Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer, Dark Reading Open source repositories — such as Python’s PyPI, the Maven Java repository, and the Node Package...
Category: DARKReading
130K+ Patients’ Social Security Numbers Leaked in UHS of Delaware Data Breach – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 MARLTON, N.J., May 25, 2023 /PRNewswire/ — Approximately 130,000 patients in Texas — and an untold number of others nationwide — are being notified...
Tesla Whistleblower Leaks 100GB of Data, Revealing Safety Complaints – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading German newspaper Handelsbatt reported today that it received 100GB of data from informants at Tesla, containing information...
Travel-Themed Phishing, BEC Campaigns Get Smarter as Summer Season Arrives – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nathan Eddy, Contributing Writer, Dark Reading As the summer holiday season draws near, phishing scams with travel-themed lures have been gaining momentum,...
How Safe Is Your Wearable Device? – Source: www.darkreading.com
Source: www.darkreading.com – Author: Ján Lunter, CEO & CTO, Innovatrics In 2018, 34-year-old Bobbi Leverette was lying in bed beside her newborn baby when her heart...
Russia’s War in Ukraine Shows Cyberattacks Can Be War Crimes – Source: www.darkreading.com
Source: www.darkreading.com – Author: Andrada Fiscutean, Contributing Writer, Dark Reading Russia’s cyberattacks against Ukrainian civilian and critical infrastructure has shown what it looks like when cyberattacks...
‘Volt Typhoon’ Breaks Fresh Ground for China-Backed Cyber Campaigns – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer, Dark Reading News this week that a likely China-backed threat actor is targeting critical infrastructure organizations in Guam...
Red Hat Tackles Software Supply Chain Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jeffrey Schwartz, Contributing Writer, Dark Reading In a bid to help developers securely build and deploy applications that rely on open source...
CosmicEnergy Malware Emerges, Capable of Electric Grid Shutdown – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading A Russian software capable of shutting off (or on) industrial machinery, with parallels to some of...
How AI Can Help Organizations Adapt and Recover From Cyberattacks – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 The number of successful cyberattacks impacting organizations continues to increase, with recent high-profile breaches such as UK outsourcing firm and government...
5 Questions to Ask When Evaluating a New Cybersecurity Technology – Source: www.darkreading.com
Source: www.darkreading.com – Author: Brian McMahon, CEO & President, ThreatBlockr The cybersecurity technology field is, shall we politely say, crowded. I recently returned from attending RSA, one...
Lazarus Group Striking Vulnerable Windows IIS Web Servers – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading The North Korean state-backed threat actor Lazarus Group has reinvented its ongoing espionage campaign by exploiting known...