Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

Hackers Weaponize SEC Disclosure Rules Against Corporate Targets

Ransomware group BlackCat/ALPHV files SEC complaint against its latest victim, putting an audacious new twist on cyber extortion tactics.

https://www.darkreading.com/cyber-risk/hackers-weaponize-sec-disclosure-rules-against-corporate-targets

Saudi Arabia Arms Public Sector With Google Cloud Services

Chronicle CyberShield will be offered as a managed service with security monitoring and Mandiant incident response included.

https://www.darkreading.com/cloud-security/saudi-arabia-arms-public-sector-with-google-cloud-services

Enterprise Generative AI Enters Its Citizen Development Era

Business users are building Copilots and GPTs with enterprise data. What can security teams do about it?

https://www.darkreading.com/cyber-risk/enterprise-generative-ai-enters-its-citizen-development-era

Exploited Vulnerabilities Can Take Months to Make KEV List

The Known Exploited Vulnerabilities (KEV) catalog is a high-quality source of information on software flaws being exploited in the wild, but updates are often delayed, which means companies need other...

https://www.darkreading.com/vulnerabilities-threats/exploited-vulnerabilities-can-take-months-to-make-kev-list

How the Evolving Role of the CISO Impacts Cybersecurity Startups

CISOs and vendors must work together to keep up with emerging threats and find solutions, says a group of CISOs and security entrepreneurs.

https://www.darkreading.com/cybersecurity-operations/how-the-evolving-role-of-the-ciso-impacts-cybersecurity-startups

CISA Launches Pilot Program to Address Critical Infrastructure Threats

CISA expects to extend this program to include up to 100 critical infrastructure entities in its first year.

https://www.darkreading.com/ics-ot-security/cisa-launches-pilot-program-to-address-critical-infrastructure-threats

Amid Military Buildup, China Deploys Mustang Panda in the Philippines

China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.

https://www.darkreading.com/cyberattacks-data-breaches/amid-military-buildup-china-deploys-mustang-panda-in-the-philippines

Major Saudi University to Offer AI, Cybersecurity Studies

University of Jeddah partners with Resecurity to teach cybersecurity skills.

https://www.darkreading.com/cybersecurity-operations/major-saudi-university-to-offer-ai-cybersecurity-studies

GenAI Requires New, Intelligent Defenses

Understanding the risks of generative AI and the specific defenses to build to mitigate those risks is vital for effective business and public use of GenAI.

https://www.darkreading.com/application-security/genai-requires-new-intelligent-defenses

AI Helps Uncover Russian State-Sponsored Disinformation in Hungary

Researchers used machine learning to analyze Hungarian media reports and found Russian narratives soured the nation's perspective on EU sanctions and arms deliveries months before the Ukraine invasion...

https://www.darkreading.com/cybersecurity-analytics/ai-helps-uncover-russian-state-sponsored-disinformation-in-hungary

What Healthcare Cybersecurity Leaders Should Know About the FDA's Section 524B Guidelines

New cybersecurity regulations from the FDA outline specific steps that medical device companies must take in order to get their devices approved for market.

https://www.darkreading.com/cloud-security/what-healthcare-cybersecurity-leaders-should-know-about-the-fda-s-section-524b-guidelines

AutoZone Files MOVEit Data Breach Notice With State of Maine

The company temporarily disabled the application and patched the vulnerability, though affected individuals should still remain vigilant.

https://www.darkreading.com/cyberattacks-data-breaches/autozone-files-moveit-data-breach-notice-with-state-of-maine

Inside Job: Cyber Exec Admits to Hospital Hacks

Healthcare cyber services executive Vikas Singla admits to hobbling hospital operations, then using the incidents to try and gin up extra business.

https://www.darkreading.com/cyberattacks-data-breaches/inside-job-cyber-exec-admits-to-hospital-hacks

DPRK Hackers Masquerade as Tech Recruiters, Job Seekers

No one has turned the job market into an attack surface quite like North Korea, which plays both sides for financial gain and, possibly, espionage.

https://www.darkreading.com/threat-intelligence/dprk-hackers-masquerade-as-tech-recruiters-job-seekers

Maximize Cybersecurity Returns: 5 Key Steps to Enhancing ROI

Cybersecurity isn't a one-time task. It's an ongoing effort that needs regular checks, updates, and teamwork.

https://www.darkreading.com/cyber-risk/maximize-cybersecurity-returns-5-key-steps-to-enhancing-roi

Malware Uses Trigonometry to Track Mouse Strokes

The latest LummaC2 infostealer version includes a novel anti-sandbox trick to avoid detonating when no human mouse movements are detected.

https://www.darkreading.com/application-security/malware-uses-trigonometry-to-track-mouse-strokes

Kinsing Cyberattackers Target Apache ActiveMQ Flaw to Mine Crypto

Active exploit of the critical RCE flaw targets Linux systems to achieve full system compromise.

https://www.darkreading.com/cyberattacks-data-breaches/kinsing-cyberattackers-target-apache-activemq-flaw-to-mine-crypto

Omdia Analyst Summit 2023 Highlight: Why Digital Dependence Demands Digital Resilience

Omdia Cybersecurity Senior Research Director Maxine Holt shares Omdia’s definition of digital resilience and why the concept has become critical to successful enterprise digital dependence.

https://www.darkreading.com/cybersecurity-operations/omdia-analyst-summit-2023-highlight-why-digital-dependence-demands-digital-resilience-