darkreading
The Importance of Empowering CFOs Against Cyber Threats
1 year 3 months ago
Working closely with CISOs, chief financial officers can become key players in protecting their organizations' critical assets and ensuring long-term financial stability.
Shai Gabay
Midnight Blizzard Taps Phishing Emails, Rogue RDP Nets
1 year 3 months ago
The Russian-based attack group uses legitimate red-team tools, 200 domain names, and 34 back-end RDP servers, making it harder to identify and block malicious activity.
Jai Vijayan, Contributing Writer
Wald.ai Launches Data Loss Protection for AI Platforms
1 year 3 months ago
The cybersecurity startup's data loss protection platform uses contextual redaction to help organizations safely use private business information across AI platforms.
Fahmida Y. Rashid
Thai Police Systems Under Fire From 'Yokai' Backdoor
1 year 3 months ago
Hackers are abusing legitimate Windows utilities to target Thai law enforcement with a novel malware that is a mix of sophistication and amateurishness.
Nate Nelson, Contributing Writer
Texas Tech Fumbles Medical Data in Massive Breach
1 year 3 months ago
The cyberattack impacts at least 1.4 million patients, as tranches of highly sensitive personal, medical, and financial data fall into the hands of cyber crooks who have everything they need to carry out convincing social engineering and fraud attacks.
Tara Seals, Managing Editor, News, Dark Reading
CISA Directs Federal Agencies to Secure Cloud Environments
1 year 3 months ago
Actions direct agencies to deploy specific security configurations to reduce cyber-risk.
Delinea Joins CVE Numbering Authority Program
1 year 3 months ago
Azure Data Factory Bugs Expose Cloud Infrastructure
1 year 3 months ago
Three vulnerabilities in the service's Apache Airflow integration could have allowed attackers to take shadow administrative control over an enterprise cloud infrastructure, gain access to and exfiltrate data, and deploy malware.
Elizabeth Montalbano, Contributing Writer
CompTIA Xpert Series Expands With SecurityX Professional Certification
1 year 3 months ago
Program designed to validate and sharpen cybersecurity skills for working professionals.
To Defeat Cybercriminals, Understand How They Think
1 year 3 months ago
Getting inside the mind of a threat actor can help security pros understand how they operate and what they're looking for — in essence, what makes a soft target.
Ben Barrontine
BlackBerry to Sell Cylance to Arctic Wolf
1 year 3 months ago
Arctic Wolf plans to integrate Cylance's endpoint detection and response (EDR) technology into its extended detection and response (XDR) platform.
Fahmida Y. Rashid
Does Desktop AI Come With a Side of Risk?
1 year 3 months ago
Artificial intelligence capabilities are coming to a desktop near you — with Microsoft 365 Copilot, Google Gemini with Project Jarvis, and Apple Intelligence all arriving (or having arrived). But what are the risks?
Robert Lemos, Contributing Writer
Citizen Development Moves Too Fast for Its Own Good
1 year 3 months ago
While low-code/no-code tools can speed up application development, sometimes it's worth taking a slower approach for a safer product.
Michael Bargury
The Education Industry: Why Its Data Must Be Protected
1 year 3 months ago
The sector must prioritize comprehensive data protection strategies to safeguard PII in an aggressive threat environment.
Vichai Levy
Microsoft Teams Vishing Spreads DarkGate RAT
1 year 3 months ago
A thwarted attack demonstrates that threat actors using yet another delivery method for the malware, which already has been spread using phishing emails, malvertising, hijacking of instant messages, and SEO poisoning.
Elizabeth Montalbano, Contributing Writer
Zerto Introduces Cloud Vault Solution for Enhanced Cyber Resilience Through MSPs
1 year 3 months ago
Versa Introduces Integrated Endpoint Data Loss Prevention in SASE Solution
1 year 3 months ago
Cleo MFT Zero-Day Exploits Are About to Escalate, Analysts Warn
1 year 3 months ago
Defenders running the Cleo managed file transfer are urged to be on the lookout for the Cleopatra backdoor and other indicators of an ongoing ransomware campaign, as patching details remain foggy, and no CVE has been issued.
Becky Bracken, Senior Editor, Dark Reading
Generative AI Security Tools Go Open Source
1 year 3 months ago
Businesses deploying large language models and other GenAI systems have a growing collection of open source tools for testing AI security.
Robert Lemos, Contributing Writer
Checked
11 hours 40 minutes ago
Public RSS feed
darkreading feed