Source: www.darkreading.com – Author: Brigid O Gorman, Senior Intelligence Analyst, Symantec Threat Hunter Team, Broadcom When discussing ransomware groups, too often the focus is on their...
Author: admin
Meta Expunges Multiple APT, Cybercrime Groups From Facebook, Instagram – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributor, Dark Reading Facebook parent Meta said it thwarted the activity of three advanced persistent threat groups (APTs) in South...
APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading After months of inactivity, Earth Longzhi — a suspected subgroup of the notorious APT41 — is...
PrivateGPT Tackles Sensitive Info in ChatGPT Prompts – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading Amidst concerns that employees could be entering sensitive information into the ChatGPT artificial intelligence model,...
Apple Debuts Its Rapid Response Security Update Approach – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Apple rolled out the first of its kind Rapid Security Response update — quick fixes automatically installed...
T-Mobile Experiences Yet Another Data Breach – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading After an incident that affected 836 customers, T-Mobile disclosed its second breach of 2023. The attack began on...
AppSec Making Progress or Spinning Its Wheels? – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer, Dark Reading A variety of cultural factors continue to get in the way of producing secure code, including...
North Korean APT Gets Around Macro-Blocking With LNK Switch-Up – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer, Dark Reading North Korea’s APT37 threat group is providing fresh evidence of how adversaries have pivoted to using...
Google Ads Abused to Lure Corporate Workers to LOBSHOT Backdoor – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributor, Dark Reading A newly discovered backdoor and credential-stealer is posing as a legitimate software download as part of an...
China ‘Innovated’ Its Cyberattack Tradecraft, Mandia Says – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading When more than a dozen Fortinet FortiGate firewalls mysteriously crashed and failed to properly reboot last...
FBI Focuses on Cybersecurity With $90M Budget Request – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading The FBI is requesting more than $63 million in new funding to fight cyber threats in...
APT28 Employs Windows Update Lures to Trick Ukrainian Targets – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading The Russia-linked APT28 hacking group targeted Ukrainian government bodies in a spear-phishing campaign that uses phony “Windows...
BlackCat Trolls Western Digital With Leaked Response Meeting Image – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading The ransomware actor–threat hunter relationship just got extremely personal. The BlackCat gang decided to add the professional...
Name That Edge Toon: Fare Thee Well – Source: www.darkreading.com
Source: www.darkreading.com – Author: John Klossner, Cartoonist You never know what you’ll come across in your travels. Your mission: Write a witty cybersecurity-related caption to explain...
Invicti Zooms In On Vulnerabilities That Plague Developers, Security Pros – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Invicti’s Patrick Vandenberg reveals findings from the company’s latest AppSec report, looking at trends Invicti has recently...
JupiterOne Weighs In On the Need For Unified Cyber Insights – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading JupiterOne founder Erkang Zheng talks about how today’s companies can get a better grip on what they...
SlashNext: How Generative AI is Changing the Threat Landscape – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Patrick Harr of SlashNext takes on that form of artificial intelligence known as generative AI, which has...
How Better Integration of Systems, Apps Bolsters Enterprise Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading As the threat landscape morphs and presents new hazards, so has the pressure for tighter integration among...
Darktrace Takes A Closer Look At the Shifting Email Security Conversation – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Email is still by far the most common entry-point for a cyber-criminal, according to Dan Fein of...
Google Bans Thousands of Play Store Developer Accounts to Block Malware – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nathan Eddy, Contributing Writer, Dark Reading Google had a busy 2022 keeping its Play application marketplace free from cybercriminals, reporting on Thursday...
Firmware Looms as the Next Frontier for Cybersecurity – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading Last December, researchers discovered a series of five vulnerabilities affecting servers run by more than a...
Cyber Certainty: Investing in Resilience During a Post-Correction Market – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alberto Yépez, Co-Founder and Managing Director, Forgepoint Capital Since my first role at Apple in the 1980s, I have seen the cybersecurity...
Sumo Logic Ponders Why We Aren’t There Yet With Security Automation – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Dave Frampton of Sumo Logic Security describes the challenges organizations face with security management, and where automation...
Beyond Identity: What Is Zero-Trust Authentication and Why Does It Matter? – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Patrick McBride takes on the multitude of challenges and shortcomings with most existing authentication technologies, as well...
Mandiant Report: Dwell Time Decreases While Ransomware, Extortion Flourish – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Mandiant’s Charles Charmakal digs into the findings from the company’s latest annual M-Trends report, noting that average...
TXOne: Industrial Security Is Evolving to Keep the Operation Running – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Terence Liu and Jeff DePasse of TXOne Networks talk about the heightened profile of critical infrastructure in...
VMware Offers Up New Ground Truth For Improved Cloud Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Rick McElroy of VMware talks about the ongoing threat — and danger — posed by lateral movement...
ZeroTier: What Leaders Need To Know About Modern Virtual Networking – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading ZeroTier’s Marc Patterson talks about the emerging security solution known as virtual networking, not to be confused...
Sophos Reveals New Insights for Protecting Against Active Adversaries – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading John Shier of Sophos takes a deeper cut at the company’s new active adversary reports and describes...
OpenText: Integrating Processes — and Strategy — Is Still the Best Defense – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading OpenText’s Geoff Bibby shares the latest findings from the company’s cybersecurity global threat report, and discusses the...





























