Generative Data Intelligence

Tag: Cyberattack

Digital Blitzkrieg: Unveiling Cyber-Logistics Warfare

COMMENTARYImagine you're standing in a bustling city, surrounded by the symphony of commerce. The exchange of goods and the flow of transportation are all...

Top News

MITRE ATT&CKED: InfoSec’s Most Trusted Name Falls to Ivanti Bugs

Foreign nation-state hackers have used vulnerable Ivanti edge devices to gain three months' worth of "deep" access to one of MITRE Corp.'s unclassified networks.MITRE,...

CISO Corner: Breaking Staff Burnout, GPT-4 Exploits, Rebalancing NIST

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

UNDP, City of Copenhagen Targeted in Data-Extortion Cyberattack

The United Nations Development Programme (UNDP) became the victim of a cyberattack in late March, which also impacted the IT infrastructure of the city...

Cyberattack Takes Frontier Communications Offline

Texas-based Frontier Communications, which provides local residential and business telecom services in 25 states, has shut down its operations in the wake of a...

ICS Network Controllers Open to Remote Exploit, No Patches Available

A security advisory issued this week by the Cybersecurity and Infrastructure Security Agency (CISA) alerts administrators of vulnerabilities in two industrial control systems devices...

Rebalancing NIST: Why ‘Recovery’ Can’t Stand Alone

COMMENTARYAs the digital landscape grows more treacherous, companies are finally beginning to treat cybersecurity as a top operational risk. And for enterprises revising their...

Rebalancing NIST: Why ‘Recovery’ Can’t Stand Alone

COMMENTARYAs the digital landscape grows more treacherous, companies are finally beginning to treat cybersecurity as a top operational risk. And for enterprises revising their...

Dangerous New ICS Malware Targets Orgs in Russia and Ukraine

Two dangerous malware tools targeted at industrial control systems (ICS) and operating technology (OT) environments in Europe are the latest manifestations of the cyber...

Preparing for Cyber Warfare: 6 Key Lessons From Ukraine

COMMENTARYAs the conflict in Ukraine enters its third year, the global community is confronted with the grim reality of modern warfare, where cyber operations...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?