Generative Data Intelligence

Tag: threat actors

The Biggest 2024 Elections Threat: Kitchen-Sink Attack Chains

If history has anything to tell us, the most significant cyber threat to this year's elections won't be a leak, a distributed denial-of-service (DDoS)...

Cisco Zero-Days Anchor ‘ArcaneDoor’ Cyber Espionage Campaign

A state-sponsored threat actor has exploited two Cisco zero-day vulnerabilities in firewall devices to target the perimeter of government networks with two custom-built backdoors,...

SolarWinds 2024: Where Do Cyber Disclosures Go from Here?

COMMENTARYIn an earlier article, I covered what the Securities and Exchange Commission's (SEC) SolarWinds' indictments and four-day rule mean for DevSecOps. Today, let's ask a different...

Iran Dupes US Military Contractors, Gov’t Agencies in Cyber Campaign

An elite team of Iranian state-sponsored hackers successfully infiltrated hundreds of thousands of employee accounts at US companies and government agencies, according to the...

2023: A ‘Good’ Year for OT Cyberattacks

COMMENTARYWaterfall Security Solutions, in collaboration with ICS Strive, recently released its "2024 Threat Report." The bad news is that, in 2023, there were 68 cyberattacks that...

Patch Now: CrushFTP Zero-Day Cloud Exploit Targets US Orgs

Virtual file transfer system provider CrushFTP and various security researchers are sounding the alarm about a sandbox escape flaw in the CrushFTP server that...

ToddyCat APT Is Stealing Data on ‘Industrial Scale’

An advanced persistent threat (APT) group known as ToddyCat is collecting data on an industrial scale from government and defense targets in the Asia-Pacific...

Akira Ransomware: FBI and Europol Sound Alarm Over $42M Loss

Prominent global agencies have flagged a newly-emerged ransomware group named Akira, estimated to be just a year old, for its widespread cyber intrusions, breaching...

CISO Corner: Breaking Staff Burnout, GPT-4 Exploits, Rebalancing NIST

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Rethinking How You Work with Detection and Response Metrics

Sorting the false positives from the true positives: Ask any security operations center professional, and they'll tell you it's one of the most challenging...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?