Quantcast
Channel: Dark Reading
Browsing all 100 articles
Browse latest View live

Leaky DICOM Medical Standard Exposes Millions of Patient Records

A 30-year-old, rarely updated protocol for medical devices has exposed reams of highly personal data, thanks to a lack of proper security throughout owner environments.

View Article



ChatGPT: OpenAI Attributes Regular Outages to DDoS Attacks

ChatGPT and the associated APIs have been affected by regular outages, citing DDoS attacks as the reason — the Anonymous Sudan group claimed responsibility.

View Article

'Shields Ready' Critical Infrastructure Initiative Addresses Inevitable...

A cyberattack is coming, disasters are certain, and the US government wants critical infrastructure firms ready to handle any disruption. Welcome to Shields Ready.

View Article

'CitrixBleed' Linked to Ransomware Hit on China's State-Owned Bank

Meanwhile, CISA joins the call to patch CVE-2023-4966 immediately amid reports of mass-exploit activity; at least 5,000 orgs remain exposed.

View Article

State of Maine Becomes Latest MOVEit Victim to Surface

The state said 1.3 million individuals have been affected by this breach, which includes Social Security numbers and taxpayer information.

View Article


Intel Faces 'Downfall' Bug Lawsuit

A class action suit claims Intel knowingly sold billions of faulty chips for years. The outcome could help define where poor vulnerability remediation becomes outright negligence.

View Article

SaaS Vendor Risk Assessment in 3 Steps

SaaS applications are the new supply chain and, practically speaking, SaaS is the modern vendor. Here are three straightforward steps to manage this new vendor risk.

View Article

Security Is a Process, Not a Tool

Process failures are the root cause of most serious cybersecurity incidents. We need to treat security as a process issue, not try to solve it with a collection of tools.

View Article


SEC Suit Ushers in New Era of Cyber Enforcement

A federal push to enforce cybersecurity requirements is holding public companies and government contractors accountable as a matter of law and for national security.

View Article


Azerbaijan Agencies Sign Cyber-Partner Deals

The country has signed fresh deals to boost cyber intelligence and preparedness capabilities.

View Article

A Closer Look at State and Local Government Cybersecurity Priorities

Complexity impedes the universal and consistent application of security policies, which is an obstacle to adequately securing government environments.

View Article

Ducktail Malware Targets the Fashion Industry

Threat actors distributed an archive containing images of new products by major clothing companies, along with a malicious executable disguised with a PDF icon.

View Article

Q&A: Generative AI Comes to the Middle East, Driving Security Changes

The influx of generative AI could cause security leaders to learn new skills and defensive tactics.

View Article


Australian Ports Resume Operation After Crippling Cyber Disruption

Details of a major cyberattack against Australia's shipping industry remain few and far between, but the economic impact is clear.

View Article

'Hunters International' Cyberattackers Take Over Hive Ransomware

Hunters International appears to have acquired Hive ransomware from its original operators and may be seeking to cash in on the malware's reputation.

View Article


Make Changes to Be Ready for the New SEC Cybersecurity Disclosure Rule

Mandiant/Google Cloud's Jill C. Tyson and Dark Reading's Terry Sweeney on how companies can better plan and prepare for the Securities and Exchange Commission's new cybersecurity disclosure rule.

View Article

Molerats Group Wields Custom Cybertool to Steal Secrets in the Middle East

The so-called TA402 group continues to focus on cyber espionage against government agencies with the "IronWInd" malware.

View Article


Steps CISOs Should Take Before, During & After a Cyberattack

By creating a plan of action, organizations can better respond to attacks.

View Article

Royal Ransom Demands Exceed $275M, Rebrand in Offing

The swift-moving ransomware crew continues to evolve quickly and has already attacked more than 350 victims since it was first detected just over a year ago.

View Article

HARmor Cleans, Sanitizes, Encrypts HAR Files

Okta's breach highlights the importance of sanitizing the data logged in HAR files before sharing them.

View Article
Browsing all 100 articles
Browse latest View live




Latest Images