21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers
November 15 2023In this Black Hat Europe preview, devices bridging critical machinery with the wider Internet are exposed and subject to numerous supply chain-induced bugs.
Read moreIn this Black Hat Europe preview, devices bridging critical machinery with the wider Internet are exposed and subject to numerous supply chain-induced bugs.
Read moreThis is a current list of where and when I am scheduled to speak: I’m speaking at the AI Summit New York on December 6, 2023. The list is maintained on...
Read moreOkta's breach highlighted the importance of sanitizing the data logged in HAR files before sharing them.
Read moreThe swift-moving ransomware crew continues to evolve quickly and has already attacked more than 350 victims since it was first detected just over a year ago.
Read moreBy creating a plan of action, organizations can better respond to attacks.
Read moreThe so-called TA402 group continues to focus on cyber espionage against government agencies.
Read moreMandiant/Google Cloud’s Jill C. Tyson and Dark Reading's Terry Sweeney on how companies can better plan and prepare for the Security and Exchange Commission’s new cybersecurity disclosure rule.
Read moreSad story of Tokelau, and how its top-level domain “became the unwitting host to the dark underworld by providing a never-ending supply of domain names that could be weaponized...
Read moreHunters International appears to have acquired Hive ransomware from its original operators and may be seeking to cash in on the malware's reputation.
Read moreDetails of a major cyberattack against Australia's shipping industry remain few and far between, but the economic impact is clear.
Read more
Recent Comments