darkreading
OpenGradient Raises $8.5M to Decentralize AI Infrastructure and Accelerate Secure, Open-Source AI
1 month 2 weeks ago
Hackers Hide Remcos RAT in GitHub Repository Comments
1 month 2 weeks ago
The tack highlights bad actors' interest in trusted development and collaboration platforms — and their users.
Jai Vijayan, Contributing Writer
90% of Successful Attacks Seen in the Wild Resulted in Leaked Sensitive Data
1 month 2 weeks ago
Australia Intros Its First National Cyber Legislation
1 month 2 weeks ago
The bill is broken up into several pieces, including ransomware reporting and securing smart devices, among other objectives.
Dark Reading Staff
Mamba 2FA Cybercrime Kit Targets Microsoft 365 Users
1 month 2 weeks ago
A stealthy new underground offering uses sophisticated adversary-in-the-middle (AitM) techniques to convincingly serve up "Microsoft" login pages of various kinds, with dynamic enterprise branding.
Tara Seals, Managing Editor, News, Dark Reading
3 More Ivanti Cloud Vulns Exploited in the Wild
1 month 2 weeks ago
The security bugs were found susceptible to exploitation in connection to the previously disclosed, critical CVE-2024-8963 vulnerability in the security vendor's Cloud Services Appliance (CSA).
Dark Reading Staff
Risk Strategies Drawn From the EU AI Act
1 month 2 weeks ago
The EU AI Act provides a governance, risk, and compliance (GRC) framework that helps organizations take a risk-based approach to using AI.
Kyle McLaughlin
Cloud, AI Talent Gaps Plague Cybersecurity Teams
1 month 2 weeks ago
Cyber pros are scrambling to stay up-to-date as the businesses they work for quickly roll out AI tools and keep expanding their cloud initiatives.
Kristina Beek, Associate Editor, Dark Reading
AI-Augmented Email Analysis Spots Latest Scams, Bad Content
1 month 2 weeks ago
Multimodal AI systems can help enterprise defenders weed out fraudulent emails, even if the system has not seen that type of message before.
Robert Lemos, Contributing Writer
Building Cyber Resilience in SMBs With Limited Resources
1 month 2 weeks ago
With careful planning, ongoing evaluation, and a commitment to treat cybersecurity as a core business function, SMBs can transform their vulnerabilities into strengths.
Mark Logan
Microsoft: Creative Abuse of Cloud Files Bolsters BEC Attacks
1 month 2 weeks ago
Since April, attackers have increased their use of Dropbox, OneDrive, and SharePoint to steal the credentials of business users and conduct further malicious activity.
Elizabeth Montalbano, Contributing Writer
Despite Prevalence of Online Threats, Users Aren't Changing Behavior
1 month 2 weeks ago
Consumers are victims of online scams and have their data stolen, but they are lagging on adopting security tools to protect themselves.
Jennifer Lawinski, Contributing Writer
Ex-Uber CISO Requests a New, 'Fair' Trial
1 month 2 weeks ago
Attorneys for Joseph Sullivan argue the jury didn't hear essential facts of the case during the original trial and that his conviction must be overturned.
Kristina Beek, Associate Editor, Dark Reading
5 Zero-Days in Microsoft's October Update to Patch Immediately
1 month 2 weeks ago
Threat actors are actively exploiting two of the vulnerabilities, while three others are publicly known and ripe for attack.
Jai Vijayan, Contributing Writer
Healthcare's Grim Cyber Prognosis Requires Security Booster
1 month 2 weeks ago
As healthcare organizations struggle against operational issues, two-thirds of the industry suffered ransomware attacks in the past year, and an increasing number are caving to extortion and paying up.
Robert Lemos, Contributing Writer
How Major Companies Are Honoring Cybersecurity Awareness Month
1 month 2 weeks ago
The annual event reinforces best practices while finding new ways to build a culture where employees understand how their daily decisions affect company security. Find out how AWS, IBM, Intuit, SentinelOne, and Gallo are spreading the word.
Chris Betz
The Perils of Ignoring Cybersecurity Basics
1 month 2 weeks ago
The massive outage involving a faulty Falcon update is an excellent illustration of what happens when organizations neglect security fundamentals.
Stephen Lawton, Contributing Writer
Your IT Systems Are Being Attacked. Are You Prepared?
1 month 2 weeks ago
Company leadership needs to ensure technology teams are managing continuous monitoring, automated testing, and alignment with business needs across their enterprise.
Ken Frantz
American Water Suffers Network Disruptions After Cyberattack
1 month 2 weeks ago
The largest publicly traded water utility in the US was forced to disconnect some of its online systems, and its website and telecommunications system remained unavailable as of Tuesday morning, Oct. 8.
Elizabeth Montalbano, Contributing Writer
Checked
1 hour 30 minutes ago
Public RSS feed
darkreading feed