Dark Reading: Connecting the Information and Security Community
NIST may be on the brink of revealing which post-quantum computing encryption algorithms it is endorsing, solidifying commercial developments like QuProtect.
7h
An analysis from Google TAG shows that Android zero-day exploits were packaged and sold for state-backed surveillance.
10h
The PyPI "pymafka" package is the latest example of growing attacker interest in abusing widely used open source software repositories.
11h
Analysts have seen a massive spike in malicious activity by the XorDdos trojan in the last six months, against Linux cloud and IoT infrastructures .
13h
A culture of trust, combined with tools designed around employee experience, can work in tandem to help organizations become more resilient and secure.
14h
Next I.T. is the sixth and largest acquisition to date for Valeo Networks.
17h
IronKey Vault Privacy 80 External SSD safeguards against brute-force attacks and BadUSB with digitally-signed firmware.
17h
What subsequent protections do you have in place when your first line of defense goes down?
18h
In a new phishing tactic, faux chatbots establish a conversation with victims to guide them to malicious links, researchers say.
3d
Organizations that deploy updates only after a vulnerability is disclosed apply far fewer updates and do so at a lower cost than those that stay up to date on all of their software, university researchers say.
3d
Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.
Get Inoreader