Come up with a cybersecurity-themed caption for the cartoon above, and you could win a $25 Amazon gift card if it's chosen as Dark Reading editors' favorite. Here...
The dramatic decline in cryptocurrency has dampened activity around specific types of financial crimes — most significantly, investment scams and illegal Dark Web transactions...
Researchers have discovered a vulnerability
in the remote procedure calls (RPC) for the Windows Server service, which could
allow an attacker to gain control over the...
Are you a fan of fitness-focused social networking apps such as Strava? You're not alone. Even military personnel enjoy tracking and sharing their runs....
Many security practitioners take their eye off cloud and software-as-a-service (SaaS) security based on the faulty assumption that the providers are inherently secure. While...
BLACK HAT USA — Las Vegas — A top Microsoft security executive today defended the company's vulnerability disclosure policies as providing enough information for...
The Internet of Things industry's lack of cybersecurity standards is nothing new. We’ve been at this for years. However, with the number of devices expected...
A series of vulnerabilities on the popular asset management platform Device42 could be exploited to give attackers full root access to the system, according...
SAN FRANCISCO---Deepfence,
a pioneer in the emerging security observability and protection space,
today announced the 1.4 release of its open source project ThreatMapper,
a cutting-edge, cloud native...