While China is already among the world's most formidable threat actors, a focus on exploiting public-facing appliances makes its state-sponsored APTs more dangerous than ever.
Read more21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers
November 15 2023In this Black Hat Europe preview, devices bridging critical machinery with the wider Internet are exposed and subject to numerous supply chain-induced bugs.
Read moreHARmor Cleans, Sanitizes, Encrypts HAR Files
November 15 2023Okta's breach highlighted the importance of sanitizing the data logged in HAR files before sharing them.
Read moreRoyal Ransom Demands Exceed $275M, Rebrand in Offing
November 14 2023The swift-moving ransomware crew continues to evolve quickly and has already attacked more than 350 victims since it was first detected just over a year ago.
Read moreSteps CISOs Should Take Before, During & After a Cyberattack
November 14 2023By creating a plan of action, organizations can better respond to attacks.
Read moreThe so-called TA402 group continues to focus on cyber espionage against government agencies.
Read moreMandiant/Google Cloud’s Jill C. Tyson and Dark Reading's Terry Sweeney on how companies can better plan and prepare for the Security and Exchange Commission’s new cybersecurity disclosure rule.
Read more‘Hunters International’ Cyberattackers Take Over Hive Ransomware
November 14 2023Hunters International appears to have acquired Hive ransomware from its original operators and may be seeking to cash in on the malware's reputation.
Read moreAustralian Ports Resume Operation After Crippling Cyber Disruption
November 14 2023Details of a major cyberattack against Australia's shipping industry remain few and far between, but the economic impact is clear.
Read more
Recent Comments