The playbook simulates a cyberattack on the energy industry to educate regulators, utilities, and IT and OT security experts. Cyberattacks against the energy sector have shifted from targeting information...
Read moreA federal grand jury has indicted Charles K. Edwards on 16 counts related to a conspiracy to steal software from one department and sell an enhanced version to another....
Read moreA federal grand jury has indicted Charles K. Edwards on 16 counts related to a conspiracy to steal software from one department and sell an enhanced version to another....
Read more7 Cloud Attack Techniques You Should Worry About
March 7 2020Security pros detail the common and concerning ways attackers target enterprise cloud environments. (Image: Adam121 – stock.adobe.com) As organizations transition to cloud environments, so too do the cybercriminals targeting...
Read more7 Cloud Attack Techniques You Should Worry About
March 7 2020Security pros detail the common and concerning ways attackers target enterprise cloud environments. (Image: Adam121 – stock.adobe.com) As organizations transition to cloud environments, so too do the cybercriminals targeting...
Read morePwndLocker is harder to detect than other crypto-malware, Crypsis Group says. Researchers have discovered a new ransomware variant that they say has significantly different behavior and characteristics than most...
Read morePwndLocker is harder to detect than other crypto-malware, Crypsis Group says. Researchers have discovered a new ransomware variant that they say has significantly different behavior and characteristics than most...
Read moreThe former Supreme Allied Commander of NATO gives Dark Reading his take on the greatest cyber threats our nation and its businesses face today. By any standard James Stavridis...
Read moreThe former Supreme Allied Commander of NATO gives Dark Reading his take on the greatest cyber threats our nation and its businesses face today. By any standard James Stavridis...
Read more
Recent Comments