3 Ways ChatGPT Will Change Infosec in 2023OpenAI's chatbot has the promise to revolutionize how security practitioners work.Read MoreDark ReadingOpenAI's chatbot has the promise to revolutionize...
Author:
How Noob Website Hackers Can Become Persistent Threats
How Noob Website Hackers Can Become Persistent ThreatsAn academic analysis of website defacement behavior by 241 new hackers shows there are four clear trajectories they can...
Google: Influence Operator Dragonbridge Floods Social Media in Sprawling Cyber Campaign
Google: Influence Operator Dragonbridge Floods Social Media in Sprawling Cyber CampaignGoogle has mounted a massive takedown, but Dragonbridge's extensive capabilities for generating and distributing vast amounts...
Critical RCE Lexmark Printer Bug Has Public Exploit
Critical RCE Lexmark Printer Bug Has Public ExploitA nasty SSRF bug in Web Services plagues a laundry list of enterprise printers.Read MoreDark ReadingA nasty SSRF bug...
On Data Privacy Day, Organizations Fail Data Privacy Expectations
On Data Privacy Day, Organizations Fail Data Privacy ExpectationsData Privacy Day rolls around year after year, and data privacy breaches likewise. Two-thirds of data breaches result...
Why Most Companies Still Don’t Know What’s on Their Network
Why Most Companies Still Don’t Know What’s on Their NetworkChris Kirsch, CEO of runZero, sits down with Dark Reading’sTerry Sweeney for a Fast Chat on the...
Enterprises Need to Do More to Assure Consumers About Privacy
Enterprises Need to Do More to Assure Consumers About PrivacyOrganizations care about data privacy, but their priorities appear to be different from what their customers think...
Enterprises Don’t Know What to Buy for Responsible AI
Enterprises Don't Know What to Buy for Responsible AIOrganizations are struggling to procure appropriate technical tools to address responsible AI, such as consistent bias detection in...
The Journal, Artificial Intelligence in the Life Sciences, Highlights the Contributions of Women in Artificial Intelligence in the Life Sciences
The Journal, Artificial Intelligence in the Life Sciences, Highlights the Contributions of Women in Artificial Intelligence in the Life SciencesThe launch of a new article collection...
Long Con Impersonates Financial Advisers to Target Victims
Long Con Impersonates Financial Advisers to Target VictimsCybercriminals are co-opting the identities of legitimate US financial advisers to use them as fodder for relationship scams (aka...
Convincing, Malicious Google Ads Look to Lift Password Manager Logins
Convincing, Malicious Google Ads Look to Lift Password Manager LoginsUsers searching for Bitwarden and 1Password's Web vaults on Google have recently reported seeing paid ads with...
Fake Texts From the Boss, Bogus Job Postings and Frankenstein Shoppers — Oh My!
Fake Texts From the Boss, Bogus Job Postings and Frankenstein Shoppers — Oh My!Experian’s annual Future of Fraud Forecast highlights five fraud threats facing businesses and...
JD Sports Details Data Breach Affecting 10 Million Customers
JD Sports Details Data Breach Affecting 10 Million CustomersExposed: Online Customer Details, But Not Complete Payment Card DataJD Sports, a sports fashion retailer with global operations,...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Ukraine Links Media Center Attack to Russian Intelligence
Ukraine Links Media Center Attack to Russian IntelligenceSandworm Group Hackers Used Malware Wipers to Disrupt Cybersecurity Press BriefingUkraine traced a cyberattack that delayed a press briefing...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Ransomware Profits Dip as Fewer Victims Pay Extortion
Ransomware Profits Dip as Fewer Victims Pay ExtortionAs Funding From Ransoms Goes Down, Gangs Embrace Re-Extortion, Researchers WarnBad news for ransomware groups: Experts find it's getting...
What Makes Sumo Logic an Appealing Target for Private Equity
What Makes Sumo Logic an Appealing Target for Private EquitySumo Logic Is a Well-Regarded SIEM Provider, But Profitability Remains ElusiveThoma Bravo, Vista Equity Partners and rival...
Why Healthcare Orgs Must Prioritize 3rd-Party Risk Management
Why Healthcare Orgs Must Prioritize 3rd-Party Risk ManagementVenminder CEO James Hyde on Reducing Risk Exposure From Vendor RelationshipsWith breaches on the rise and the average cost...
Targets of Opportunity: How Ransomware Groups Find Victims
Targets of Opportunity: How Ransomware Groups Find VictimsWhile Some Sectors Are More Prized Than Others, Profits Trump All ConsiderationsAs ransomware continues to pummel numerous sectors, and...
Securing the SaaS Layer
Securing the SaaS LayerIn this episode of "Cybersecurity Unplugged," Galit Lubetzky Sharon, CTO of Wing Security, discusses the challenge of securing SaaS applications, which are decentralized...
David Derigiotis on the Complex World of Cyber Insurance
David Derigiotis on the Complex World of Cyber InsuranceIn this episode of "Cybersecurity Unplugged," David Derigiotis of insurtech Embroker discusses the complex world of cyber liability...
Protecting the Hidden Layer in Neural Networks
Protecting the Hidden Layer in Neural NetworksIn this episode of "Cybersecurity Unplugged," Chris "Tito" Sestito discusses technology to protect neural networks and artificial intelligence and machine-learning...
The Persisting Risks Posed by Legacy Medical Devices
The Persisting Risks Posed by Legacy Medical DevicesLegislation requiring vendors to design cybersecurity into their medical devices is a great first step to help healthcare entities,...
Live Webinar | You Don’t Know Your Environment – and IT Doesn’t Either
Live Webinar | You Don't Know Your Environment - and IT Doesn't EitherPost ContentRead MoreDataBreachToday.com RSS Syndication
LIVE Webinar | Where Did the Hackers Go? They Ran(somware): Insights into Ransomware Recovery
LIVE Webinar | Where Did the Hackers Go? They Ran(somware): Insights into Ransomware RecoveryPost ContentRead MoreDataBreachToday.com RSS Syndication
Live Webinar | Mastering Vendor Risk Management: Key Insights For Building a Scalable Program
Live Webinar | Mastering Vendor Risk Management: Key Insights For Building a Scalable ProgramPost ContentRead MoreDataBreachToday.com RSS Syndication
























