Generative Data Intelligence

Tag: incident response

Preparing for Cyber Warfare: 6 Key Lessons From Ukraine

COMMENTARYAs the conflict in Ukraine enters its third year, the global community is confronted with the grim reality of modern warfare, where cyber operations...

3 Steps Executives and Boards Should Take to Ensure Cyber Readiness

COMMENTARYThe new Securities and Exchange Commission (SEC) rules on cybersecurity risk management, strategy, governance, and incident disclosure recently went into effect, and organizational approaches to cybersecurity...

LockBit 3.0 Variant Generates Custom, Self-Propagating Malware

The LockBit ransomware-as-a-service (RaaS) group has struck another victim, this time using stolen credentials to launch a sophisticated attack against an unidentified organization in...

CISA’s Malware Analysis Platform Could Foster Better Threat Intel

The US Cybersecurity and Infrastructure Security Agency (CISA) has given organizations a new resource for analyzing suspicious and potentially malicious files, URLs, and IP...

Sisense Password Breach Triggers ‘Ominous’ CISA Warning

While details are still emerging, the US federal government issued a password compromise warning to customers of business analytics platform Sisense and encouraged an...

Top MITRE ATT&CK Techniques and How to Defend Against Them

Of the hundreds of documented MITRE ATT&CK techniques, two dominate the field: command and scripting interpreters (T1059) and phishing (T1566).In a report published on...

Top MITRE ATT&CK Techniques and How to Defend Against Them

Of the hundreds of documented MITRE ATT&CK techniques, two dominate the field: command and scripting interpreters (T1059) and phishing (T1566).In a report published on...

LockBit Ransomware Takedown Strikes Deep Into Brand’s Viability

Despite the LockBit ransomware-as-a-service (RaaS) gang claiming to be back after a high-profile takedown in mid-February, an analysis reveals significant, ongoing disruption to the...

Cyber Threats Intensify in Middle East During Ramadan

The holy month of Ramadan is a period where Middle East-based companies step up cybersecurity with extra vigilance and outsourced support amid shortened working...

CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

Geopolitical Conflicts: 5 Ways to Cushion the Blow

COMMENTARYIn recent years, the global stage has become increasingly unstable, requiring organizations and security leaders to be hyper vigilant and prepared for turbulent times....

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?