VicOne and Block Harbor Deliver Integrated Workflow-Based Cybersecurity System
Hackers Weaponize SEC Disclosure Rules Against Corporate Targets
Ransomware group BlackCat/ALPHV files SEC complaint against its latest victim, putting an audacious new twist on cyber extortion tactics.
Saudi Arabia Arms Public Sector With Google Cloud Services
Chronicle CyberShield will be offered as a managed service with security monitoring and Mandiant incident response included.
Enterprise Generative AI Enters Its Citizen Development Era
Business users are building Copilots and GPTs with enterprise data. What can security teams do about it?
https://www.darkreading.com/cyber-risk/enterprise-generative-ai-enters-its-citizen-development-era
Exploited Vulnerabilities Can Take Months to Make KEV List
The Known Exploited Vulnerabilities (KEV) catalog is a high-quality source of information on software flaws being exploited in the wild, but updates are often delayed, which means companies need other...
How the Evolving Role of the CISO Impacts Cybersecurity Startups
CISOs and vendors must work together to keep up with emerging threats and find solutions, says a group of CISOs and security entrepreneurs.
CISA Launches Pilot Program to Address Critical Infrastructure Threats
CISA expects to extend this program to include up to 100 critical infrastructure entities in its first year.
Amid Military Buildup, China Deploys Mustang Panda in the Philippines
China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.
Major Saudi University to Offer AI, Cybersecurity Studies
University of Jeddah partners with Resecurity to teach cybersecurity skills.
GenAI Requires New, Intelligent Defenses
Understanding the risks of generative AI and the specific defenses to build to mitigate those risks is vital for effective business and public use of GenAI.
https://www.darkreading.com/application-security/genai-requires-new-intelligent-defenses
AI Helps Uncover Russian State-Sponsored Disinformation in Hungary
Researchers used machine learning to analyze Hungarian media reports and found Russian narratives soured the nation's perspective on EU sanctions and arms deliveries months before the Ukraine invasion...
What Healthcare Cybersecurity Leaders Should Know About the FDA's Section 524B Guidelines
New cybersecurity regulations from the FDA outline specific steps that medical device companies must take in order to get their devices approved for market.
AutoZone Files MOVEit Data Breach Notice With State of Maine
The company temporarily disabled the application and patched the vulnerability, though affected individuals should still remain vigilant.
Inside Job: Cyber Exec Admits to Hospital Hacks
Healthcare cyber services executive Vikas Singla admits to hobbling hospital operations, then using the incidents to try and gin up extra business.
DPRK Hackers Masquerade as Tech Recruiters, Job Seekers
No one has turned the job market into an attack surface quite like North Korea, which plays both sides for financial gain and, possibly, espionage.
Maximize Cybersecurity Returns: 5 Key Steps to Enhancing ROI
Cybersecurity isn't a one-time task. It's an ongoing effort that needs regular checks, updates, and teamwork.
https://www.darkreading.com/cyber-risk/maximize-cybersecurity-returns-5-key-steps-to-enhancing-roi
Malware Uses Trigonometry to Track Mouse Strokes
The latest LummaC2 infostealer version includes a novel anti-sandbox trick to avoid detonating when no human mouse movements are detected.
https://www.darkreading.com/application-security/malware-uses-trigonometry-to-track-mouse-strokes
Lasso Security Emerges From Stealth With $6M Seed Funding for Gen AI and Advanced LLM Cybersecurity
Kinsing Cyberattackers Target Apache ActiveMQ Flaw to Mine Crypto
Active exploit of the critical RCE flaw targets Linux systems to achieve full system compromise.
Omdia Analyst Summit 2023 Highlight: Why Digital Dependence Demands Digital Resilience
Omdia Cybersecurity Senior Research Director Maxine Holt shares Omdia’s definition of digital resilience and why the concept has become critical to successful enterprise digital dependence.