darkreading
Varonis Acquires Cyral to Reinvent Database Activity Monitoring
2 weeks 2 days ago
Denmark Warns of Increased Cyber Espionage Against Telecom Sector
2 weeks 2 days ago
A new threat assessment from the Danish Civil Protection Authority (SAMSIK) warned of cyberattacks targeting the telecommunications sector after citing a wave of incidents hitting European organizations the past few years.
Alexander Culafi, Senior News Writer, Dark Reading
Apache Tomcat RCE Vulnerability Under Fire With 2-Step Exploit
2 weeks 2 days ago
The researchers who discovered the initial assault warned that the simple, staged attack is just the beginning for advanced exploit sequences that will test cyber defenses in new and more difficult ways.
Kristina Beek, Associate Editor, Dark Reading
RansomHub Taps FakeUpdates to Target US Government Sector
2 weeks 2 days ago
A ransomware activity wave using the SocGholish MaaS framework for initial access also has affected banking and consulting firms in the US, Taiwan, and Japan since the beginning of the year.
Elizabeth Montalbano, Contributing Writer
How 'Open Innovation' Can Help Solve Problems Faster, Better & Cheaper
2 weeks 3 days ago
Cybersecurity is not just a technical challenge but also a very human one. The more humans that organizations can get involved, the more diverse perspectives and experiences that can be tapped into.
Javvad Malik
How Economic Headwinds Influence the Ransomware Ecosystem
2 weeks 3 days ago
Inflation, cryptocurrency market volatility, and the ability to invest in defenses all influence the impact and severity of a ransomware attack, according to incident response efforts and ransomware negotiators.
Alexander Culafi, Senior News Writer, Dark Reading
Intel's Secure Data Tunnel Moves AI Training Models to Data Sources
2 weeks 3 days ago
The chipmaker's Tiber Secure Federated AI service creates a secure tunnel between AI models on remote servers and data sources on origin systems.
Agam Shah
Threat Actor Impersonates Booking.com in Phishing Scheme
2 weeks 5 days ago
Microsoft detailed a sophisticated campaign that relies on a social engineering technique, "ClickFix," in which a phisher uses security verification like captcha to give the target a false sense of safety.
Alexander Culafi, Senior News Writer, Dark Reading
Man-in-the-Middle Vulns Threaten Car Security
2 weeks 5 days ago
A pair of researchers plan on digging into the effectiveness of vehicle cybersecurity at the upcoming Black Hat Asia conference in Singapore.
Kristina Beek, Associate Editor, Dark Reading
Ransomware Developer Extradited, Admits Working for LockBit
2 weeks 5 days ago
Law enforcement discovered admin credentials on the suspect's computer for an online repository hosted on the Dark Web that stored source code for multiple versions of the LockBit builder.
Kristina Beek, Associate Editor, Dark Reading
Threat Actor Tied to LockBit Ransomware Targets Fortinet Users
2 weeks 5 days ago
The Mora_001 group uses similar post-exploitation patterns and ransomware customization originated by LockBit.
Kristina Beek, Associate Editor, Dark Reading
CISA Cuts $10M in ISAC Funding & 100s of Employees
2 weeks 5 days ago
President Trump has long complained about perceived threats to election security. Now his DHS has kneecapped the agencies designed to support it. Experts are worried about what comes next.
Nate Nelson, Contributing Writer
Biggest Cyber Threats to the Healthcare Industry Today
2 weeks 6 days ago
Healthcare organizations must enhance their cybersecurity arsenal. Doing so can help them prevent financial, compliance, and reputational damage.
Bhavya Jain
Remote Access Infra Remains Riskiest Corp. Attack Surface
2 weeks 6 days ago
Exposed login panels for VPNs and remote access systems leave companies open to attack, sometimes tripling the risk of ransomware and making it harder to get cyber insurance.
Robert Lemos, Contributing Writer
OBSCURE#BAT Malware Highlights Risks of API Hooking
2 weeks 6 days ago
Researchers discovered an attack chain that uses several layers of obfuscated batch files and PowerShell scripts to deliver an advanced and persistent rootkit.
Rob Wright
FBI, CISA Raise Alarms As Medusa Ransomware Attacks Grow
2 weeks 6 days ago
Medusa developers have been targeting a wide variety of critical infrastructure sectors, from healthcare and technology to manufacturing and insurance, racking up its victim count as it seemingly adds to its numbers of affiliates.
Kristina Beek, Associate Editor, Dark Reading
Consumer Groups Push IoT Security Bill to Address End-of-Life Concerns
2 weeks 6 days ago
Consumer Reports, Secure Resilient Future Foundation (SRFF), and US Public Interest Research Group (PIRG) have introduced a model bill to increase transparency around when Internet of Things devices no longer have manufacturer support.
Arielle Waldman
Car Exploit Allows You to Spy on Drivers in Real Time
2 weeks 6 days ago
Just like with any regular computer, researchers figured out how to crack into, force restart, and upload malware to an aftermarket in-vehicle infotainment system.
Nate Nelson, Contributing Writer
Salt Typhoon: A Wake-up Call for Critical Infrastructure
3 weeks ago
The Salt Typhoon attacks underscored the need for unity, innovation, and resilience in the face of an increasingly sophisticated cyber-threat landscape.
Gabrielle Hempel
Checked
3 hours 45 minutes ago
Public RSS feed
darkreading feed