Tag: Segmentation
Dangerous New ICS Malware Targets Orgs in Russia and Ukraine
Two dangerous malware tools targeted at industrial control systems (ICS) and operating technology (OT) environments in Europe are the latest manifestations of the cyber...
Breaking News
EV Charging Stations Still Riddled With Cybersecurity Vulnerabilities
The increasing popularity of electric vehicles (EVs) isn't just a favorite for gas-conscious consumers, but also for cybercriminals who focus on using EV charging...
Solar Spider Targets Saudi Arabia Banks via New Malware
The sophisticated threat group behind a complex JavaScript remote access Trojan (RAT) known as JSOutProx has released a new version of the malware to...
Solar Spider Targets Saudi Arabia Banks via New Malware
The sophisticated threat group behind a complex JavaScript remote access Trojan (RAT) known as JSOutProx has released a new version of the malware to...
How Do We Integrate LLMs Security Into Application Development?
Question: What do we really know about large language model (LLM) security? And are we willingly opening the front door to chaos by using...
Nielsen Sports sees 75% cost reduction in video analysis with Amazon SageMaker multi-model endpoints | Amazon Web Services
This is a guest post co-written with Tamir Rubinsky and Aviad Aranias from Nielsen Sports.
Nielsen Sports...
2024 will be the Ethereum network’s biggest year in history
Chain development kits (CDKs) are expanding the universe of possibilities open to...
Russian APT Releases More Deadly Variant of AcidRain Wiper Malware
Researchers have uncovered a more dangerous and prolific version of the wiper malware used by Russian military intelligence to disrupt satellite broadband service in...
Feds Warn About Vulnerability of US Water Systems
A new White House advisory about threat groups from Iran and China targeting US water and wastewater systems has once again focused attention on...
Enable data sharing through federated learning: A policy approach for chief digital officers | Amazon Web Services
This is a guest blog post written by Nitin Kumar, a Lead Data Scientist at T and T Consulting Services, Inc.
...
Election cybersecurity: Protecting the ballot box and building trust in election integrity
Critical Infrastructure
What cyberthreats could wreak havoc on elections this year and how...
CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Each week, we'll offer articles...
NSA’s Zero-Trust Guidelines Focus on Segmentation
The US National Security Agency (NSA) delivered its guidelines for zero-trust network security this week, offering a more concrete roadmap towards zero-trust adoption. It's...