Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

The Role of the CISO in Digital Transformation

A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are de...

https://www.darkreading.com/cloud-security/the-role-of-the-ciso-in-digital-transformation

General Electric, DARPA Hack Claims Raise National Security Concerns

Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies.

https://www.darkreading.com/cyberattacks-data-breaches/general-electric-darpa-hack-claims-raise-national-security-concerns

Cyber Threats to Watch Out for in 2024

As cyber threats evolve in 2024, organizations must prepare for deepfakes, extortion, cloud targeting, supply chain compromises, and zero day exploits. Robust security capabilities, employee training,...

https://www.darkreading.com/cyber-risk/cyber-threats-to-watch-out-for-in-2024

CISA, NCSC Offer a Road Map, Not Rules, in New Secure AI Guidelines

US and UK authorities issued new recommendations for companies that build and rely on AI, but they stop short of laying down the law.

https://www.darkreading.com/cyber-risk/cisa-ncsc-offer-a-road-map-not-rules-in-new-secure-ai-guidelines

Ardent Health Hospitals Disrupted After Ransomware Attack

More than two dozen hospitals have been impacted by the breach and are diverting emergency care for patients to other healthcare facilities.

https://www.darkreading.com/cyberattacks-data-breaches/ardent-health-hospitals-disrupted-after-ransomware-attack

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Companies must do a delicate dance between consumer privacy protection, upholding their product's efficacy, and de-risking cyber breaches to run the business.

https://www.darkreading.com/cyber-risk/data-de-identification-balancing-privacy-efficacy-cybersecurity

Hamas-Linked APT Wields New SysJoker Backdoor Against Israel

Gaza Cybergang is using a version of the malware rewritten in the Rust programming language.

https://www.darkreading.com/cyberattacks-data-breaches/hamas-linked-apt-wields-new-sysjoker-backdoor-against-israel

Randstorm' Bug: Millions of Crypto Wallets Open to Theft

The security vulnerability in a component of a widely used JavaScript implementation of Bitcoin makes passwords guessable via brute-force attacks.

https://www.darkreading.com/application-security/randstorm-bug-millions-of-crypto-wallets-open-to-theft

Consumer Software Security Assessment: Should We Follow NHTSA's Lead?

Vehicles are required to meet basic safety standards. Having similar requirements for software would give consumers greater control over their privacy and security.

https://www.darkreading.com/vulnerabilities-threats/consumer-software-security-assessment-should-we-follow-nhtsa-s-lead-

Despite Hype, the Password-Free Workplace Is Still a Long Way Off

More than half of organizations are nowhere near ditching passwords, even as cyberattackers continue to have a field day with workers' poor credential choices.

https://www.darkreading.com/endpoint-security/despite-hype-the-password-free-workplace-is-still-a-long-way-off

Unpatched Critical Vulnerabilities Open AI Models to Takeover

The security holes can allow server takeover, information theft, model poisoning, and more.

https://www.darkreading.com/vulnerabilities-threats/unpatched-critical-vulnerabilities-open-ai-models-to-takeover

Actions to Take to Defeat Initial Access Brokers

Initial access brokers (IAB) are often difficult to track. This Tech Tip spells out some countermeasures enterprises need to defend against stolen credentials.

https://www.darkreading.com/threat-intelligence/actions-to-take-to-defeat-initial-access-brokers

Detection & Response That Scales: A 4-Pronged Approach

Building a resilient incident response team requires more than a simple combination of tools and on-call rotations.

https://www.darkreading.com/endpoint-security/detection-response-that-scales-a-4-pronged-approach

IT Pros Worry Generative AI Will Be a Major Driver of Cybersecurity Threats

More than two-thirds of cybersecurity decision-makers say GenAI will open new avenues for attack for their businesses.

https://www.darkreading.com/cyber-risk/it-pros-worry-generative-ai-will-be-a-major-driver-of-cybersecurity-threats

Dangerous Apache ActiveMQ Exploit Allows Stealthy EDR Bypass

There's no time to waste: For organizations on the fence about patching the critical bug in ActiveMQ, the new proof-of-concept exploit should push them towards action.

https://www.darkreading.com/application-security/dangerous-apache-activemq-exploit-allows-stealthy-edr-bypass

Hands Off the Security Budget! Find Efficiencies to Reduce Risk

Security budgets will benefit from new priorities, streamlined responses rather than wholesale cost-cutting in light of cyberattacks and increased regulatory requirements.

https://www.darkreading.com/cyber-risk/hands-off-the-security-budget-find-efficiencies-to-reduce-risk

British Library Confirms Ransomware Attack Caused Outages

The library said that it expects many of its services to be restored in the forthcoming weeks.

https://www.darkreading.com/cyberattacks-data-breaches/british-library-confirms-ransomware-attack-caused-outages

Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks

For several years operators at New Delhi-based Appin hacked into, spied on, and stole data from targets around the world for clients that included private investigators, government agencies, law enfor...

https://www.darkreading.com/cyberattacks-data-breaches/shadowy-hack-for-hire-group-behind-sprawling-web-of-global-cyberattacks

Scattered Spider Casino Hackers Evade Arrest in Plain Sight

The feds seem to know all about the hacking group brazenly breaking into corporate networks; so why are enterprise teams left on their own to stop their cybercrimes?

https://www.darkreading.com/threat-intelligence/scattered-spider-casino-hackers-evade-arrest-in-plain-sight