Cyber Security Dark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson Dec 10, 2021 darkreading.com The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and…
Cyber Security Dark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson Dec 10, 2021 darkreading.com The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and…
Technology Minecraft rushes out patch for critical Log4j vulnerability Dec 10, 2021 bleepingcomputer.com Swedish video game developer Mojang Studios has released an emergency Minecraft security update to address a critical bug in the…
Technology New ‘Karakurt’ hacking group focuses on data theft and extortion Dec 10, 2021 bleepingcomputer.com A sophisticated cybercrime group known as 'Karakurt' who has been quietly working from the shadows has had its tactics and…
Technology New ‘Karakurt’ hacking group focuses on data theft and extortion Dec 10, 2021 bleepingcomputer.com A sophisticated cybercrime group known as 'Karakurt' who has been quietly working from the shadows has had its tactics and…
Technology Data breach impacts 80,000 South Australian govt employees Dec 10, 2021 bleepingcomputer.com The South Australian government has admitted that the personal details of tens of thousands of its employees were compromised following…
Technology New zero-day exploit for Log4j Java library is an enterprise nightmare Dec 10, 2021 bleepingcomputer.com Proof-of-concept exploits for a critical zero-day vulnerability in the ubiquitous Apache Log4j Java-based logging library are currently being shared online, exposing…
Cyber Security One-Third of Phishing Pages Active Less Than a Day Dec 9, 2021 darkreading.com Security experts say the first hours in a phishing page's life are the most dangerous for users.
Cyber Security Claroty Raises $400M More, Acquires Healthcare IoT Security Firm Medigate Dec 8, 2021 darkreading.com Industrial control systems security firm reaches $635M in funding with this Series E round.
Cyber Security How Do I Empower a Remote Workforce Without Compromising Security? Dec 8, 2021 darkreading.com To transition to a zero-trust architecture, focus on doing the things that offer the most value.
Dark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson
The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and…
Dark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson
The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and…
Minecraft rushes out patch for critical Log4j vulnerability
Swedish video game developer Mojang Studios has released an emergency Minecraft security update to address a critical bug in the…
New ‘Karakurt’ hacking group focuses on data theft and extortion
A sophisticated cybercrime group known as 'Karakurt' who has been quietly working from the shadows has had its tactics and…
New ‘Karakurt’ hacking group focuses on data theft and extortion
A sophisticated cybercrime group known as 'Karakurt' who has been quietly working from the shadows has had its tactics and…
Data breach impacts 80,000 South Australian govt employees
The South Australian government has admitted that the personal details of tens of thousands of its employees were compromised following…
New zero-day exploit for Log4j Java library is an enterprise nightmare
Proof-of-concept exploits for a critical zero-day vulnerability in the ubiquitous Apache Log4j Java-based logging library are currently being shared online, exposing…
One-Third of Phishing Pages Active Less Than a Day
Security experts say the first hours in a phishing page's life are the most dangerous for users.
Claroty Raises $400M More, Acquires Healthcare IoT Security Firm Medigate
Industrial control systems security firm reaches $635M in funding with this Series E round.
How Do I Empower a Remote Workforce Without Compromising Security?
To transition to a zero-trust architecture, focus on doing the things that offer the most value.