Threats and vulnerabilities
Keeping up with the latest threats and vulnerabilities is a battle for any security pro. Get up-to-date information on email threats, nation-state attacks, phishing techniques, ransomware and malware, DDoS attacks, APTs, application vulnerabilities, zero-day exploits, malicious insiders and more.
Top Stories
- 
				News
					17 Oct 2025
					
									
										  News brief: National cyberdefenses under mounting pressureCheck out the latest security news from the Informa TechTarget team. Continue Reading By
- 
				Tip
					16 Oct 2025
						
										  7 top deception technology vendors for active defenseOnce reserved for the most mature organizations, cyber deception technology is picking up steam on the ground and in practice. Here are seven platforms for CISOs to consider. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Tip
                06 Mar 2024
                  Explore mitigation strategies for 10 LLM vulnerabilitiesAs large language models enter more enterprise environments, it's essential for organizations to understand the associated security risks and how to mitigate them. Continue Reading By
- 
                News
                05 Mar 2024
                  Alphv/BlackCat leak site goes down in possible exit scamAn Alphv/BlackCat affiliate accused the ransomware gang of stealing a ransom payment worth more than $20 million that may have been obtained in the Change Healthcare attack. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                05 Mar 2024
                  Critical JetBrains TeamCity vulnerabilities under attackExploitation activity has started against two vulnerabilities in JetBrains TeamCity, which has been targeted previously by nation-state threat actors such as Russia's Cozy Bear. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tip
                05 Mar 2024
                  DoS vs. DDoS: How they differ and the damage they causeDoS and DDoS attacks may not be new, but that doesn't mean they are any less disruptive to organizations. Companies should understand what they are and how they work. Continue Reading By- Ravi Das, ML Tech Inc.
 
- 
                News
                04 Mar 2024
                  LockBit, Alphv/BlackCat highlight February ransomware activityWith events surrounding the LockBit and Alphv/BlackCat gangs and the ConnectWise ScreenConnect flaws, ransomware activity continues this year after a surge in 2023. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Tip
                01 Mar 2024
                  How dynamic malware analysis worksSecurity teams use dynamic malware analysis to uncover how malware works -- and thereby improve threat hunting and incident detection capabilities. Continue Reading By
- 
                Podcast
                27 Feb 2024
                  Risk & Repeat: LockBit resurfaces after takedownLockBit returns just days after an international law enforcement operation infiltrated the ransomware gang's network and seized infrastructure, source code and decryption keys. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                27 Feb 2024
                  Ransomware gangs exploiting ConnectWise ScreenConnect flawsRansomware activity is ramping up against vulnerable ScreenConnect systems as Black Basta and Bl00dy threat actors were observed exploiting the vulnerabilities. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                26 Feb 2024
                  LockBit restores servers following law enforcement takedownLaw enforcement agencies last week announced a takedown of the LockBit ransomware gang that involved the seizure of servers, websites and decryption keys, as well as two arrests. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                23 Feb 2024
                  GitHub Copilot replicating vulnerabilities, insecure codeResearch from Snyk shows that AI assistants such as GitHub Copilot, which offer code completion suggestions, often amplify existing bugs and security issues in a user's codebase. Continue Reading By- Rob Wright, Senior News Director, Dark Reading
 
- 
                News
                22 Feb 2024
                  ConnectWise ScreenConnect flaws under attack, patch nowHuntress said in a blog post this week that the ConnectWise ScreenConnect flaws, which have come under attack, were 'trivial and embarrassingly easy' for a threat actor to exploit. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                21 Feb 2024
                  Coalition: Vulnerability scoring systems falling shortCoalition said enterprises faced more substantial fallout from attacks on Citrix Bleed and Progress Software's MoveIt Transfer due to inadequate vulnerability prioritization. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                21 Feb 2024
                  CrowdStrike 'Global Threat Report': Cloud intrusions up 75%This year's report covered cloud intrusions, data extortion attacks, and the ongoing conflict between Israel and Hamas. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                15 Feb 2024
                  Ransomware disrupts utilities, infrastructure in JanuaryRansomware attacks last month caused outages and disruptions at public sector and critical infrastructure organizations as well as a major financial services firm. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tip
                14 Feb 2024
                  Improve AI security by red teaming large language modelsCyberattacks such as prompt injection pose significant security risks to LLMs, but implementing red teaming strategies can test models' resistance to various cyberthreats. Continue Reading By
- 
                News
                13 Feb 2024
                  Iranian cyberattacks targeting U.S. and Israeli entitiesGoogle said Tuesday that state-backed Iranian actors targeted the U.S. and Israel consistently in the years prior to the start of the Israel-Hamas war as well as the months after. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Guest Post
                13 Feb 2024
                  How passwordless helps guard against AI-enhanced attacksWith all the potential of generative AI comes a major downfall: malicious actors using it in attacks. Shifting from password-based authentication can help solve the challenge. Continue Reading By- Andrew Shikiar
 
- 
                Feature
                13 Feb 2024
                  Ransomware preparedness kicks off 2024 summit seriesBrightTALK commenced the new year with ransomware readiness, giving viewers workable tips to prevent and recover from a devastating attack. Check out some highlights here. Continue Reading By- Alicia Landsberg, Senior Managing Editor
 
- 
                News
                12 Feb 2024
                  CISA warns Fortinet zero-day vulnerability under attackCISA alerted federal agencies that a critical zero-day vulnerability in FortiOS is being actively exploited, though Fortinet has yet to confirm reports. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                12 Feb 2024
                  password sprayingPassword spraying is a cyberattack tactic that involves a hacker using a single password to try and break into multiple target accounts. Continue Reading By- Ben Lutkevich, Site Editor
 
- 
                Tip
                12 Feb 2024
                  Top metaverse cybersecurity challenges: How to address themAs the metaverse takes shape, companies must consider a slew of new cybersecurity challenges and how to deal with them. Continue Reading By- Ashwin Krishnan, StandOutin90Sec
 
- 
                Definition
                09 Feb 2024
                  cyberterrorismCyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence. Continue Reading 
- 
                News
                08 Feb 2024
                  NCC Group records the most ransomware victims ever in 2023Enterprises faced an alarming number of ransomware attacks as gangs targeted supply chains and took advantage of zero-day vulnerabilities and organizations' patching struggles. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                07 Feb 2024
                  Chainalysis: 2023 a 'watershed' year for ransomwareChainalysis said ransomware payments ballooned to reach $1.1 billion in 2023, marking a complete reversal from the decline in ransomware payments seen the year prior. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Definition
                07 Feb 2024
                  keylogger (keystroke logger or system monitor)A keylogger, sometimes called a keystroke logger, is a type of surveillance technology used to monitor and record each keystroke on a specific device, such as a computer or smartphone. Continue Reading By- Rahul Awati
- Alexander S. Gillis, Technical Writer and Editor
 
- 
                News
                06 Feb 2024
                  Google: Spyware vendors are driving zero-day exploitationGoogle's Threat Analysis Group urged further government action against commercial surveillance vendors that let customers abuse spyware products with impunity. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                06 Feb 2024
                  Linux group announces Post-Quantum Cryptography AllianceThe Post-Quantum Cryptography Alliance aims to 'drive the advancement and adoption of post-quantum cryptography' and respond to security threats introduced by the emerging tech. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Definition
                06 Feb 2024
                  dictionary attackA dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary, or word list, as a password. Continue Reading By
- 
                Guest Post
                02 Feb 2024
                  GenAI development should follow secure-by-design principlesEvery company wants a piece of the GenAI pie, but rushing to develop a product without incorporating secure-by-design principles could harm their business and customers. Continue Reading By- Ed Skoudis, SANS Technology Institute
 
- 
                News
                01 Feb 2024
                  Critical infrastructure hacks raise alarms on Chinese threatsFBI Director Christopher Wray and CISA Director Jen Easterly warned that China was targeting critical infrastructure for possible destructive attacks in the event of a conflict with the United States. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                31 Jan 2024
                  Ivanti discloses new zero-day flaw, releases delayed patchesWhile Ivanti customers can start patching two previously disclosed vulnerabilities, they must also address two new flaws for the same product. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                30 Jan 2024
                  data lossData loss is the intentional or unintentional destruction of information. Continue Reading By- Erin Sullivan, Senior Site Editor
 
- 
                News
                30 Jan 2024
                  Corvus: 2023 was a 'record-breaking' ransomware yearThe insurance company analyzed claims data and ransomware gangs' data leak sites, which suggests as many as 7,600 organizations across the globe were attacked in 2023. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Feature
                30 Jan 2024
                  Security executives slam Microsoft over latest breachCriticisms about Microsoft's breach include the lack of multifactor authentication on the targeted account and the company's approach to disclosing information about the attack. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                26 Jan 2024
                  Microsoft: Legacy account hacked by Russian APT had no MFAMicrosoft has begun notifying other organizations that have been targeted in recent attacks by Midnight Blizzard, a Russian nation-state actor also known as Cozy Bear and APT29. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
- Rob Wright, Senior News Director, Dark Reading
 
- 
                Definition
                26 Jan 2024
                  digital forensics and incident response (DFIR)Digital forensics and incident response (DFIR) is a combined set of cybersecurity operations that incident response teams use to detect, investigate and respond to cybersecurity events. Continue Reading 
- 
                News
                25 Jan 2024
                  HPE breached by Russian APT behind Microsoft hackHPE suspects that Cozy Bear, a Russian state-sponsored threat actor also known as Midnight Blizzard and Nobelium, breached its network twice in 2020. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                24 Jan 2024
                  NCSC says AI will increase ransomware, cyberthreatsWhile other threats are likely to increase as well, the U.K.'s National Cyber Security Centre warns that threat actors will use AI to continue the influx of ransomware attacks. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                23 Jan 2024
                  Attacks begin on critical Atlassian Confluence vulnerabilityExploitation activity for CVE-2023-22527 marks the third time in four months that a critical Atlassian Confluence flaw has gained threat actors' attention. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tip
                23 Jan 2024
                  How to avoid malware on Linux systemsMalware attacks are devastating to companies, and there is no exception for Linux systems. Consider updating systems and assigning correct permissions. Continue Reading By
- 
                Tip
                23 Jan 2024
                  Building an incident response framework for your enterpriseUnderstanding incident response framework standards and how to build the best framework for your organization is essential to prevent threats and mitigate cyber incidents. Continue Reading By- David Geer, Geer Communications
- Peter Sullivan
 
- 
                News
                22 Jan 2024
                  Microsoft breached by Russian APT behind SolarWinds attackSeveral email accounts belonging to Microsoft senior leadership were accessed as part of the breach, though Microsoft found 'no evidence' of customer environments being accessed. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                19 Jan 2024
                  Chinese threat group exploited VMware vulnerability in 2021After VMware confirmed that CVE-2023-34048 had been exploited, Mandiant attributed the activity to a China-nexus threat group and revealed that exploitation began in late 2021. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                19 Jan 2024
                  security incidentA security incident is an event that could indicate that an organization's systems or data have been compromised or that security measures put in place to protect them have failed. Continue Reading By- Kinza Yasar, Technical Writer
- Mary E. Shacklett, Transworld Data
- Ivy Wigmore
 
- 
                News
                18 Jan 2024
                  CISA posts incident response guide for water utilitiesIn its guide, CISA urged water and wastewater sector utility operators to harden their security posture, increase information sharing and build incident response plans. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                17 Jan 2024
                  New zero-days in Citrix NetScaler ADC, Gateway under attackThe new vulnerabilities come four months after a variety of threat actors exploited the 'Citrix Bleed' zero-day flaw in NetScaler ADC and Gateway products. Continue Reading By- Rob Wright, Senior News Director, Dark Reading
 
- 
                News
                17 Jan 2024
                  Google, researchers in dispute over account hijacking attacksGoogle disputes aspects of threat research that CloudSEK published last month claiming threat actors are maintaining persistence after hijacking Google user accounts. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                16 Jan 2024
                  Ivanti zero-day flaws under 'widespread' exploitationVolexity confirmed that multiple threat actors have exploited two critical Ivanti zero-day vulnerabilities, with 1,700 devices compromised so far. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                11 Jan 2024
                  Ivanti confirms 2 zero-day vulnerabilities are under attackVolexity reported the vulnerabilities to Ivanti after discovering that suspected Chinese nation-state threat actors created an exploit chain to achieve remote code execution. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tip
                11 Jan 2024
                  Cloud incident response: Frameworks and best practicesCloud incident response, like it sounds, involves responding to incidents in the cloud. But there are nuances to be aware of and unique best practices to follow. Continue Reading By- Dave Shackleford, Voodoo Security
 
- 
                News
                10 Jan 2024
                  China claims it cracked Apple's AirDrop, can track sendersThe flaw used by Chinese researchers to crack Apple's AirDrop encryption was reported to the company in 2019 by researchers at German university TU Darmstadt. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                09 Jan 2024
                  Account hijacking, cryptocurrency scams spread on XOne company that had its account stolen and used for cryptocurrency scams, CertiK, said it was hacked through a phishing attack from a journalist's compromised account. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Feature
                09 Jan 2024
                  How to fix the top 5 cybersecurity vulnerabilitiesCheck out how to fix five top cybersecurity vulnerabilities to prevent data loss from poor endpoint security, ineffective network monitoring, weak authentication and other issues. Continue Reading By- Dave Shackleford, Voodoo Security
 
- 
                Feature
                04 Jan 2024
                  10 of the biggest zero-day attacks of 2023There were many zero-day vulnerabilities exploited in the wild in 2023. Here's a look at 10 of the most notable and damaging zero-day attacks last year. Continue Reading By- Rob Wright, Senior News Director, Dark Reading
 
- 
                News
                04 Jan 2024
                  December ransomware attacks disrupt healthcare organizationsTwo attacks last month exposed the sensitive information of more than 3 million individuals as ransomware attacks continued to disrupt networks and expose private data. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                27 Dec 2023
                  email signatureAn email signature -- or signature block or signature file -- is the short text that appears at the end of an email message to provide more information about the sender. Continue Reading By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
 
- 
                News
                27 Dec 2023
                  Another Barracuda ESG zero-day flaw exploited in the wildOn Christmas Eve, Barracuda disclosed that a China-nexus threat actor had resumed attacks against its Email Security Gateway appliance using a new zero-day vulnerability. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                21 Dec 2023
                  10 of the biggest ransomware attacks in 2023Ransomware attacks against U.S. organizations hit record levels this year as threat actors stepped up extortion tactics and took shaming victims to new levels. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Feature
                20 Dec 2023
                  Board preparedness: 7 steps to combat cybersecurity threatsIn the face of security breaches, organization board members must urgently tackle real-world cyber threats. These seven steps offer crucial preparedness for companies. Continue Reading By- Amanda Hetler, Senior Editor
 
- 
                News
                18 Dec 2023
                  Akamai discloses zero-click exploit for Microsoft OutlookDuring research into an older Microsoft Outlook privilege escalation vulnerability, Akamai discovered two new flaws that can be chained for a zero-click RCE exploit. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                14 Dec 2023
                  Russian APT exploiting JetBrains TeamCity vulnerabilityThe Russian hackers behind the SolarWinds attacks are the latest nation-state group to exploit a critical TeamCity vulnerability to gain initial access to victims' servers. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Feature
                14 Dec 2023
                  9 cybersecurity trends to watch in 2024Analysts are sharing their cybersecurity trends and predictions for 2024. From zero-day attacks to generative AI security and increased regulations, is your organization ready? Continue Reading By- Kyle Johnson, Technology Editor
 
- 
                News
                14 Dec 2023
                  Splunk: AI isn't making spear phishing more effectiveWhile new research shows AI tools won't make it easier for adversaries to conduct successful phishing attacks, social engineering awareness should remain a priority. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                13 Dec 2023
                  How ransomware gangs are engaging -- and using -- the mediaNew Sophos research shows that ransomware groups are not only attacking technical systems, but taking advantage of information systems as well to pressure victims into paying. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Opinion
                06 Dec 2023
                  How organizations can learn from cloud security breachesResearch shed light on cloud security breaches. It's time to learn from the past and mitigate these attacks in the future with strong cloud security and posture management. Continue Reading By- Jon Oltsik, Analyst Emeritus
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
                News
                06 Dec 2023
                  Forescout uncovers 21 Sierra Wireless router vulnerabilitiesForescout is urging enterprises to patch software for affected OT/IoT routers as attackers increasingly target edge devices to gain network access to critical infrastructure. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                05 Dec 2023
                  Ransomware ramps up against private sector in NovemberRansomware disclosures and reports increased again in November, with the most disruptive and dangerous attacks occurring against healthcare organizations. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                04 Dec 2023
                  Fancy Bear hackers still exploiting Microsoft Exchange flawMicrosoft and Polish Cyber Command warned enterprises that Russian nation-state hackers are exploiting CVE-2023-23397 to gain privileged access to Exchange email accounts. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                30 Nov 2023
                  Black Basta ransomware payments exceed $100M since 2022Insurance provider Corvus and blockchain analytics vendor Elliptic partnered to examine how much damage the Black Basta ransomware group has caused in less than two years. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                28 Nov 2023
                  timing attackA timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about or access a system. Continue Reading By
- 
                News
                27 Nov 2023
                  Threat actors targeting critical OwnCloud vulnerabilityResearchers observed exploitation attempts against a vulnerability affecting OwnCloud's Graph API app, highlighting threat actors' continued focus on file-sharing products. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Tip
                22 Nov 2023
                  4 data loss examples keeping backup admins up at nightProtecting data is a critical task for backup admins, and threats are ever evolving. Preparation is key to preventing data loss and recovering quickly. Continue Reading By- Mitch Lewis, Evaluator Group
 
- 
                News
                21 Nov 2023
                  CISA, FBI warn of LockBit attacks on Citrix BleedThe latest advisory on exploitation of the Citrix Bleed vulnerability confirmed that the LockBit ransomware group perpetrated the attack on Boeing. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                16 Nov 2023
                  Alphv ransomware gang claims it reported MeridianLink to SECMeridianLink said it recently identified a "cybersecurity incident," but the Alphv ransomware gang claims it breached the company and compromised customer data. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Definition
                16 Nov 2023
                  Automated Clearing House fraud (ACH fraud)ACH fraud is the theft of funds through the U.S. Department of the Treasury's Automated Clearing House financial transaction network. Continue Reading By
- 
                News
                15 Nov 2023
                  VMware discloses critical, unpatched Cloud Director bugA manual workaround is currently available for a critical VMware Cloud Director Appliance flaw, tracked as CVE-2023-34060, but no patch is available at press time. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Tip
                15 Nov 2023
                  How to protect your organization from IoT malwareIoT devices are attractive targets to attackers, but keeping them secure isn't easy. Still, there are steps to take to minimize risk and protect networks from attacks. Continue Reading By
- 
                News
                14 Nov 2023
                  Cryptocurrency wallets might be vulnerable to 'Randstorm' flawCryptocurrency recovery company Unciphered discovered a vulnerability in a JavaScript Bitcoin library that could jeopardize private keys. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                13 Nov 2023
                  LockBit ransomware gang claims it leaked stolen Boeing dataBoeing confirmed that it experienced a cybersecurity incident following LockBit's claims, but the aircraft manufacturer has not directly confirmed a ransomware attack. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                09 Nov 2023
                  Lace Tempest exploits SysAid zero-day vulnerabilitySysAid urged users to patch a zero-day vulnerability in its on-premises software, which is being exploited by the threat actor behind the MoveIt Transfer ransomware attacks. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                08 Nov 2023
                  FBI: Ransomware actors hacking casinos via third partiesA new Private Industry Notification focuses on ransomware trends involving attacks against casinos as well as a callback phishing campaign perpetrated by the Luna Moth gang. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                08 Nov 2023
                  Atlassian Confluence vulnerability under widespread attackAtlassian's Confluence Data Center and Server products are under attack again as reports of widespread exploitation roll in just days after CVE-2023-22518 was publicly disclosed. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                Definition
                07 Nov 2023
                  dark web monitoringDark web monitoring is the process of searching for and continuously tracking information on the dark web. Continue Reading By- Ben Lutkevich, Site Editor
 
- 
                News
                07 Nov 2023
                  Microsoft, ZDI disagree over Exchange zero-day flawsMicrosoft said it had previously fixed one of the flaws and that the others did not require a patch. Trend Micro's Zero Day Initiative, however, disagreed with the software giant. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Tip
                07 Nov 2023
                  7 useful hardware pen testing toolsPenetration testers use a variety of hardware to conduct security assessments, including a powerful laptop, Raspberry Pi, Rubber Ducky and more. Continue Reading By
- 
                News
                06 Nov 2023
                  Ransomware continues to rise in October across all sectorsRansomware disclosures and reports surged last month, leading in some cases to bankruptcy filing, prolonged business disruptions and ambulance diversions for hospitals. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                02 Nov 2023
                  Zscaler finds 117 Microsoft 365 bugs via SketchUp 3D file typeMicrosoft published patches to address all 117 Microsoft 365 Apps flaws disclosed Tuesday, and the tech giant has disabled support for SketchUp, or SKP, 3D model files. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                News
                31 Oct 2023
                  No patches yet for Apple iLeakage side-channel attackApple said it is working on more complete fixes for the iLeakage side-channel attack technique, but only one partial mitigation is currently available to macOS customers. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Tip
                30 Oct 2023
                  Adversarial machine learning: Threats and countermeasuresAs machine learning becomes widespread, threat actors are developing clever attacks to manipulate and exploit ML applications. Review potential threats and how to combat them. Continue Reading By
- 
                Tip
                30 Oct 2023
                  What an email security policy is and how to build oneCompanies must have an effective security policy in place to protect email from cybercriminals and employee misuse. Learn how to build one for your company. Continue Reading By- Andrew Froehlich, West Gate Networks
 
- 
                Tip
                27 Oct 2023
                  How to create a cybersecurity awareness training programCybersecurity awareness training often misses the mark, leaving employees undereducated and organizations vulnerable to attack. Here's how to succeed where too many fail. Continue Reading By- Alissa Irei, Senior Site Editor
- Mike Chapple, University of Notre Dame
 
- 
                News
                26 Oct 2023
                  NCC Group details 153% spike in September ransomware attacksNCC Group analysts warned the significant year-over-year increase will likely continue. Organizations may see 4,000 ransomware attacks by the end of 2023. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
                News
                24 Oct 2023
                  Cisco IOS XE instances still under attack, patch nowIn the days since Cisco's initial disclosure, the networking giant found a second Cisco IOS XE zero-day as well as new evasion techniques being utilized by threat actors. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Definition
                24 Oct 2023
                  PlundervoltPlundervolt is the name of an undervolting attack that targeted Intel central processing units (CPUs). Continue Reading By- Ben Lutkevich, Site Editor
 
- 
                News
                19 Oct 2023
                  CISA, NSA, FBI publish phishing guidanceIn its guidance, CISA focused on two primary goals of phishing attacks: obtaining login credentials, often via social engineering, and installing malware on target systems. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Tip
                18 Oct 2023
                  Cybersecurity vs. cyber resilience: What's the difference?Companies need cybersecurity and cyber-resilience strategies to protect against attacks and mitigate damage in the aftermath of a successful data breach. Continue Reading By
- 
                News
                17 Oct 2023
                  Cisco IOS XE zero-day facing mass exploitationVulnCheck said its public scanning for CVE-2023-20198 revealed that 'thousands' of internet-facing Cisco IOS XE systems have been compromised with malicious implants. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading
 
- 
                Tip
                17 Oct 2023
                  Allowlisting vs. blocklisting: Benefits and challengesAllowlisting and blocklisting are key components of access control. Learn the benefits and challenges of each approach and why a combination of the two is often the best strategy. Continue Reading By- Ashwin Krishnan, StandOutin90Sec
 
- 
                Definition
                16 Oct 2023
                  SEO poisoning (search poisoning)SEO poisoning, also known as 'search poisoning,' is a type of malicious advertising (malvertising) in which cybercriminals create malicious websites and then use search engine optimization (SEO) techniques to cause the sites' links to show up prominently in search results, often as ads at the top of the results. Continue Reading 
- 
                News
                16 Oct 2023
                  Cisco working on fix for critical IOS XE zero-dayCisco designated the bug, CVE-2023-20198, with a CVSS score of 10 and said it was working on a patch, but advised customers to apply mitigations in the meantime. Continue Reading By- Alexander Culafi, Senior News Writer, Dark Reading