Generative Data Intelligence

Tag: intrusion

How CISOs Balance Business Growth, Security in Cyber-Threat Landscape

COMMENTARYThe cyber-threat landscape is evolving at lightning speed with attacks growing more complex, obscure, and aimed at third-party suppliers. While highly recognizable brands remain...

In Act of Defiance, Helen Mirren Flaws AI Speech at Ceremony

In a daring act of resistance, Helen Mirren shredded an AI-generated speech at the American Cinematheque Awards that received thunderous applause. The acclaimed British actress,...

Google open sources file-identifying Magika AI model

Google has open sourced Magika, an in-house machine-learning-powered file identifier, as part of its AI Cyber Defense Initiative, which aims to give IT network...

Volt Typhoon Hits Multiple Electric Utilities, Expands Cyber Activity

The portion of China's Volt Typhoon advanced persistent threat (APT) that focuses on infiltrating operational technology (OT) networks in critical infrastructure has already performed...

EU Court Upholds Privacy in Encrypted Messaging Ruling

The European Court of Human Rights has upheld privacy and freedom of expression, rejecting backdoor demands in encrypted messaging services, highlighting potential security risks....

This NFT Platform Lost $290M in a 4-Day Exploit

PlayDapp, a South Korean blockchain-based game development platform and non-fungible token (NFT) marketplace, has lost over $290 million in crypto from an exploit lasting...

China’s Dogged Campaign to Portray Itself as Victim of US Hacking

For more than two years, China's government has been attempting to portray the US as indulging in the same kind of cyber espionage and...

China’s Dogged Campaign to Portray Itself as Victim of US Hacking

For more than two years, China's government has been attempting to portray the US as indulging in the same kind of cyber espionage and...

CISO Corner: DoD Regs, Neurodiverse Talent & Tel Aviv’s Light Rail

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Iran-Israel Cyber War Goes Global

Iran's cyber conflict with Israel has reached global proportions, with cyberattacks against businesses and government agencies on other continents causing arguably as much ruckus...

How Hospitals Can Help Improve Medical Device Data Security

COMMENTARYHospitals and medical device manufacturers must team up to help create a secure environment to protect the personal health information derived from patient monitors...

China Caught Dropping RAT Designed for FortiGate Devices

The Netherlands' Military Intelligence and Security Service (MIVD) is warning that it has uncovered a new malware strain, persistent and difficult to detect, being...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?