CompTIA Supports Department of Defense Efforts to Strengthen Cyber Knowledge and Skills
Dark Reading
by
7h ago
..read more
Visit website
5 Hard Truths About the State of Cloud Security 2024
Dark Reading
by Ericka Chickowski, Contributing Writer
7h ago
Dark Reading talks cloud security with John Kindervag, the godfather of zero trust ..read more
Visit website
Hackers Create Legit Phishing Links With Ghost GitHub, GitLab Comments
Dark Reading
by Nate Nelson, Contributing Writer
7h ago
An utterly innocuous feature in popular Git CDNs allows anyone to conceal malware behind brand names, without those brands being any the wiser ..read more
Visit website
Back from the Brink: UnitedHealth Offers Sobering Post-Attack Update
Dark Reading
by Dark Reading Staff
8h ago
The company reports most systems are functioning again but that analysis of the data affected will take months to complete ..read more
Visit website
Lessons for CISOs From OWASP's LLM Top 10
Dark Reading
by Kevin Bocek
13h ago
It's time to start regulating LLMs to ensure they're accurately trained and ready to handle business deals that could affect the bottom line ..read more
Visit website
US Gov Slaps Visa Restrictions on Spyware Honchos
Dark Reading
by Dark Reading Staff
13h ago
The State Department can now deny entrance to the US for individuals accused of profiting from spyware-related human rights abuses, and their immediate family members ..read more
Visit website
Russia's Fancy Bear Pummels Windows Print Spooler Bug
Dark Reading
by Elizabeth Montalbano, Contributing Writer
13h ago
The infamous Russian threat actor has created a custom tool called GooseEgg to exploit CVE-2022-38028 in cyber-espionage attacks against targets in Ukraine, Western Europe, and North America ..read more
Visit website
Teetering on the Edge: VPNs, Firewalls' Nonexistent Telemetry Lures APTs
Dark Reading
by Robert Lemos, Contributing Writer
15h ago
State-sponsored groups are targeting critical vulnerabilities in virtual private network (VPN) gateways, firewall appliances, and other edge devices to make life difficult for incident responders, who rarely have visibility into the devices ..read more
Visit website
ToddyCat APT Is Stealing Data on 'Industrial Scale'
Dark Reading
by Jai Vijayan, Contributing Writer
1d ago
The threat actor is deploying multiple connections into victim environments to maintain persistence and steal data ..read more
Visit website
MITRE ATT&CKED: InfoSec's Most Trusted Name Falls to Ivanti Bugs
Dark Reading
by Nate Nelson, Contributing Writer
1d ago
The irony is lost on few, as a Chinese threat actor used eight MITRE techniques to breach MITRE itself — including exploiting the Ivanti bugs that attackers have been swarming on for months ..read more
Visit website

Follow Dark Reading on FeedSpot

Continue with Google
Continue with Apple
OR