The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.
...moreTotal Articles Found: 17
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2019-06-13 14:30:00
Popularity: 279
Author: Joseph R. Salazar Technical Marketing Engineer
The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.
...morePublished: 2019-06-12 18:30:00
Popularity: 132
Author: Kelly Sheridan Staff Editor, Dark Reading
The endpoint security firm raised $612 million ahead of today's public debut.
...morePublished: 2019-06-05 16:15:00
Popularity: 279
Author: Dark Reading Staff
The National Security Agency joins Microsoft in urging Windows admins to patch wormable bug CVE-2019-0708.
...morePublished: 2019-06-04 18:00:00
Popularity: 207
Author: Daniel P. Kent Director, Public Sector Engineering & CTO, Cisco Systems
Commercial companies should explore how FedRAMP can help mitigate risk as they move to the cloud.
...morePublished: 2019-05-30 22:00:00
Popularity: 211
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
A old vulnerability in Alpine Linux containers has spread and propagated to as much as 20% of the containers on the Docker Store.
...morePublished: 2019-05-29 21:00:00
Popularity: 287
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
Under very specific conditions, code running in a Docker container could access files anywhere on a server, according to a new CVE.
...morePublished: 2019-05-23 23:45:00
Popularity: 147
Author: Robert Lemos Contributing Writer
The exploits for local privilege escalation vulnerabilities in Windows could be integrated into malware before Microsoft gets a chance to fix the issues.
...morePublished: 2019-05-22 13:00:00
Popularity: 37
Author: Black Hat Staff
Plus, hear from key figures about the history and the enduring influence of The Cult of the Dead Cow this August in Las Vegas.
...morePublished: 2019-05-14 21:44:00
Popularity: 184
Author: Robert Lemos Contributing Writer
A single flaw allowed attackers - thought to be linked to a government - to target human rights workers and install surveillance software by sending a phone request. The victims did not even have to answer.
...morePublished: 2019-05-13 22:20:00
Popularity: 201
Author: Jai Vijayan Contributing Writer
ScarCruft has evolved into a skilled and resourceful threat group, new research shows.
...morePublished: 2019-05-07 19:15:00
Popularity: 481
Author: Robert Lemos Contributing Writer
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.
...morePublished: 2019-04-25 18:30:00
Popularity: 205
Author: Marc Laliberte Senior Security Analyst, WatchGuard Technologies
For 74 minutes, traffic destined for Google and Cloudflare services was routed through Russia and into the largest system of censorship in the world, China's Great Firewall.
...morePublished: 2019-04-22 22:00:00
Popularity: 170
Author: Jai Vijayan Freelance writer
Motive remains unclear though financial theft appears to be one possibility, Check Point Research says.
...morePublished: 2019-04-19 16:00:00
Popularity: 73
Author: Dark Reading Staff
For the last month, an unknown individual or group has been sharing data and hacking tools belonging to Iranian hacker group APT34.
...morePublished: 2019-03-13 19:00:00
Popularity: 67
Author: Dark Reading Staff
Incident leaves GPS units showing a location in England and a date 17 years in the future.
...morePublished: 2019-03-05 23:40:00
Popularity: 120
Author: Jai Vijayan Freelance writer
Published: 2019-03-06 13:00:00
Popularity: 5
Author: Dark Reading Staff
WhiteHat Security will continue to operate as an independent subsidiary of NTT Security following the deal.
...more