Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

Safeguarding Our Children's Digital Future: A Call to Action

Frequent cyberattacks on America's schools are putting our children at risk. Urgent action is needed to protect students and families.

https://www.darkreading.com/cyberattacks-data-breaches/safeguarding-our-childrens-digital-future

Zoom's Bug-Scoring System Prioritizes Riskiest Vulns for Cyber Teams

New vulnerability impact scoring system aims to help cyber defenders find threats and patch against bugs most likely to disrupt their environments.

https://www.darkreading.com/cybersecurity-analytics/zoom-bug-scoring-system-prioritizes-riskiest-vulns

Tips for Modernizing SecOps Teams

Dark Reading's special report looks at ways security operations teams can improve their efficiency and effectiveness to address the latest threats.

https://www.darkreading.com/cybersecurity-operations/tips-for-modernizing-secops

Global TeamCity Exploitation Opens Door to SolarWinds-Style Nightmare

Russia's APT29 is going after a critical RCE flaw in the JetBrains TeamCity software developer platform, prompting governments worldwide to issue an urgent warning to patch.

https://www.darkreading.com/vulnerabilities-threats/global-teamcity-exploitation-opens-door-to-solarwinds-style-nightmare

Confidential AI Protects Data and Models Across Clouds

Confidential AI integrates zero trust and confidential computing to guard data and models during inferencing, training, learning, and fine-tuning.

https://www.darkreading.com/cloud-security/confidential-ai-protect-data-models-across-cloud

MITRE Debuts ICS Threat Modeling for Embedded Systems

EMB3D, like ATT&CK and CWE, seeks to provide a common understanding of cyber-threats to embedded devices and of the security mechanisms for addressing them.

https://www.darkreading.com/ics-ot-security/mitre-debuts-ics-cyber-threat-modeling-embedded-systems

Attackers Target Microsoft Accounts to Weaponize OAuth Apps

After compromising Azure and Outlook user accounts, threat actors are creating malicious apps with high privileges to conduct cryptomining, phishing, and password spraying.

https://www.darkreading.com/cloud-security/attackers-target-microsoft-accounts-weaponize-oauth-apps

Saudi Cyber Students Team with Bahrain to Assess AI Security & Risk

A visit to the "Island of Pearls" is part of ongoing regional efforts to enhance cooperation and exchange knowledge between universities in the cyber and technology sectors.

https://www.darkreading.com/cloud-security/saudi-cyber-students-team-bahrain-assess-ai-risk

Hacktivists Interrupt UAE TV Streams With a Message About Gaza

The root cause may lie in set-top boxes run by a questionable service provider.

https://www.darkreading.com/ics-ot-security/hacktivists-interrupt-uae-tv-streams-with-message-about-gaza

Software & Security: How to Move Supply Chain Security Up the Agenda

Getting more insight helps you to prioritize across all your systems, letting you drive more collaboration, real change, and real success for your teams.

https://www.darkreading.com/vulnerabilities-threats/software-security-how-to-move-supply-chain-security-up-the-agenda

Ransomware Gangs Use PR Charm Offensive to Pressure Victims

Threat actors are fully embracing the spin machine: rebranding, speaking with the media, writing detailed FAQs, and more, all in an effort to make headlines.

https://www.darkreading.com/threat-intelligence/ransomware-gangs-pr-charm-offensive-pressure-victims

Survey: 90% of IT Pros Felt Prepared for a Password-Based Cyberattack, Yet More Than Half Fell Victim to One

Axiad's State of Authentication Survey also found nearly half of respondents think phishing is the most likely cyberattack, yet only 27% plan to use phishing-resistant MFA next year.

https://www.darkreading.com/endpoint-security/survey-90-of-it-pros-felt-prepared-for-a-password-based-cyberattack-yet-more-than-half-fell-victim-to-one

Stamus Networks Supports NATO Red Teaming Cyber Exercise for the Fifth Consecutive Year

Twelfth annual Crossed Swords will see Stamus Networks share expertise and technology to develop and test the capabilities and practical skills of participants

https://www.darkreading.com/cybersecurity-operations/stamus-networks-supports-nato-red-teaming-cyber-exercise-for-the-fifth-consecutive-year-

Microsoft Gives Admins a Reprieve With Lighter-Than-Usual Patch Update

The company's final patch release for 2023 contained fixes for a total of just 36 vulnerabilities — none of which, for a change, were zero-days.

https://www.darkreading.com/vulnerabilities-threats/microsoft-gives-admins-a-reprieve-with-lighter-than-usual-patch-update

Kyivstar Mobile Attack Plunges Millions in Ukraine Into Comms Blackout

The destructive attack, likely carried out by Russian actors, is the biggest hit on the country's basic infrastructure since the beginning of the war.

https://www.darkreading.com/ics-ot-security/kyivstar-mobile-attack-ukraine-comms-blackout

Dozens of Bugs Patched in Apple TVs and Watches, Macs, iPads, iPhones

A laundry list of tweaks to Safari, Bluetooth, Accessibility, and much more.

https://www.darkreading.com/endpoint-security/dozens-bugs-patched-apple-tv-watch-mac-iphone

BlackBerry Appoints John Giamatteo as CEO

Company to pursue full separation of IoT and cybersecurity business units.

https://www.darkreading.com/endpoint-security/blackberry-appoints-john-giamatteo-as-ceo

Debate Roils Over Extent of Nation-State Cyber Involvement in Gaza

Are hacktivists under the control of nation-states, or are they just independent contractors acting on their behalf?

https://www.darkreading.com/cyberattacks-data-breaches/gaza-conflict-enters-third-month-how-involved-are-nation-state-attackers

Biden's AI Exec Order Is a Start, but We Must Safeguard Innovation

It's important for Congress to strengthen protections for AI and set guardrails to make sure it isn't used maliciously.

https://www.darkreading.com/cybersecurity-operations/bidens-ai-exec-order-start-must-safeguard-innovation