darkreading
Canada Closes TikTok Offices, Citing National Security
2 months ago
Questions remain over what a corporate ban will achieve, since Canadians will still be able to use the app.
Nate Nelson, Contributing Writer
Max-Critical Cisco Bug Enables Command-Injection Attacks
2 months ago
Though Cisco reports of no known malicious exploitation attempts, but thanks to a CVSS 10 out of 10 security vulnerability (CVE-2024-20418) three of its wireless access points are vulnerable to remote, unauthenticated cyberattacks.
Dark Reading Staff
'SteelFox' Malware Blitz Infects 11K Victims With Bundle of Pain
2 months ago
The malware combines a miner and data stealer, and it packs functions that make detection and mitigation a challenge.
Jai Vijayan, Contributing Writer
Has the Cybersecurity Workforce Peaked?
2 months ago
While training and credentialing organizations continue to talk about a "gap" in skilled cybersecurity workers, demand — especially for entry-level workers — has plateaued, spurring criticism of the latest rosy stats that seem to support a hot market for qualified cyber pros.
Robert Lemos, Contributing Writer
Gootloader Cyberattackers Target Bengal-Cat Aficionados in Oz
2 months ago
It's unclear what the threat actors have against this particular breed of cat, but it's taking down the kitty's enthusiasts with SEO-poisoned links and malware payloads.
Dark Reading Staff
The Power of Process in Creating a Successful Security Posture
2 months ago
Establishing realistic, practitioner-driven processes prevents employee burnout, standardizes experiences, and closes many of the gaps exposed by repeated one-offs.
Ian Campbell
Symbiotic Security Launches Scanning Tool to Help Fix Flaws in Code
2 months ago
The company comes out of stealth with a tool that integrates directly into the developer's IDE to find flaws, offer remediation advice, and training materials to write secure code.
Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
Fake Copyright Infringement Emails Spread Rhadamanthys
2 months ago
Attackers are triggering victims' deep-seated fear of getting in trouble in order to spread the sophisticated stealer across continents.
Nate Nelson, Contributing Writer
Chinese Gamers Targeted in Winos4.0 Framework Scam
2 months ago
Campaigns like Silver Fox and Void Arachne are deploying the framework, using social media and messaging platforms to lure in victims.
Dark Reading Staff
Google Cloud to Enforce MFA on Accounts in 2025
2 months ago
Google Cloud will take a phased approach to make multifactor authentication mandatory for all users.
Dark Reading Staff
German Law Could Protect Researchers Reporting Vulns
2 months ago
The draft amendment also includes prison time for those who access systems to maliciously spy or intercept data.
Dark Reading Staff
Attackers Breach IT-Based Networks Before Jumping to ICS/OT Systems
2 months ago
SANS's "2024 State of ICS.OT Cybersecurity report" highlights the most common types of attack vectors used against ICT/OT networks.
Jennifer Lawinski, Contributing Writer
International Police Effort Obliterates Cybercrime Network
2 months ago
Interpol disrupts 22,000 malicious IP addresses, 59 servers, 43 electronic devices, and arrests 41 suspected cybercriminals.
Dark Reading Staff
Despite Emerging Regulations, Mobile Device, IoT Security Requires More Industry Attention
2 months ago
Omdia Principal Analyst Hollie Hennessy says that until a promising new set of regulations around the world comes online, connected device security entails a shared responsibility among consumers, enterprises, and manufacturers.
Hollie Hennessy
Nokia: No Evidence So Far That Hackers Breached Company Data
2 months ago
The mobile device maker continues to investigate IntelBroker's claims of another high-profile data breach, with the cybercriminal group posting on BreachForums internal data allegedly stolen from Nokia through a third-party contractor.
Elizabeth Montalbano, Contributing Writer
How to Outsmart Stealthy E-Crime and Nation-State Threats
2 months ago
In a time of increasingly sophisticated cross-domain attacks, relying solely on automated solutions isn't enough.
Adam Meyers
How Playing Cyber Games Can Help You Get Hired
2 months ago
When it comes to landing a job in cybersecurity, what does it take to stand out from the pack? Try playing games.
Jennifer Lawinski, Contributing Writer
Canadian Authorities Arrest Attacker Who Stole Snowflake Data
2 months ago
The suspect, tracked as UNC5537, allegedly bragged about hacking several Snowflake victims on Telegram, drawing attention to himself.
Dark Reading Staff
Attacker Hides Malicious Activity in Emulated Linux Environment
2 months ago
The CRON#TRAP campaign involves a novel technique for executing malicious commands on a compromised system.
Jai Vijayan, Contributing Writer
Checked
1 hour 42 minutes ago
Public RSS feed
darkreading feed