How Geopolitical Tensions Are Shaping Cyber Warfare – Dark Reading
In today’s cyber battlefield, resilience starts with readiness, and the cost of falling short increases by the day. – Read More
In today’s cyber battlefield, resilience starts with readiness, and the cost of falling short increases by the day. – Read More
As the definition of machine identities broadens, AI agents working on behalf of the user and gaining access to various services blurs the lines of non-human identities even more. –…
Israel’s cyber pros are having to put theory into practice, as a notorious nation-state APT sponsored by Iran targets them with spear-phishing attacks. – Read More
Organizations are moving away from the public cloud and embracing a more hybrid approach due to big changes over the past five years. – Read More
Though rudimentary and largely non-functional, the wryly named “Skynet” binary could be a harbinger of things to come on the malware front. – Read More
A slew of vulnerabilities, including a critical CVSS 9.8 that enables an attacker to generate the default admin password, affect hundreds of printer, scanner, and label-maker models made by manufacturer…
Dark Reading Confidential Episode 7: Cyber experts Tom Parker and Jake Williams offer their views on the practical impact of cuts to the US Cybersecurity and Infrastructure Security Agency. –…
The emerging group has already gotten its teeth into 16 victims since May with its double extortion tactics, claiming victims in 11 countries, including the US, Thailand, and Taiwan. –…
The servers that connect AI with real-world data are occasionally wide-open channels for cyberattacks. – Read More
Malicious actors are exploiting AI-fabricated software components — presenting a major challenge for securing software supply chains. – Read More
The company has patched two vulnerabilities in its Graphical User Interface that would have allowed attackers to grab data from a user’s input history feature. – Read More
Cybercrime accounts for more than 30% of all reported crime in East Africa and West Africa, with online scams, ransomware, business email compromise, and digital sextortion taking off. – Read…
A threat actor hacked a version of SonicWall’s NetExtender SSL VPN application in an effort to trick users into installing a Trojanized version of the product. – Read More
The campaign infected devices in the US and Southeast Asia to build an operational relay box (ORB) network for use as an extensive cyber-espionage infrastructure. – Read More
America’s largest steel producer initially disclosed the breach in May and took potentially affected systems offline to investigation the intrusion and contain any malicious activity. – Read More