An ongoing, highly sophisticated phishing campaign may have led some LastPass users to give up their all-important master passwords to hackers.Password managers store all...
Attacks against the Domain Name System (DNS) are numerous and varied, so organizations have to rely on layers of protective measures, such as traffic...
The Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive in response on April 11 to Midnight Blizzard, aka Cozy Bear, a Russian...
Authentication protocols serve as the backbone of online security, enabling users to confirm their identities securely and access protected information and services. They define...
Of the hundreds of documented MITRE ATT&CK techniques, two dominate the field: command and scripting interpreters (T1059) and phishing (T1566).In a report published on...
Of the hundreds of documented MITRE ATT&CK techniques, two dominate the field: command and scripting interpreters (T1059) and phishing (T1566).In a report published on...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...
Attackers are targeting Apple iPhone users with a rash of MFA bombing attacks that use a relentless series of legitimate password-reset notification alerts in...
Strata Identity has announced a Microsoft Identity Cookbook that aims to help enterprises securely move authentication from on-premises Microsoft Active Directory to the cloud-based...
COMMENTARYIn recent decades, the nature of warfare between nations has evolved substantially with the integration of offensive cyber tactics. In late 2023, Israel's cyber-defense...
COMMENTARYIn recent decades, the nature of warfare between nations has evolved substantially with the integration of offensive cyber tactics. In late 2023, Israel's cyber-defense...