Generative Data Intelligence

Tag: Dark reading

5 Hard Truths About the State of Cloud Security 2024

While cloud security has certainly come a long way since the wild west days of early cloud adoption, the truth is that there's a...

Top News

LastPass Users Lose Master Passwords to Ultra-Convincing Scam

An ongoing, highly sophisticated phishing campaign may have led some LastPass users to give up their all-important master passwords to hackers.Password managers store all...

Rethinking How You Work with Detection and Response Metrics

Sorting the false positives from the true positives: Ask any security operations center professional, and they'll tell you it's one of the most challenging...

‘MagicDot’ Windows Weakness Allows Unprivileged Rootkit Activity

BLACK HAT ASIA – Singapore – A known issue associated with the DOS-to-NT path conversion process in Windows opens up significant risk for businesses...

‘MagicDot’ Windows Weakness Allows Unprivileged Rootkit Activity

BLACK HAT ASIA – Singapore – A known issue associated with the DOS-to-NT path conversion process in Windows opens up significant risk for businesses...

Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware

A creative exploit of Palo Alto Networks' extended detection and response (XDR) software could have allowed attackers to puppet it like a malicious multitool.In...

Cisco Warns of Massive Surge in Password Spraying Attacks on VPNs

Cisco Talos this week warned of a massive increase in brute-force attacks targeting VPN services, SSH services, and Web application authentication interfaces.In its advisory,...

Sneaky Shellcode: Windows Fibers Offer EDR-Proof Code Execution

Windows fibers, little-known components of Windows OS, represent a largely undocumented code-execution pathway that exists exclusively in user mode — and is therefore largely...

Delinea Fixes Flaw After Analyst Goes Public With Disclosure First

A critical flaw in Delinea's Secret Server SOAP API disclosed this week sent security teams racing to roll out a patch. But a researcher...

Name That Toon: Last Line of Defense

The enemies are always getting closer, using the same advanced technologies as security pros are employing to protect their networks. So perhaps it's time...

CISO Corner: AI Supply Chain; AI Security Platforms; Cyber Awareness

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

Sisense Password Breach Triggers ‘Ominous’ CISA Warning

While details are still emerging, the US federal government issued a password compromise warning to customers of business analytics platform Sisense and encouraged an...

DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse

This month, MITRE will be adding two sub-techniques to its ATT&CK database that have been widely exploited by North Korean threat actors.The first, not...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?