Tag: incident response
Preparing for Cyber Warfare: 6 Key Lessons From Ukraine
COMMENTARYAs the conflict in Ukraine enters its third year, the global community is confronted with the grim reality of modern warfare, where cyber operations...
3 Steps Executives and Boards Should Take to Ensure Cyber Readiness
COMMENTARYThe new Securities and Exchange Commission (SEC) rules on cybersecurity risk management, strategy, governance, and incident disclosure recently went into effect, and organizational approaches to cybersecurity...
LockBit 3.0 Variant Generates Custom, Self-Propagating Malware
The LockBit ransomware-as-a-service (RaaS) group has struck another victim, this time using stolen credentials to launch a sophisticated attack against an unidentified organization in...
CISA’s Malware Analysis Platform Could Foster Better Threat Intel
The US Cybersecurity and Infrastructure Security Agency (CISA) has given organizations a new resource for analyzing suspicious and potentially malicious files, URLs, and IP...
Sisense Password Breach Triggers ‘Ominous’ CISA Warning
While details are still emerging, the US federal government issued a password compromise warning to customers of business analytics platform Sisense and encouraged an...
Top MITRE ATT&CK Techniques and How to Defend Against Them
Of the hundreds of documented MITRE ATT&CK techniques, two dominate the field: command and scripting interpreters (T1059) and phishing (T1566).In a report published on...
Top MITRE ATT&CK Techniques and How to Defend Against Them
Of the hundreds of documented MITRE ATT&CK techniques, two dominate the field: command and scripting interpreters (T1059) and phishing (T1566).In a report published on...
LockBit Ransomware Takedown Strikes Deep Into Brand’s Viability
Despite the LockBit ransomware-as-a-service (RaaS) gang claiming to be back after a high-profile takedown in mid-February, an analysis reveals significant, ongoing disruption to the...
Cyber Threats Intensify in Middle East During Ramadan
The holy month of Ramadan is a period where Middle East-based companies step up cybersecurity with extra vigilance and outsourced support amid shortened working...
CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...
Geopolitical Conflicts: 5 Ways to Cushion the Blow
COMMENTARYIn recent years, the global stage has become increasingly unstable, requiring organizations and security leaders to be hyper vigilant and prepared for turbulent times....