Zephyrnet Logo

Tag: Dark reading

5 Hard Truths About the State of Cloud Security 2024

While cloud security has certainly come a long way since the wild west days of early cloud adoption, the truth is that there's a...

Top News

Sisense Password Breach Triggers ‘Ominous’ CISA Warning

While details are still emerging, the US federal government issued a password compromise warning to customers of business analytics platform Sisense and encouraged an...

Japan, Philippines, US to Share Cyber Threat Intel

The US, Japan, and the Philippines reportedly will join forces in cybersecurity defense with a strategic cyber threat-sharing arrangement in the wake of rising...

Panera Bread Fuels Ransomware Suspicions With Silence

Panera Bread customers and employees reported experiencing outages with the restaurant chain's ordering system, mobile apps, loyalty programs, and more on March 22.Although the...

XZ Utils Backdoor Implanted in Intricate Supply Chain Attack

A newly discovered backdoor in XZ Utils, a data compression utility present in nearly all Linux distributions, has revived the ghosts of previous major...

CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

AWS CISO: Pay Attention to How AI Uses Your Data

Enterprises are increasingly adopting generative AI to automate IT processes, detect security threats, and take over front-line customer service functions. An IBM survey in...

NHS Breach, HSE Bug Expose Healthcare Data in the British Isles

This week, a division of the National Health Service (NHS) Scotland was struck by a cyberattack, potentially disrupting services and exposing patient and employee...

Patch Now: Kubernetes RCE Flaw Allows Full Takeover of Windows Nodes

A security bug in the widely used Kubernetes container-management system allows attackers to remotely execute code with System privileges on Windows endpoints, potentially leading...

Over 100 Malicious Code-Execution Models on Hugging Face

Researchers have unearthed over 100 malicious machine learning (ML) models on the Hugging Face AI platform that can enable attackers to inject malicious code...

CISO Corner: Operationalizing NIST CSF 2.0; AI Models Run Amok

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

CISO Corner: CIO Convergence, 10 Critical Security Metrics, & Ivanti Fallout

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Russian APT Turla Wields Novel Backdoor Malware Against Polish NGOs

Russia-sponsored advanced persistent threat group (APT) Turla is now targeting Polish NGOs in a cyberespionage campaign that uses a freshly developed backdoor with modular...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?