Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

10 Tips for Security Awareness Training That Hits the Target

Try these tricks for devising an education program that gets employees invested — and stays with them after the training is over.

https://www.darkreading.com/edge/10-tips-for-security-awareness-training-that-hits-the-target

Securing Cloud Identities to Protect Assets and Minimize Risk

Preventative security should be driven by data and risk assessment, not compliance.

https://www.darkreading.com/edge/securing-cloud-identities-to-protect-assets-and-minimize-risk

Safari Side-Channel Attack Enables Browser Theft

The "iLeakage" attack affects all recent iPhone, iPad, and MacBook models, allowing attackers to peruse your Gmail inbox, steal your Instagram password, or scrutinize your YouTube history.

https://www.darkreading.com/vulnerabilities-threats/safari-side-channel-attack-enables-browser-theft

Octo Tempest Group Threatens Physical Violence as Social Engineering Tactic

The financially motivated English-speaking threat actors use advanced social engineering techniques, SIM swapping, and even threats of violence to breach targets.

https://www.darkreading.com/threat-intelligence/octo-tempest-group-threatens-physical-violence-social-engineering-tactic

Understand the True Cost of a UEM Before Making the Switch

When investing in a unified endpoint management solution, prioritize the needs of your network and users ahead of brand names. This Tech Tip focuses on questions to ask.

https://www.darkreading.com/dr-tech/understand-the-true-cost-of-a-uem-before-making-the-switch

Hacktivist Activity Related to Gaza Conflict Dwindles

Groups have fallen silent after bold claims of action at the start of the conflict.

https://www.darkreading.com/dr-global/hacktivist-activity-related-to-gaza-conflict-dwindles

What Lurks in the Dark: Taking Aim at Shadow AI

Generative artificial intelligence tools have unleashed a new era of terror to CISOs still battling longstanding shadow IT security risks.

https://www.darkreading.com/vulnerabilities-threats/what-lurks-in-the-dark-taking-aim-at-shadow-ai

IriusRisk Brings Threat Modeling to Machine Learning Systems

The newly launched AI & ML Security Library allows developers to analyze the code used in machine learning systems to identify and address risks.

https://www.darkreading.com/dr-tech/iriusrisk-brings-threat-modeling-to-machine-learning

SMBs Need to Balance Cybersecurity Needs and Resources

Small and midsize businesses face the same cyberattacks as enterprises, with fewer resources. Here's how to protect a company that has leaner means.

https://www.darkreading.com/edge/how-smbs-can-balance-cybersecurity-needs-and-resources

Rockwell's Verve Buy Enlivens Critical Infrastructure Security

The industrial automation giant agrees to buy Verve Industrial Protection, joining in an ICS trend of bringing cybersecurity capabilities in-house to keep up with attackers.

https://www.darkreading.com/ics-ot/rockwell-verve-buy-critical-infrastructure-security

Iran APT Targets the Mediterranean With Watering-Hole Attacks

Nation-state hackers are using hybrids to ensnare those in the maritime, shipping, and logistics industries.

https://www.darkreading.com/dr-global/iran-apt-targets-mediterranean-watering-hole-attacks

Microsoft: 0ktapus Cyberattackers Evolve to 'Most Dangerous' Status

The English-speaking cyberattack group behind the MGM and Caesars Entertainment attacks is adding unique capabilities and gaining in sophistication. Prepare now, Microsoft says.

https://www.darkreading.com/remote-workforce/microsoft-0ktapus-cyberattackers-evolve-most-dangerous-status