Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

Pilfered Data From Iranian Insurance and Food Delivery Firms Leaked Online

Online food ordering service and insurance firms hit by mystery hackers using the moniker "irleaks."

https://www.darkreading.com/cyberattacks-data-breaches/pilfered-data-from-iranian-insurance-and-food-delivery-firms-leaked

Name That Edge Toon: Frosty the Steel Man

Come up with a clever cybersecurity-related caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

https://www.darkreading.com/ics-ot-security/name-that-edge-toon-frosty-the-steel-man

'Black Basta Buster' Exploits Ransomware Bug for File Recovery

A tool now allows for victim files encrypted by the Black Basta cybercriminal gang to be fully or partially recoverable, depending on their size.

https://www.darkreading.com/cloud-security/black-basta-buster-exploits-ransomware-bug-file-recovery

Qatar to Add Cybersecurity Curricula in Private Schools

The goal is to raise cybersecurity awareness for all students in the country.

https://www.darkreading.com/cybersecurity-operations/qatar-to-add-cybersecurity-curricula-in-private-schools

5 Steps for Preventing and Mitigating Corporate Espionage

Companies must take steps to enhance their protection against corporate espionage and safeguard their assets.

https://www.darkreading.com/vulnerabilities-threats/5-steps-preventing-mitigating-corporate-espionage

Cybercriminals Share Millions of Stolen Records During Holiday Break

The "Leaksmus" event on the Dark Web exposed some 50 million records containing sensitive information from people all around the world.

https://www.darkreading.com/cyberattacks-data-breaches/cybercriminals-freely-share-millions-of-stolen-records-over-holiday-break

Google Settles Lawsuit Over Tracking 'Incognito Mode' Chrome Users

Google tracked privacy-conscious Internet users, and now it's paying for it.

https://www.darkreading.com/cyber-risk/google-settles-lawsuit-tracking-private-browsing-users

Cyberattackers Target Nuclear Waste Company via LinkedIn

The hackers were unsuccessful in their attempt, but this is not the first time the company has experienced this kind of attack.

https://www.darkreading.com/ics-ot-security/cyberattackers-target-nuclear-waste-company-via-linkedin

Attackers Abuse Google OAuth Endpoint to Hijack User Sessions

Infostealers such as Lumma and Rhadamanthys have integrated the generation of persistent Google cookies through token manipulation.

https://www.darkreading.com/cloud-security/attackers-abuse-google-oauth-endpoint-hijack-user-sessions

Israel Battles Spike in Wartime Hacktivist, OT Cyberattacks

Israel's cybersecurity industry made strides in the past year despite the backdrop of the war in Gaza.

https://www.darkreading.com/cyberattacks-data-breaches/israel-cyberattacks-and-conflict-partnerships-and-acquisitions

CISO Planning for 2024 May Struggle When It Comes to AI

Artificial intelligence (AI) is constantly evolving. How can security executives plan for something so unpredictable?

https://www.darkreading.com/cybersecurity-operations/ciso-planning-for-2024-may-struggle-when-it-comes-to-ai

Localization Mandates, AI Regs to Pose Major Data Challenges in 2024

With more than three-quarters of countries adopting some form of data localization and, soon, three-quarters of people worldwide protected by privacy rules, companies need to take care.

https://www.darkreading.com/cyber-risk/localization-mandataes-ai-regs-pose-major-data-challenges-in-2024

Startups Scramble to Build Immediate AI Security

AI may be inherently insecure, but only a handful of startups have put forward real visions to mitigate AI's threats and keep data private.

https://www.darkreading.com/vulnerabilities-threats/startups-scramble-to-build-immediate-ai-security

10 Years After Yahoo Breach, What's Changed? (Not Much)

Yahoo customers suffered the largest data breaches in history by some measures. But a decade on, experts warn, we still haven't learned our lesson.

https://www.darkreading.com/cyberattacks-data-breaches/10-years-after-yahoo-whats-changed-not-much

‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections

The Operation Triangulation attacks are abusing undocumented functions in Apple chips to circumvent hardware-based security measures.

https://www.darkreading.com/application-security/operation-triangulation-spyware-attackers-bypass-iphone-memory-protections

Palo Alto Networks Closes Talon Cybersecurity Acquisition

The Talon acquisition extends Palo Alto Networks' best-in-class SASE solution to help protect all managed and unmanaged devices.

https://www.darkreading.com/cloud-security/palo-alto-networks-closes-talon-cybersecurity-acquisition

I Securely Resolve: CISOs, IT Security Leaders Share 2024 Resolutions

As cybersecurity leaders confront ever more complex challenges, the new year offers security leaders a chance to strategically reevaluate and plan for 2024.

https://www.darkreading.com/cyber-risk/i-securely-resolve-cisos-it-security-leaders-share-2024-resolutions

UAE Banks on AI to Boost Cybersecurity

The federation has formed partnerships to aid its cybersecurity ambitions as well, but aging legacy systems and a talent gap leave the UAE vulnerable to cyber-risks.

https://www.darkreading.com/cyberattacks-data-breaches/uae-banks-on-ai-to-boost-cybersecurity

In Cybersecurity and Fashion, What's Old Is New Again

What a recent rise in DDoS attacks portends — and how to prepare for 2024.

https://www.darkreading.com/cyberattacks-data-breaches/in-cybersecurity-whats-old-is-new-again

Skynet Ahoy? What to Expect for Next-Gen AI Security Risks

The innovation that ChatGPT and other LLMs demonstrate is a good thing, but safeguards and other security frameworks must keep pace.

https://www.darkreading.com/vulnerabilities-threats/skynet-ahoy-what-to-expect-next-gen-ai-security-risks