Dark Reading

Dark Reading: Connecting the Information and Security Community
  1. At Black Hat, analysts from MITRE and Splunk will detail how organizations of many different sizes are leveraging ATT&CK's common language.
  2. Researchers discover a third-party algorithm in multiple high-profile Bluetooth devices exposes users to third-party tracking and data access.
  3. Organizations with systems exploitable via the RDP flaw pose an increasing risk to themselves and other organizations, BitSight says.
  4. The last-June breach exposed data including names, phone numbers, and account numbers.
  5. New research on password management tools identifies the relative strengths and weaknesses of 12 competing offerings.
  6. Compliance, accidental exposure of credentials, and data control are also primary concerns for senior IT and security managers.
  7. For too long, we've focused almost exclusively on keeping out the bad guys rather than what to do when they get in (and they will).
  8. Brush up on new DDOS defense tricks, 5G network vulnerabilities, and applications of military strategy to cybersecurity.
  9. Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.
  10. More than 5,100 vulnerable devices containing multiple terabytes of data are open to exploitation, researchers found.

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form