Making the option available only to paid subscribers — while also claiming SMS authentication is broken — doesn't make sense, some say. Is it a cash grab?
Follow Dark Reading:
 February 22, 2023
LATEST SECURITY NEWS & COMMENTARY
Analysts Slam Twitter's Decision to Disable SMS-Based 2FA
Making the option available only to paid subscribers — while also claiming SMS authentication is broken — doesn't make sense, some say. Is it a cash grab?
Coinbase Crypto Exchange Ensnared in 'Oktapus'-Related Smishing Attack
Some employees' personal data was leaked, but the company responded swiftly to a socially engineered incident that gained access to legitimate employee login credentials.
Israel's Top Tech University Targeted by DarkBit Ransomware
An Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send a political message — and maybe something more.
Cyberthreats, Regulations Mount for Financial Industry
Nation-state adversaries, new reporting regulations, and a fast-paced threat landscape mean that financial services and technology firms need to bolster their security posture.
Insider Threats Don't Mean Insiders Are Threatening
By implementing tools that enable internal users to do their jobs efficiently and securely, companies reduce insider threat risk by building insider trust.
Name That Toon: Join the Club
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Google Translate Helps BEC Groups Scam Companies in Any Language
BEC gangs Midnight Hedgehog and Mandarin Capybara show how online marketing and translation tools are making it easy for these threat groups to scale internationally.

Modern Software: What's Really Inside?
Open source has changed the software game from build or buy to assemble with care.

Massive GoAnywhere RCE Exploit: Everything You Need to Know
Weeks after an exploit was first announced in a popular cloud-based file transfer service, could some organizations still be vulnerable? The answer is yes.

MORE
EDITORS' CHOICE
Majority of Ransomware Attacks Last Year Exploited Old Bugs
New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access to data theft.
LATEST FROM THE EDGE

Third-Party Providers Create Identity and Access Control Challenges for Fintech Apps
Fintech has drastically shifted the financial services industry toward digital technologies and, in so doing, has introduced a variety of new risks.
LATEST FROM DR TECHNOLOGY

How to Stop Attackers That Target Healthcare Imaging Data
Attribute-based encryption could help keep sensitive metadata off of the Dark Web.
WEBINARS
  • How Firewalls Fit With Modern Enterprise Security

    With all the focus on the newest security technologies, it is easy to forget that the firewall is still an important part of the enterprise security strategy. In this webinar, experts offer a look at some of the most common ...

  • The Importance of Bespoke Security

    In this webinar, you will hear from our subject matter experts, Hanah Darley, Head of Threat Research and Toby Lewis, Global Head of Threat Analysis. The discussion will cover the difference between media coverage of cyber threats compared with the ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.