Plato Data Intelligence.
Vertical Search & Ai.

Tag: Dark reading

Name That Toon: Vicious Circle

Come up with a cybersecurity-themed caption for the cartoon above, and you could win a $25 Amazon gift card if it's chosen as Dark Reading editors' favorite. Here...

With Plunge in Value, Cryptocurrency Crimes Decline in 2022

The dramatic decline in cryptocurrency has dampened activity around specific types of financial crimes — most significantly, investment scams and illegal Dark Web transactions...

Windows Vulnerability Could Crack DC Server Credentials Open

Researchers have discovered a vulnerability in the remote procedure calls (RPC) for the Windows Server service, which could allow an attacker to gain control over the...

Lessons From the Cybersecurity Trenches

Growing up in the Pacific Northwest, I was fascinated by treasure hunting. I love the idea of finding something valuable or important. I had...

DEF CON 30: Hackers Come Home to Vibrant Community

DEF CON — Las Vegas — Halls stuffed with hackers lined up for hours for their chance to hone their skills on the latest...

How and Why to Apply OSINT to Protect the Enterprise

Are you a fan of fitness-focused social networking apps such as Strava? You're not alone. Even military personnel enjoy tracking and sharing their runs....

Patch Madness: Vendor Bug Advisories Are Broken, So Broken

BLACK HAT USA – Las Vegas – Keeping up with security-vulnerability patching is challenging at best, but prioritizing which bugs to focus on has...

How to Clear Security Obstacles and Achieve Cloud Nirvana

Many security practitioners take their eye off cloud and software-as-a-service (SaaS) security based on the faulty assumption that the providers are inherently secure. While...

Microsoft: We Don't Want to Zero-Day Our Customers

BLACK HAT USA — Las Vegas — A top Microsoft security executive today defended the company's vulnerability disclosure policies as providing enough information for...

The Time Is Now for IoT Security Standards

The Internet of Things industry's lack of cybersecurity standards is nothing new. We’ve been at this for years. However, with the number of devices expected...

Multiple Vulnerabilities Discovered in Device42 Asset Management Appliance

A series of vulnerabilities on the popular asset management platform Device42 could be exploited to give attackers full root access to the system, according...

Deepfence ThreatMapper 1.4 Unveils Open Source Threat Graph to Visualize Cloud-Native Threat Landscape

SAN FRANCISCO---Deepfence, a pioneer in the emerging security observability and protection space, today announced the 1.4 release of its open source project ThreatMapper, a cutting-edge, cloud native...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?