While China is already among the world's most formidable threat actors, a focus on exploiting public-facing appliances makes its state-sponsored APTs more dangerous than ever.
Read more21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers
November 15 2023In this Black Hat Europe preview, devices bridging critical machinery with the wider Internet are exposed and subject to numerous supply chain-induced bugs.
Read moreUpcoming Speaking Engagements
November 15 2023This is a current list of where and when I am scheduled to speak: I’m speaking at the AI Summit New York on December 6, 2023. The list is maintained on...
Read moreHARmor Cleans, Sanitizes, Encrypts HAR Files
November 15 2023Okta's breach highlighted the importance of sanitizing the data logged in HAR files before sharing them.
Read moreRoyal Ransom Demands Exceed $275M, Rebrand in Offing
November 14 2023The swift-moving ransomware crew continues to evolve quickly and has already attacked more than 350 victims since it was first detected just over a year ago.
Read moreSteps CISOs Should Take Before, During & After a Cyberattack
November 14 2023By creating a plan of action, organizations can better respond to attacks.
Read moreThe so-called TA402 group continues to focus on cyber espionage against government agencies.
Read moreMandiant/Google Cloud’s Jill C. Tyson and Dark Reading's Terry Sweeney on how companies can better plan and prepare for the Security and Exchange Commission’s new cybersecurity disclosure rule.
Read moreHow .tk Became a TLD for Scammers
November 14 2023Sad story of Tokelau, and how its top-level domain “became the unwitting host to the dark underworld by providing a never-ending supply of domain names that could be weaponized...
Read more‘Hunters International’ Cyberattackers Take Over Hive Ransomware
November 14 2023Hunters International appears to have acquired Hive ransomware from its original operators and may be seeking to cash in on the malware's reputation.
Read more
Recent Comments