darkreading
Azure Data Factory Bugs Expose Cloud Infrastructure
2 weeks 6 days ago
Three vulnerabilities in the service's Apache Airflow integration could have allowed attackers to take shadow administrative control over an enterprise cloud infrastructure, gain access to and exfiltrate data, and deploy malware.
Elizabeth Montalbano, Contributing Writer
CompTIA Xpert Series Expands With SecurityX Professional Certification
2 weeks 6 days ago
Program designed to validate and sharpen cybersecurity skills for working professionals.
To Defeat Cybercriminals, Understand How They Think
2 weeks 6 days ago
Getting inside the mind of a threat actor can help security pros understand how they operate and what they're looking for — in essence, what makes a soft target.
Ben Barrontine
BlackBerry to Sell Cylance to Arctic Wolf
3 weeks ago
Arctic Wolf plans to integrate Cylance's endpoint detection and response (EDR) technology into its extended detection and response (XDR) platform.
Fahmida Y. Rashid
Does Desktop AI Come With a Side of Risk?
3 weeks ago
Artificial intelligence capabilities are coming to a desktop near you — with Microsoft 365 Copilot, Google Gemini with Project Jarvis, and Apple Intelligence all arriving (or having arrived). But what are the risks?
Robert Lemos, Contributing Writer
Citizen Development Moves Too Fast for Its Own Good
3 weeks ago
While low-code/no-code tools can speed up application development, sometimes it's worth taking a slower approach for a safer product.
Michael Bargury
The Education Industry: Why Its Data Must Be Protected
3 weeks ago
The sector must prioritize comprehensive data protection strategies to safeguard PII in an aggressive threat environment.
Vichai Levy
Microsoft Teams Vishing Spreads DarkGate RAT
3 weeks ago
A thwarted attack demonstrates that threat actors using yet another delivery method for the malware, which already has been spread using phishing emails, malvertising, hijacking of instant messages, and SEO poisoning.
Elizabeth Montalbano, Contributing Writer
Zerto Introduces Cloud Vault Solution for Enhanced Cyber Resilience Through MSPs
3 weeks 3 days ago
Versa Introduces Integrated Endpoint Data Loss Prevention in SASE Solution
3 weeks 3 days ago
Cleo MFT Zero-Day Exploits Are About to Escalate, Analysts Warn
3 weeks 3 days ago
Defenders running the Cleo managed file transfer are urged to be on the lookout for the Cleopatra backdoor and other indicators of an ongoing ransomware campaign, as patching details remain foggy, and no CVE has been issued.
Becky Bracken, Senior Editor, Dark Reading
Generative AI Security Tools Go Open Source
3 weeks 3 days ago
Businesses deploying large language models and other GenAI systems have a growing collection of open source tools for testing AI security.
Robert Lemos, Contributing Writer
With 'TPUXtract,' Attackers Can Steal Orgs' AI Models
3 weeks 3 days ago
A new side-channel attack method is a computationally practical way to infer the structure of a convolutional neural network — meaning that cyberattackers or rival companies can plagiarize AI models and take their data for themselves.
Nate Nelson, Contributing Writer
Test Your Cyber Skills With the SANS Holiday Hack Challenge
3 weeks 3 days ago
Open to players of all skill levels, the "Snow-mageddon" cybersecurity competition takes place in the world of Santa, elves, and Christmas mayhem.
Jennifer Lawinski
OData Injection Risk in Low-Code/No-Code Environments
3 weeks 3 days ago
As the adoption of LCNC grows, so will the complexity of the threats organizations face.
Amichai Shulman
'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks
3 weeks 3 days ago
A sophisticated social engineering cybercrime campaign bent on financial gain was observed being run from Tencent servers in Singapore.
Tara Seals, Managing Editor, News, Dark Reading
Lloyd's of London Launches New Cyber Insurance Consortium
3 weeks 4 days ago
Under the program, HITRUST-certified organizations gain access to exclusive coverage and rates.
Jennifer Lawinski
336K Prometheus Instances Exposed to DoS, 'Repojacking'
3 weeks 4 days ago
Open source Prometheus servers and exporters are leaking plaintext passwords and tokens, along with API addresses of internal locations.
Nate Nelson, Contributing Writer
Chinese Cops Caught Using Android Spyware to Track Mobile Devices
3 weeks 4 days ago
Law enforcement across mainland China have been using EagleMsgSpy surveillance tool to collect mobile device data since at least 2017, new research shows.
Becky Bracken, Senior Editor, Dark Reading
Checked
9 hours 57 minutes ago
Public RSS feed
darkreading feed