Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

AutoZone Files MOVEit Data Breach Notice With State of Maine

The company temporarily disabled the application and patched the vulnerability, though affected individuals should still remain vigilant.

https://www.darkreading.com/attacks-breaches/autozone-moveit-data-breach-state-of-maine

DPRK Hackers Masquerade as Tech Recruiters, Job Seekers

No one has turned the job market into an attack surface quite like North Korea, which plays both sides for financial gain and, possibly, espionage.

https://www.darkreading.com/threat-intelligence/dprk-hackers-masquerading-tech-recruiters--job-seekers

The Role of the CISO in Digital Transformation

A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are de...

https://www.darkreading.com/google-cloud-security/the-role-of-the-ciso-in-digital-transformation

Inside Job: Cyber Exec Admits to Hospital Hacks

Healthcare cyber services executive Vikas Singla admits to hobbling hospital operations, then using the incidents to try and gin up extra business.

https://www.darkreading.com/attacks-breaches/inside-job-cyber-exec-admits-to-hospital-hacks

Major Saudi University to Offer AI, Cybersecurity Studies

University of Jeddah partners with Resecurity to teach cybersecurity skills.

https://www.darkreading.com/dr-global/major-saudi-university-to-offer-ai-cybersecurity-studies

Kinsing Cyberattackers Target Apache ActiveMQ Flaw to Mine Crypto

Active exploit of the critical RCE flaw targets Linux systems to achieve full system compromise.

https://www.darkreading.com/attacks-breaches/kinsing-cyberattackers-target-apache-activemq-flaw-to-mine-crypto

Maximize Cybersecurity Returns: 5 Key Steps to Enhancing ROI

Cybersecurity isn't a one-time task. It's an ongoing effort that needs regular checks, updates, and teamwork.

https://www.darkreading.com/risk/maximize-cybersecurity-returns-5-key-steps-to-enhancing-roi

GenAI Requires New, Intelligent Defenses

Understanding the risks of generative AI and the specific defenses to build in order to mitigate those risks is vital for effective business and public use of GenAI.

https://www.darkreading.com/dr-tech/genai-requires-new-intelligent-defenses

AI Helps Uncover Russian State-Sponsored Disinformation in Hungary

Researchers used machine learning to analyze Hungarian media reports and found Russian narratives soured the nation's perspective on EU sanctions and arms deliveries months before the Ukraine invasion...

https://www.darkreading.com/edge/ai-helps-uncover-russian-state-sponsored-disinformation-in-hungary

Exploited Vulnerabilities Can Take Months to Make KEV List

The Known Exploited Vulnerabilities (KEV) catalog is a high-quality source of information on software flaws being exploited in the wild, but updates are often delayed, so companies need other sources ...

https://www.darkreading.com/edge/exploited-vulnerabilities-take-months-to-make-kev-list

What Healthcare Cybersecurity Leaders Should Know About the FDA's Section 524B Guidelines

New cybersecurity regulations from the FDA outline specific steps that medical device companies must take in order to get their devices approved for market.

https://www.darkreading.com/google-cloud-security/what-healthcare-cybersecurity-leaders-should-know-fda-section-524b-guidelines

Malware Uses Trigonometry to Track Mouse Strokes

The latest LummaC2 infostealer version includes a novel anti-sandbox trick to avoid detonating when no human mouse movements are detected.

https://www.darkreading.com/application-security/malware-trigonometry-track-mouse-strokes

Amid Military Buildup, China Deploys Mustang Panda in the Philippines

China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.

https://www.darkreading.com/attacks-breaches/military-buildup-china-deploys-mustang-panda-philippines

CISA Launches Pilot Program to Address Critical Infrastructure Threats

CISA expects to extend this program to include up to 100 critical infrastructure entities in its first year.

https://www.darkreading.com/ics-ot/cisa-launches-pilot-program-critical-infrastructure-threats

Enterprise Generative AI Enters Its Citizen Development Era

Your business users are building Copilots and GPTs with your enterprise data. What can you do about it?

https://www.darkreading.com/edge/enterprise-generative-ai-enters-its-citizen-development-era

Saudi Arabia Arms Public Sector With Google Cloud Services

Chronicle CyberShield will be offered as a managed service with security monitoring and Mandiant incident response included.

https://www.darkreading.com/dr-global/saudi-arabia-arms-public-sector-with-google-cloud-services

How the Evolving Role of the CISO Impacts Cybersecurity Startups

CISOs and vendors must work together to keep up with emerging threats and find solutions, says a group of CISOs and security entrepreneurs.

https://www.darkreading.com/operations/how-evolving-role-of-ciso-impacts-cybersecurity-startups

A Detection and Response Benchmark Designed for the Cloud

Does your security operation center's performance meet the 5/5/5 benchmark for cloud threat detection and incident response?

https://www.darkreading.com/cloud/5-5-5-benchmark-cloud-detection-and-response

Leveraging Sandbox and Threat Intelligence Feeds to Combat Cyber Threats

Combining a malware sandbox with threat intelligence feeds improves security detection, analysis, and response capabilities.

https://www.darkreading.com/threat-intelligence/leveraging-sandbox-and-threat-intelligence-feeds-to-combat-cyber-threats