www.darkreading.com Open in urlscan Pro
2606:4700::6810:deab  Public Scan

URL: https://www.darkreading.com/
Submission: On May 15 via api from IE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Dark Reading is part of the Informa Tech Division of Informa PLC
Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT
This site is operated by a business or businesses owned by Informa PLC and all
copyright resides with them. Informa PLC's registered office is 5 Howick Place,
London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726.

Black Hat NewsOmdia Cybersecurity

Newsletter Sign-Up

Newsletter Sign-Up

Cybersecurity Topics

RELATED TOPICS

 * Application Security
 * Cybersecurity Careers
 * Cloud Security
 * Cyber Risk
 * Cyberattacks & Data Breaches
 * Cybersecurity Analytics
 * Cybersecurity Operations
 * Data Privacy
 * Endpoint Security
 * ICS/OT Security

 * Identity & Access Mgmt Security
 * Insider Threats
 * IoT
 * Mobile Security
 * Perimeter
 * Physical Security
 * Remote Workforce
 * Threat Intelligence
 * Vulnerabilities & Threats


World

RELATED TOPICS

 * DR Global

 * Middle East & Africa

See All
The Edge
DR Technology
Events

RELATED TOPICS

 * Upcoming Events
 * Podcasts

 * Webinars

SEE ALL
Resources

RELATED TOPICS

 * Library
 * Newsletters
 * Podcasts
 * Reports
 * Videos
 * Webinars
 * Whitepapers

 * 
 * 
 * 
 * 
 * Partner Perspectives:
 * > Microsoft

SEE ALL




MIDEAST & AFRICA NEWS


'THE MASK' ESPIONAGE GROUP RESURFACES AFTER 10-YEAR HIATUS

May 9, 2024


3-YEAR IRANIAN INFLUENCE OP PREYS ON DIVIDES IN ISRAELI SOCIETY

May 8, 2024


'DUNEQUIXOTE' SHOWS STEALTH CYBERATTACK METHODS ARE EVOLVING. CAN DEFENDERS KEEP
UP?

May 2, 2024


NEW RESEARCH SUGGESTS AFRICA IS BEING USED AS A 'TESTING GROUND' FOR NATION
STATE CYBER WARFARE

Apr 26, 2024
More Mideast & Africa News
The letters "DNS" within a jagged circle in the center of various technology
icons with a blurred finger pointing to it
Cyberattacks & Data Breaches


DNS TUNNELING ABUSE EXPANDS TO TRACKING & SCANNING VICTIMS


DNS TUNNELING ABUSE EXPANDS TO TRACKING & SCANNING VICTIMS

Several campaigns are leveraging the evasive tactic to provide useful insights
into victims' online activities and find new ways to compromise organizations.

May 14, 2024
|
4 Min Read
Black noodles with tomatoes on top
Cyberattacks & Data Breaches
500 Victims In, Black Basta Reinvents With Novel Vishing Strategy
500 Victims In, Black Basta Reinvents With Novel Vishing Strategy

May 13, 2024

Vulnerabilities & Threats
Heartbleed: When Is It Good to Name a Vulnerability?
Heartbleed: When Is It Good to Name a Vulnerability?

May 14, 2024


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.

Subscribe
Cyber Risk

PODCAST


DARK READING CONFIDENTIAL: THE CISO AND THE SEC

Episode 1 of Dark Reading Confidential brings Frederick “Flee” Lee, CISO of
Reddit, Beth Burgin Waller, a practicing cyber attorney who represents many
CISOs, and Ben Lee, Chief Legal Officer of Reddit, to the table.

LISTEN TO THE EPISODE


Latest News

Cyber Risk
Singapore Cybersecurity Update Puts Cloud Providers on Notice
Singapore Cybersecurity Update Puts Cloud Providers on Notice
May 15, 2024
|
4 Min Read
byRobert Lemos, Contributing Writer
Vulnerabilities & Threats
Microsoft Windows DWM Zero-Day Poised for Mass Exploit
Microsoft Windows DWM Zero-Day Poised for Mass Exploit
May 14, 2024
|
6 Min Read
byTara Seals, Managing Editor, News, Dark Reading

Identity & Access Management Security
Unprotected Session Tokens Can Undermine FIDO2 Security
Unprotected Session Tokens Can Undermine FIDO2 Security
May 14, 2024
|
5 Min Read
byJai Vijayan, Contributing Writer
Threat Intelligence
As the FBI Closes In, Scattered Spider Attacks Finance, Insurance Orgs
As the FBI Closes In, Scattered Spider Attacks Finance, Insurance Orgs
May 14, 2024
|
4 Min Read
byNate Nelson, Contributing Writer
Vulnerabilities & Threats
Dangerous Google Chrome Zero-Day Allows Sandbox Escape
Dangerous Google Chrome Zero-Day Allows Sandbox Escape
May 14, 2024
|
4 Min Read
byTara Seals, Managing Editor, News, Dark Reading
Cyberattacks & Data Breaches
DNS Tunneling Abuse Expands to Tracking & Scanning Victims
DNS Tunneling Abuse Expands to Tracking & Scanning Victims
May 14, 2024
|
4 Min Read
byElizabeth Montalbano, Contributing Writer
Cyberattacks & Data Breaches
500 Victims In, Black Basta Reinvents With Novel Vishing Strategy
500 Victims In, Black Basta Reinvents With Novel Vishing Strategy
May 13, 2024
|
4 Min Read
byNate Nelson, Contributing Writer

Cyberattacks & Data Breaches
Ukrainian, Latvian TV Hijacked to Broadcast Russian Celebrations
Ukrainian, Latvian TV Hijacked to Broadcast Russian Celebrations
May 13, 2024
|
1 Min Read
byDark Reading Staff
Cyberattacks & Data Breaches
IntelBroker Nabs Europol Info; Agency Investigating
IntelBroker Nabs Europol Info; Agency Investigating
May 13, 2024
|
2 Min Read
byTara Seals, Managing Editor, News, Dark Reading
ICS/OT Security
Millions of IoT Devices at Risk From Flaws in Integrated Cellular Modem
Millions of IoT Devices at Risk From Integrated Cellular Modem Flaws
May 10, 2024
|
4 Min Read
byJai Vijayan, Contributing Writer
More News

Latest Commentary

Picture of Rex Booth
Rex Booth

Chief Information Security Officer, SailPoint

Cybersecurity Operations
There Is No Cyber Labor Shortage
May 14, 2024
|
5 Min Read
Picture of John A. Smith
John A. Smith

Founder & Chief Security Officer, Conversant Group

Cyberattacks & Data Breaches
Why Tokens Are Like Gold for Opportunistic Threat Actors
May 13, 2024
|
4 Min Read

Picture of Jackson Shaw
Jackson Shaw

Chief Security Officer, Clear Skye

Cyberattacks & Data Breaches
You've Been Breached: What Now?
May 10, 2024
|
4 Min Read

Picture of Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
Cyber Risk
Dark Reading 'Drops' Its First Podcast
May 10, 2024
|
2 Min Read
Picture of Jeff Strane
Jeff Strane

Sr. Director of Government and Education Affairs, SHI

Cyberattacks & Data Breaches
How Government Agencies Can Leverage Grants to Shore Up Cybersecurity
May 9, 2024
|
4 Min Read
Picture of Lea Kissner
Lea Kissner

CISO, Lacework

Cybersecurity Operations
Security Teams & SREs Want the Same Thing: Let's Make It Happen
May 8, 2024
|
5 Min Read
More Commentary

Heartbleed: When Is It Good to Name a Vulnerability?

Ten years have passed since Heartbleed was first identified, but the security
industry is still grappling with the question of branded vulnerabilities and
naming vulnerabilities appropriately.

CISO as a CTO: When and Why It Makes Sense

Enterprises are increasingly recognizing that a CISO's skills and experience
building risk-based cyber programs translate well to other C-suite positions.

Tech Companies Promise 'Secure by Design' Products

Over 60 companies have signed CISA's Secure by Design pledge to consider
security from the design phase and throughout the product life cycle.

Cybersecurity Features In-Depth: On security strategy, latest trends, and people
to know. Brought to you by Mandiant.

Go to The Edge

Security Technology: Featuring news, news analysis, and commentary on the latest
technology trends.

Go to DR Technology
Reality Defender Wins RSAC Innovation Sandbox Competition

In a field thick with cybersecurity startups showing off how they use AI and
LLMs, Reality Defender stood out for its tool for detecting and labeling
deepfakes and other artificial content.

Token Security Launches Machine-Centric IAM Platform

Instead of building a list of users and identifying which systems each user can
access, Token Security starts with a list of machines and determines who can
access each system.

Microsoft Previews Feature to Block Malicious OAuth Apps

Microsoft is previewing new AI and machine learning capabilities in Defender XDR
that will help detect and block malicious OAuth applications.


Singapore Cybersecurity Update Puts Cloud Providers on Notice

The nation amends its Cybersecurity Act, giving its primary cybersecurity agency
more power to regulate critical infrastructure and third parties, and requiring
cyber incidents be reported.

'The Mask' Espionage Group Resurfaces After 10-Year Hiatus

Researchers recently spotted the Spanish-speaking threat actor — with nearly 400
previous victims under its belt — in a new campaign in Latin America and Central
Africa.

3-Year Iranian Influence Op Preys on Divides in Israeli Society

Iran follows in Russia's disinformation footsteps but with a different, more
economical, and potentially higher-impact model.

Breaking cybersecurity news, news analysis, commentary, and other content from
around the world.

Go to DR Global


PARTNER PERSPECTIVES

More Partner Perspectives
blue team against red team representing concept of red teaming using foosball
table
Vulnerabilities & Threats
How to Red Team GenAI: Challenges, Best Practices, and Learnings
How to Red Team GenAI: Challenges, Best Practices, and Learnings

Apr 29, 2024

Five Darts Hit Bulls-Eye on Dart Board Competition. 4 darts are blue and one
dart is red.
Threat Intelligence
5 Attack Trends Organizations of All Sizes Should Be Monitoring
5 Attack Trends Organizations of All Sizes Should Be Monitoring

Apr 25, 2024

Blue cloud with yellow closed padlock on technology background
Сloud Security
Why a Native-First Approach Is Key to Cloud Security
Why a Native-First Approach Is Key to Cloud Security

Apr 17, 2024

Image of blue security lock layered over a fluffy white cloud.
Сloud Security
Reconsider Your CNAPP Strategy Using These 5 Scenarios
Reconsider Your CNAPP Strategy Using These 5 Scenarios

Apr 5, 2024

Iranian and Israeli flags, side by side
Threat Intelligence
Iran's Evolving Cyber-Enabled Influence Operations to Support Hamas
Iran's Evolving Cyber-Enabled Influence Operations to Support Hamas

Mar 29, 2024

Robot with red eyes meant to convey that AI is a threat.
Cyberattacks & Data Breaches
Threat Report: Examining the Use of AI in Attack Techniques
Threat Report: Examining the Use of AI in Attack Techniques

Mar 27, 2024


PRESS RELEASES

See all
PR Logo
Cyberattacks & Data Breaches
87% of DDoS Attacks Targeted Windows OS Devices in 202387% of DDoS Attacks
Targeted Windows OS Devices in 2023
May 9, 2024
4 Min Read
PR Logo
Сloud Security
CyberProof Announces Strategic Partnership With Google CloudCyberProof Announces
Strategic Partnership With Google Cloud
May 9, 2024
3 Min Read
PR Logo
Cybersecurity Operations
Cyolo Partners With Dragos to Unveil Holistic Secure Remote Access Solution for
Critical InfrastructureCyolo Partners With Dragos to Unveil Holistic Secure
Remote Access Solution for Critical Infrastructure
May 8, 2024
4 Min Read
PR Logo
Vulnerabilities & Threats
Netcraft Announces New AI-Powered Innovations to Disrupt and Expose Criminal
Financial InfrastructureNetcraft Announces New AI-Powered Innovations to Disrupt
and Expose Criminal Financial Infrastructure
May 8, 2024
3 Min Read

Resources
White Papers

 * Cisco Panoptica for Simplified Cloud-Native Application Security

 * A Short Primer on Container Scanning

 * ESG E-Book: Taking a Holistic Approach to Securing Cloud-Native Application
   Development

 * The Future of Cloud Security: Attack Paths & Graph-based Technology

 * Application Security's New Mandate in a DevOps World

More Whitepapers
Events

 * Black Hat USA - August 3-8 - Learn More
   
   August 3, 2024

 * Cybersecurity's Hottest New Technologies: What You Need To Know
   
   March 21, 2024

More Events
Webinars

 * Where and Why Threat Intelligence Makes Sense for Your Enterprise Security
   Strategy
   
   May 15, 2024

 * Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
   
   May 16, 2024

 * Why Effective Asset Management is Critical to Enterprise Cybersecurity
   
   May 21, 2024

 * Finding Your Way on the Path to Zero Trust
   
   May 22, 2024

 * Extending Access Management: Securing Access for all Identities, Devices, and
   Applications
   
   June 4, 2024

More Webinars

DISCOVER MORE WITH INFORMA TECH

Black HatOmdia

WORKING WITH US

About UsAdvertiseReprints

JOIN US


Newsletter Sign-Up

FOLLOW US



Copyright © 2024 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

Home|Cookie Policy|Privacy|Terms of Use

Cookies Button


ABOUT COOKIES ON THIS SITE

We and our partners use cookies to enhance your website experience, learn how
our site is used, offer personalised features, measure the effectiveness of our
services, and tailor content and ads to your interests while you navigate on the
web or interact with us across devices. You can choose to accept all of these
cookies or only essential cookies. To learn more or manage your preferences,
click “Settings”. For further information about the data we collect from you,
please see our Privacy Policy

Accept All
Settings



COOKIE PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


BACK



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * 
   
   View Cookies
   
    * Name
      cookie name

Confirm My Choices