Dark Reading News Desk interviewed Kelly Shortridge about the role of infrastructure-as-code in helping security teams get more nimble in responding to cyber threats.
Read more‘ShroudedSnooper’ Backdoors Use Ultra-Stealth in Mideast Telecom Attacks
September 19 2023The threat cluster hasn't been seen before, but its custom Windows server backdoors have researchers intrigued thanks to their extremely effective stealth mechanisms.
Read moreDetecting AI-Generated Text
September 19 2023There are no reliable ways to distinguish text written by a human from text written by an large language model. OpenAI writes:
Do AI detectors work?
- In short, no. While... Read more
Who’s Behind the 8Base Ransomware Website?
September 19 2023The victim shaming website operated by the cybercriminals behind 8Base -- currently one of the more active ransomware groups -- was until earlier today leaking quite a bit of...
Read morePayment Card-Skimming Campaign Now Targeting Websites in North America
September 19 2023"Silent Skimmer" is a technically complex campaign that has successfully targeted online businesses in the Asia Pacific region for over a year.
Read moreMicrosoft Azure Data Leak Exposes Dangers of File-Sharing Links
September 19 2023Shared Access Signature (SAS) link exposed a storage bucket with 38TB of private data, including passwords, Teams messages, and the backups of two Microsoft AI research employees' workstations.
Read moreSecurity Conferences Keep Us Honest
September 19 2023Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — in public.
Read moreLockBit Is Using RMMs to Spread Its Ransomware
September 19 2023The LockBit group is using native IT management software to live off the land, planting and then spreading itself before deploying its ransomware.
Read more
Recent Comments