increasingly target edge devices to gain network access to critical infrastructure. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                05 Dec 2023
                  Ransomware ramps up against private sector in NovemberRansomware disclosures and reports increased again in November, with the most disruptive and dangerous attacks occurring against healthcare organizations. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Opinion
                04 Dec 2023
                  5 network security predictions for 2024Check out network security trends for 2024 from Enterprise Strategy Group, from SaaS security and rising DDoS attacks to network and endpoint convergence. Continue Reading By- John Grady, Principal Analyst
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
                News
                30 Nov 2023
                  Black Basta ransomware payments exceed $100M since 2022Insurance provider Corvus and blockchain analytics vendor Elliptic partnered to examine how much damage the Black Basta ransomware group has caused in less than two years. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                29 Nov 2023
                  Okta: Support system breach affected all customersOkta warned customers that they face an 'increased risk of phishing and social engineering attacks' after new details emerged from a breach that occurred earlier this year. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                28 Nov 2023
                  Europol, Ukraine police arrest alleged ransomware ringleaderEuropol and Ukraine's National Police arrested the alleged leader of a ransomware gang last week, along with four accomplices, dismantling the cybercrime group. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tip
                17 Nov 2023
                  An introduction to IoT penetration testingIoT systems are complex, and that makes checking for vulnerabilities a challenge. Penetration testing is one way to ensure your IoT architecture is safe from cyber attacks. Continue Reading By- Laura Vegh, Laura Vegh Creative
 
- 
                News
                16 Nov 2023
                  CISA, FBI issue alert for ongoing Scattered Spider activityThe government advisory follows several high-profile attacks attributed to Scattered Spider, which uses advanced social engineering techniques like SIM swapping. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                16 Nov 2023
                  Automated Clearing House fraud (ACH fraud)ACH fraud is the theft of funds through the U.S. Department of the Treasury's Automated Clearing House financial transaction network. Continue Reading By
- 
                News
                15 Nov 2023
                  LockBit observed exploiting critical 'Citrix Bleed' flawThe Financial Services Information Sharing and Analysis Center warned that LockBit ransomware actors are exploiting CVE-2023-4966, also known as Citrix Bleed. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                15 Nov 2023
                  VMware discloses critical, unpatched Cloud Director bugA manual workaround is currently available for a critical VMware Cloud Director Appliance flaw, tracked as CVE-2023-34060, but no patch is available at press time. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Tip
                15 Nov 2023
                  How to protect your organization from IoT malwareIoT devices are attractive targets to attackers, but keeping them secure isn't easy. Still, there are steps to take to minimize risk and protect networks from attacks. Continue Reading By
- 
                Feature
                13 Nov 2023
                  SD-WAN deployments feed SASE network and security convergenceEnterprise Strategy Group's Bob Laliberte discusses the latest findings in his newly released report and why SD-WAN's direct cloud connectivity feeds SASE business initiatives. Continue Reading By- Ron Karjian, Industry Editor
 
- 
                Tip
                07 Nov 2023
                  Factors to consider when securing industrial IoT networksIndustrial IoT networks differ from enterprise data networks. Keeping them safe requires a security strategy that's specifically crafted for legacy and new devices and sensors. Continue Reading By
- 
                Tip
                07 Nov 2023
                  7 useful hardware pen testing toolsPenetration testers use a variety of hardware to conduct security assessments, including a powerful laptop, Raspberry Pi, Rubber Ducky and more. Continue Reading By
- 
                News
                06 Nov 2023
                  Ransomware continues to rise in October across all sectorsRansomware disclosures and reports surged last month, leading in some cases to bankruptcy filing, prolonged business disruptions and ambulance diversions for hospitals. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                31 Oct 2023
                  SEC charges SolarWinds for security failures, fraudThe SEC accused SolarWinds and CISO Timothy Brown of hiding known cybersecurity risks that were further highlighted by the supply chain attack revealed in 2020. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                31 Oct 2023
                  Dual ransomware attacks on the rise, but causes are unclearWhile the FBI warned enterprises of an increase in dual ransomware attacks, infosec experts said there's insufficient data to consider the threat a trend. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                26 Oct 2023
                  NCC Group details 153% spike in September ransomware attacksNCC Group analysts warned the significant year-over-year increase will likely continue. Organizations may see 4,000 ransomware attacks by the end of 2023. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                24 Oct 2023
                  1Password stops attack linked to Okta breach1Password said a threat actor used a HAR file stolen in the recent Okta breach to access the password manager's Okta tenant, but the activity was detected and blocked. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Answer
                20 Oct 2023
                  What to know about UDP vulnerabilities and securityUDP is a simple protocol, but it has inherent vulnerabilities that make it prone to attacks, such as limited packet verification, IP spoofing and DDoS attacks. Continue Reading By- David Jacobs, The Jacobs Group
 
- 
                News
                19 Oct 2023
                  North Korean hackers exploit critical TeamCity vulnerabilityWhile a patch is available, Microsoft and JetBrains confirmed TeamCity users have been compromised in attacks that leverage CVE-2023-42793 as an initial attack vector. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Opinion
                19 Oct 2023
                  Cloud-native firewalls are the next step in network securityThe network security challenges associated with cloud provider and virtual firewalls are leading to third parties introducing cloud-native firewalls. Continue Reading By- John Grady, Principal Analyst
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
                Definition
                18 Oct 2023
                  antispoofingAntispoofing is a technique for identifying and dropping packets that have a false source address. Continue Reading By- Paul Kirvan
- Sharon Shea, Executive Editor
 
- 
                Feature
                17 Oct 2023
                  10 cybersecurity experts to follow on social mediaCybersecurity experts provide valuable insights into the security landscape. Follow this curated list of recognized authorities to stay informed and safeguard your digital assets. Continue Reading By- Kinza Yasar, Technical Writer
 
- 
                Podcast
                12 Oct 2023
                  Risk & Repeat: Rapid Reset and the future of DDoS attacksThis podcast episode covers the record-breaking DDoS attack Rapid Reset, why it stands out among other DDoS campaigns and whether it will be widely replicated in the future. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                10 Oct 2023
                  'Rapid Reset' DDoS attacks exploiting HTTP/2 vulnerabilityCloudflare said the Rapid Reset DDoS attack was three times larger than the attack it had on record. Google similarly called it 'the largest DDoS attack to date.' Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Feature
                10 Oct 2023
                  Security posture management a huge challenge for IT prosEnterprise Strategy Group's John Oltsik explains why executing security hygiene and posture management at scale remains an uphill battle for organizations, despite automation. Continue Reading By- Linda Tucci, Industry Editor -- CIO/IT Strategy
 
- 
                News
                06 Oct 2023
                  MGM faces $100M loss from ransomware attackMGM's 8-K filing revealed some personal customer data was stolen during the September attack and said the company expects cyber insurance to sufficiently cover the losses. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                05 Oct 2023
                  Microsoft Schannel (Microsoft Secure Channel)The Microsoft Secure Channel, or Schannel, is a security support package that facilitates the use of Secure Sockets Layer (SSL) and Transport Layer Security (TLS) encryption on Windows platforms. Continue Reading By- Madelyn Bacon, TechTarget
 
- 
                News
                03 Oct 2023
                  Ransomware disrupts hospitality, healthcare in SeptemberRansomware disclosures and reports last month were headlined by attacks on MGM Resorts and Caesars Entertainment, which proved costly to the Las Vegas hospitality giants. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                03 Oct 2023
                  security postureSecurity posture refers to an organization's overall cybersecurity strength and how well it can predict, prevent and respond to ever-changing cyberthreats. Continue Reading By- Cameron Hashemi-Pour, Former Site Editor
- Linda Rosencrance
 
- 
                Opinion
                02 Oct 2023
                  Transitioning to single-vendor SASE will take timeNew Enterprise Strategy Group research reveals enterprises are interested in single-vendor SASE -- but with multiple tools on hand, the transition will take planning and time. Continue Reading By- John Grady, Principal Analyst
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
                Tip
                29 Sep 2023
                  How to use Wireshark to sniff and scan network trafficWireshark continues to be a critical tool for security practitioners. Learning how to use it to scan network traffic should be on every security pro's to-do list. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                News
                28 Sep 2023
                  US, Japan warn China-linked 'BlackTech' targeting routersCISA said BlackTech has targeted Cisco and other router makers by using a variety of tools and techniques to modify and even replace devices' firmware. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                28 Sep 2023
                  Cisco patches zero-day vulnerability under attackCisco said its Advanced Security Initiatives Group discovered the zero-day flaw while investigating attempted attacks on the vendor's Group Encrypted Transport VPN feature. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                25 Sep 2023
                  Dallas doles out $8.5M to remediate May ransomware attackThe city of Dallas provided a detailed attack timeline that showed Royal threat actors compromised a service account a month before ransomware was deployed. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tutorial
                22 Sep 2023
                  How to disable removable media access with Group PolicyRemovable media can pose serious security problems. But there is a way to control who has access to optical disks and USB drives through Windows' Active Directory. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                Definition
                21 Sep 2023
                  DNS over HTTPS (DoH)DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a Hypertext Transfer Protocol Secure encrypted session. Continue Reading By
- 
                News
                20 Sep 2023
                  Okta: Caesars, MGM hacked in social engineering campaignIdentity management vendor Okta had previously disclosed that four unnamed customers had fallen victim to a social engineering campaign that affected victims' MFA protections. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                20 Sep 2023
                  Cyber insurance report shows surge in ransomware claimsCoalition's H1 2023 report shows ransomware activity increased and severity reached "historic" highs as businesses lost an average of more than $365,000 following an attack. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Podcast
                19 Sep 2023
                  Risk & Repeat: MGM, Caesars casino hacks disrupt Las VegasThis podcast episode compares the cyber attacks suffered by casino giants MGM Resorts and Caesars Entertainment in recent weeks and the fallout from them. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                14 Sep 2023
                  Caesars Entertainment breached in social engineering attackCaesars said it took steps after the breach to "ensure that the stolen data is deleted by the unauthorized actor," suggesting it paid a ransom to the attackers. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                14 Sep 2023
                  Palo Alto Networks: 80% of security exposures exist in cloudIt's no surprise that organizations struggle with cloud security, but a new report reveals an alarming split between cloud and on-premise security exposures. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                13 Sep 2023
                  Browser companies patch critical zero-day vulnerabilityWhile attack details remain unknown, Chrome, Edge and Firefox users are being urged to update their browsers as an exploit for CVE-2023-4863 lurks in the wild. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                11 Sep 2023
                  Cisco VPN flaw faces attempted Akira ransomware attacksCisco said it became aware of 'attempted exploitation' last month and referenced an Aug. 24 security advisory saying its VPNs were under attack by the Akira ransomware gang. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                07 Sep 2023
                  How Storm-0558 hackers stole an MSA key from MicrosoftMicrosoft detailed a series of errors that led to a consumer account signing key accidentally being included in a crash dump that was later accessed by Storm-0558 actors. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                05 Sep 2023
                  Ransomware attacks on education sector spike in AugustWhile data breach notifications for MoveIt Transfer customers continued to rise, August also saw ransomware ramp up against schools and universities as classes resumed. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                30 Aug 2023
                  FBI, Justice Department dismantle Qakbot malwareThe FBI operation, one of the largest U.S.-led botnet disruption efforts ever, included international partners such as France, Germany, the Netherlands and the United Kingdom. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                29 Aug 2023
                  Microsoft Teams attack exposes collab platform security gapsCriminal and state-sponsored hackers are ramping up cyberattacks on instant messaging platforms and other workplace collaboration tools. Meanwhile, enterprises' readiness lags. Continue Reading By- Shaun Sutner, Senior News Director
 
- 
                News
                29 Aug 2023
                  Mandiant reveals new backdoors used in Barracuda ESG attacksFurther investigations show threat actors were prepared for Barracuda Networks' remediation efforts, including an action notice to replace all compromised devices. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                24 Aug 2023
                  FBI: Suspected Chinese actors continue Barracuda ESG attacksThe alert comes after Barracuda Networks issued an advisory stating that patches for CVE-2023-2868 were insufficient and all affected ESG devices need to be replaced. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                23 Aug 2023
                  Sophos: RDP played a part in 95% of attacks in H1 2023While Sophos observed increasing activity around Active Directory and Remote Desktop Protocol abuse, it recommended simple mitigation steps can limit the attack surface. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
- Rob Wright, Senior News Director, Dark Reading
 
- 
                Definition
                23 Aug 2023
                  network vulnerability scanningNetwork vulnerability scanning is the process of inspecting and reporting potential vulnerabilities and security loopholes on a computer, network, web application or other device, including firewalls, switches, routers and wireless access points. Continue Reading By- Kinza Yasar, Technical Writer
 
- 
                News
                17 Aug 2023
                  CISA, vendors warn Citrix ShareFile flaw under attackA vulnerability in the managed file transfer product that enterprises use is being actively exploited two months after Citrix released a fix. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                09 Aug 2023
                  Onapsis researchers detail new SAP security threatsAt Black Hat 2023, Onapsis researchers demonstrated how attackers could chain a series of SAP vulnerabilities impacting the P4 protocol to gain root access to a target network. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tip
                09 Aug 2023
                  Types of Nmap scans and best practicesNmap scanning helps network teams with network reconnaissance and vulnerability discovery. Common types of scans include TCP SYN, OS detection, vulnerability and version detection. Continue Reading 
- 
                News
                03 Aug 2023
                  MoveIt Transfer attacks dominate July ransomware disclosuresTraditional ransomware attacks took a back seat last month, as Clop operators continued to claim victims from the zero-day attacks on MoveIt Transfer customers. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tip
                01 Aug 2023
                  Top 5 benefits of SASE to enhance network securityA cloud-based distributed architecture, centralized management and endpoint-specific security policies are just some of the benefits of Secure Access Service Edge. Continue Reading By- Terry Slattery, NetCraftsmen
 
- 
                News
                27 Jul 2023
                  Google: 41 zero-day vulnerabilities exploited in 2022While attackers increasingly exploited zero-day flaws last year, one of the most notable findings from the report emphasized how inadequate patches led to new variants. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                25 Jul 2023
                  Thoma Bravo sells Imperva to Thales Group for $3.6BWith the acquisition, Thales looks to expand its Digital Security and Identity business with an increased focus on protecting web applications and API. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tip
                25 Jul 2023
                  5 steps to approach BYOD compliance policiesIt can be difficult to ensure BYOD endpoints are compliant because IT can't configure them before they ship to users. Admins must enforce specific policies to make up for this. Continue Reading By- Will Kelly
- Mike Chapple, University of Notre Dame
 
- 
                News
                20 Jul 2023
                  Cyber insurers adapting to data-centric ransomware threatsCyber insurance carriers and infosec vendors weigh in on how the shift in ransomware tactics is affecting policies and coverage, presenting challenges for enterprises. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                17 Jul 2023
                  Microsoft still investigating stolen MSA key from email attacksWhile Microsoft provided additional attack details and techniques used by Storm-0558, it remains unclear how the Microsoft account signing key was acquired. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                13 Jul 2023
                  Microsoft: Government agencies breached in email attacksWhile Microsoft mitigated the attacks and found no evidence of further access beyond the email accounts, the Outlook breaches raised questions for the software giant. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                12 Jul 2023
                  Russia-based actor exploited unpatched Office zero dayMicrosoft investigated an ongoing phishing campaign that leverages Word documents to deliver malicious attachments to targeted organizations in the U.S. and Europe. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Podcast
                11 Jul 2023
                  Risk & Repeat: How bad is Clop's MoveIt Transfer campaign?Clop's data theft and extortion campaign against MoveIt Transfer customers marks some of the most high-profile threat activity this year, but its success level remains unclear. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                10 Jul 2023
                  TPG Capital acquires Forcepoint's government unit for $2.45BForcepoint's Global Governments and Critical Infrastructure unit will operate independently under TPG, while the commercial business will remain at Francisco Partners. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Feature
                10 Jul 2023
                  Wi-Fi AP placement best practices and security policiesFrom a security standpoint, Wi-Fi network designers should consider the physical and logical placement of APs, as well as management, segmentation and rogue devices. Continue Reading By
- 
                Definition
                07 Jul 2023
                  bridgeA bridge is a class of network device designed to connect networks at OSI Level 2, which is the data link layer of a local area network. Continue Reading By- Tom Nolle, Andover Intel
 
- 
                Definition
                07 Jul 2023
                  network intrusion protection system (NIPS)A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity. Continue Reading By
- 
                News
                05 Jul 2023
                  June saw flurry of ransomware attacks on education sectorAs the school year culminated, ransomware attacks surged across K-12 schools and universities, causing class disruptions and putting sensitive data at risk. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tutorial
                05 Jul 2023
                  3 ways to troubleshoot using Wireshark and tcpdumpProtocol analyzer tools, such as Wireshark and tcpdump, can help network administrators identify protocols in the network, analyze network performance and discover network devices. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                News
                28 Jun 2023
                  DDoS attacks surging behind new techniques, geopolitical goalsA rise in massive DDoS attacks, some of which target the application layer and cause significant disruptions, might require new defense strategies from cybersecurity vendors. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                27 Jun 2023
                  Censys finds hundreds of exposed devices in federal orgsCensys found exposed instances of Progress Software's MoveIt Transfer and Barracuda Networks' Email Security Gateway appliances during its analysis of FCEB agency networks. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                21 Jun 2023
                  Critical VMware Aria Operations bug under active exploitationReports of exploitation for a critical command injection flaw in VMware Aria Operations for Networks came roughly a week after a researcher published a proof-of-concept for it. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                21 Jun 2023
                  May ransomware activity rises behind 8base, LockBit gangsLockBit was the most active group last month, but NCC Group researchers were surprised by 8base, which started listing victims from attacks that occurred beginning in April 2022. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Podcast
                20 Jun 2023
                  Risk & Repeat: More victims emerge from MoveIt Transfer flawCISA last week said several federal agencies suffered data breaches resulting from a MoveIt Transfer zero-day vulnerability, though it's unclear what type of data was stolen. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                19 Jun 2023
                  Microsoft: DDoS attacks caused M365, Azure disruptionsMicrosoft confirmed widespread service disruptions earlier this month were caused by layer 7 DDoS attacks by a threat group it identified as Storm-1359. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tip
                16 Jun 2023
                  Use IoT hardening to secure vulnerable connected devicesIoT and industrial IoT innovation continue to thrive, but IoT device security continues to be an afterthought. Companies should harden connected devices to remain protected. Continue Reading By
- 
                Podcast
                15 Jun 2023
                  Risk & Repeat: Mandiant sheds light on Barracuda ESG attacksBarracuda Networks attempted to fix the critical ESG zero-day vulnerability, but a Chinese nation-state threat actor was able to maintain access on compromised devices. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                15 Jun 2023
                  Chinese nation-state actor behind Barracuda ESG attacksMandiant said the zero-day attacks on Barracuda Email Security Gateway appliances were part of a 'wide-ranging campaign in support of the People's Republic of China.' Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Opinion
                14 Jun 2023
                  Cisco releases new security offerings at Cisco Live 2023At Cisco Live 2023, Cisco emphasized its plans to emphasize security, rolling out a host of new initiatives from secure access to AI-aided security to cloud-native app security. Continue Reading By- Melinda Marks, Practice Director
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
                News
                13 Jun 2023
                  Fortinet warns critical VPN vulnerability 'may' be under attackFortinet said the heap buffer overflow flaw might have been exploited already and warned that Chinese nation-state threat group Volt Typhoon would likely attack the vulnerability. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                08 Jun 2023
                  Barracuda: Replace vulnerable ESG devices 'immediately'Customers with email security gateway appliances affected by a recent zero-day flaw, CVE-2023-2868, are being urged to replace devices, even if the hardware has been patched. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tip
                07 Jun 2023
                  6 blockchain use cases for cybersecurityIs blockchain secure by design, or should blockchains be designed for security? Learn more through these six security and privacy use cases for blockchain. Continue Reading By- Jessica Groopman, Kaleido Insights
 
- 
                News
                06 Jun 2023
                  Ransomware takes down multiple municipalities in MayCity and local governments experienced severe disruptions to public services due to ransomware attacks in May, particularly from the Royal ransomware group. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                05 Jun 2023
                  security analyticsSecurity analytics is a cybersecurity approach that uses data collection, data aggregation and analysis tools for threat detection and security monitoring. Continue Reading 
- 
                News
                01 Jun 2023
                  Zyxel vulnerability under 'widespread exploitation'Researchers warn that threat actors are widely exploiting an unauthenticated command injection vulnerability to target multiple Zyxel network devices. Continue Reading By- Alexis Zacharakos
 
- 
                Definition
                01 Jun 2023
                  NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework)The NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework) is a reference resource that classifies the typical skill requirements and duties of cybersecurity workers. Continue Reading 
- 
                News
                01 Jun 2023
                  Mitiga warns free Google Drive license lacks logging visibilityThe ability to view logs is critical for enterprises to detect and attribute malicious activity. Mitiga said the Google Drive issue allows data exfiltration without a trace. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                31 May 2023
                  Barracuda zero-day bug exploited months prior to discoveryBarracuda said a zero-day flaw used to target its email security gateway appliance customers is a remote command injection vulnerability exploited since at least October 2022. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Feature
                31 May 2023
                  An overview of 802.1X authentication methods and EAPEnterprises use 802.1X authentication to manage their wireless LANs, and that process relies on the Extensible Authentication Protocol and its various types. Continue Reading By- Jennifer English, Editorial Director
- Lisa Phifer, Core Competence
 
- 
                News
                31 May 2023
                  Many Gigabyte PC models affected by major supply chain issueEclypsium researchers say the insecure implementation of PC hardware manufacturer Gigabyte's App Center could potentially result in supply chain attacks. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                25 May 2023
                  Chinese hackers targeting U.S. critical infrastructureMicrosoft uncovered a Chinese nation-state threat group that is compromising Fortinet FortiGuard devices to gain access to critical infrastructure entities in the U.S. and Guam. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading