Malicious Game Mods Target Dota 2 Game Users
February 11 2023Valve's unpatched JavaScript engine and incomplete modification vetting process for Steam-delivered mods led to user systems being backdoored.
Read moreValve's unpatched JavaScript engine and incomplete modification vetting process for Steam-delivered mods led to user systems being backdoored.
Read moreEvent organizers should be exercising various cyberattack scenarios to ensure they have the proper checks and balances in place to respond accordingly and maintain resilience.
Read moreBridging the divide between developers and security can create a culture change organically.
Read moreMembers of the Health-ISAC can ingest threat indicators directly into Chronicle to investigate whether the threat is present in their environment.
Read moreReddit code, internal documents, dashboards, and business systems were compromised in the cyberattack.
Read moreA sophisticated cyber-espionage attack against high-value targets attending a maritime technology conference in Pakistan this weekend has been in the works since last year.
Read moreAs evolving cyber threats force security teams to adopt AI to automate workflows, we ask how the relationship between humans and AI will pan out.
Read moreAvast researchers also discovered and reported two zero-day vulnerabilities, and observed the spread of information-stealing malware, remote access trojans, and botnets.
Read moreFrom shadow data to misconfigurations, and overpermissioning to multicloud sprawl, Dark Reading's cloud security slideshow helps security pros understand the threat horizon.
Read more
Recent Comments