Editor's Pick

Introduction to MIPS Assembly

General Assembly Introduction What is Assembly? Assembly is a the second level of abstraction between hardware and software. Assembly conforms the operations of an instruction set architecture (ISA) of a given processor. For example: - x86 -...

Latest news

'There's No Ceiling': Ransomware's Alarming Growth Signals a New Era, Verizon DBIR Finds

Ransomware has become so efficient, and the underground economy so professional, that traditional monetization of stolen data may be on its way out.

Dark Reading | 5 hours ago
Microsoft Elevation-of-Privilege Vulnerabilities Spiked Again in 2021

But there was a substantial drop in the overall number of critical vulnerabilities that the company disclosed last year, new analysis shows.

Dark Reading | 6 hours ago
New Attack Shows Weaponized PDF Files Remain a Threat

Notable new infection chain uses PDF to embed malicious files, load remote exploits, shellcode encryption, and more, new research shows.

Dark Reading | 7 hours ago
DeFi Is Getting Pummeled by Cybercriminals

Decentralized finance lost $1.8 billion to cyberattacks last year — and 80% of those events were the result of vulnerable code, analysts say.

Dark Reading | 8 hours ago
New Connecticut Privacy Law Makes Path to Compliance More Complex

As states address privacy with ad-hoc laws, corporate compliance teams try to balance yet another set of similar but diverging requirements.

Dark Reading | 9 hours ago
XM Cyber Adds New Security Capability for Microsoft Active Directory

Company to debut its AD capabilities at the 2022 RSA Conference.

Dark Reading | 10 hours ago
Strong Password Policy Isn't Enough, Study Shows

New analysis reveals basic regulatory password requirements fall far short of providing protection from compromise.

Dark Reading | 11 hours ago
Netskope Expands Data Protection Capabilities to Endpoint Devices and Private Apps

New features include context-aware, zero-trust data protection on local peripherals and devices.

Dark Reading | 12 hours ago
Nisos Announces $15 Million in Series B Funding Round

New funding led by global cyber investor Paladin Capital Group, alongside existing investors Columbia Capital and Skylab Capital.

Dark Reading | 12 hours ago
Crypto Hacks Aren’t a Niche Concern; They Impact Wider Society

Million-dollar crypto heists are becoming more common as the currency starts to go mainstream; prevention and enforcement haven't kept pace.

Dark Reading | 14 hours ago
Fronton IOT Botnet Packs Disinformation Punch

Fronton botnet has far more ability than launching DDOS attack, can track social media trends and launch suitable propaganda.

Threatpost | 14 hours ago
Multiple Governments Buying Android Zero-Days for Spying: Google

An analysis from Google TAG shows that Android zero-day exploits were packaged and sold for state-backed surveillance.

Dark Reading | a day ago
QuSecure Carves Out Space in Quantum Cryptography With Its Vision of a Post-RSA World

NIST may be on the brink of revealing which post-quantum computing encryption algorithms it is endorsing, solidifying commercial developments like...

Dark Reading | a day ago
Malicious Python Repository Package Drops Cobalt Strike on Windows, macOS & Linux Systems

The PyPI "pymafka" package is the latest example of growing attacker interest in abusing widely used open source software repositories.

Dark Reading | a day ago
Linux Trojan XorDdos Attacks Surge, Targeting Cloud, IoT

Analysts have seen a massive spike in malicious activity by the XorDdos Trojan in the last six months, against Linux cloud and IoT infrastructures .

Dark Reading | a day ago
Why the Employee Experience Is Cyber Resilience

A culture of trust, combined with tools designed around employee experience, can work in tandem to help organizations become more resilient and...

Dark Reading | a day ago
Valeo Networks Acquires Next I.T.

Next I.T. is the sixth and largest acquisition to date for Valeo Networks.

Dark Reading | a day ago
Kingston Digital Releases Touch-Screen Hardware-Encrypted External SSD for Data Protection

IronKey Vault Privacy 80 External SSD safeguards against brute-force attacks and BadUSB with digitally-signed firmware.

Dark Reading | a day ago
After the Okta Breach, Diversify Your Sources of Truth

What subsequent protections do you have in place when your first line of defense goes down?

Dark Reading | a day ago
Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

Mohit Tiwari, CEO of Symmetry Systems, explores Zero Trust, data objects and the NIST framework for cloud and on-prem environments.

Threatpost | a day ago
Snake Keylogger Spreads Through Malicious PDFs

Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug.

Threatpost | a day ago
Chatbot Army Deployed in Latest DHL Shipping Phish

In a new phishing tactic, faux chatbots establish a conversation with victims to guide them to malicious links, researchers say.

Dark Reading | 4 days ago
Partial Patching Still Provides Strong Protection Against APTs

Organizations that deploy updates only after a vulnerability is disclosed apply far fewer updates and do so at a lower cost than those that stay...

Dark Reading | 4 days ago
Quantum Key Distribution for a Post-Quantum World

New versions of QKD use separate wavelengths on the same fiber, improving cost and efficiency, but distance is still a challenge.

Dark Reading | 4 days ago

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.