www.darkreading.com Open in urlscan Pro
2606:4700::6810:e0ab  Public Scan

URL: https://www.darkreading.com/
Submission Tags: falconsandbox
Submission: On May 07 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Dark Reading is part of the Informa Tech Division of Informa PLC
Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT
This site is operated by a business or businesses owned by Informa PLC and all
copyright resides with them. Informa PLC's registered office is 5 Howick Place,
London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726.

Black Hat NewsOmdia Cybersecurity

Newsletter Sign-Up

Newsletter Sign-Up

Cybersecurity Topics

RELATED TOPICS

 * Application Security
 * Cybersecurity Careers
 * Cloud Security
 * Cyber Risk
 * Cyberattacks & Data Breaches
 * Cybersecurity Analytics
 * Cybersecurity Operations
 * Data Privacy
 * Endpoint Security
 * ICS/OT Security

 * Identity & Access Mgmt Security
 * Insider Threats
 * IoT
 * Mobile Security
 * Perimeter
 * Physical Security
 * Remote Workforce
 * Threat Intelligence
 * Vulnerabilities & Threats


World

RELATED TOPICS

 * DR Global

 * Middle East & Africa

See All
The Edge
DR Technology
Events

RELATED TOPICS

 * Upcoming Events

 * Webinars

SEE ALL
Resources

RELATED TOPICS

 * Library
 * Newsletters
 * Reports
 * Videos
 * Webinars
 * Whitepapers

 * 
 * 
 * 
 * 
 * Partner Perspectives:
 * > Microsoft

SEE ALL




MIDEAST & AFRICA NEWS


'DUNEQUIXOTE' SHOWS STEALTH CYBERATTACK METHODS ARE EVOLVING. CAN DEFENDERS KEEP
UP?

May 2, 2024


NEW RESEARCH SUGGESTS AFRICA IS BEING USED AS A 'TESTING GROUND' FOR NATION
STATE CYBER WARFARE

Apr 26, 2024


PCI LAUNCHES PAYMENT CARD CYBERSECURITY EFFORT IN THE MIDDLE EAST

Apr 26, 2024


LICENSED TO BILL? NATIONS MANDATE CERTIFICATION & LICENSURE OF CYBERSECURITY
PROS

Apr 23, 2024
More Mideast & Africa News
A green spider lurking on a leaf
Application Security


CRITICAL GITLAB BUG UNDER EXPLOIT ENABLES ACCOUNT TAKEOVER, CISA WARNS


CRITICAL GITLAB BUG UNDER EXPLOIT ENABLES ACCOUNT TAKEOVER, CISA WARNS

Patch now: Cyberattackers are exploiting CVE-2023-7028 (CVSS 10) to take over
and lock users out of GitLab accounts, steal source code, and more.

May 3, 2024
|
3 Min Read
The Voyager spacecraft in deep space
ICS/OT Security
GAO: NASA Faces 'Inconsistent' Cybersecurity Across Spacecraft
GAO: NASA Faces 'Inconsistent' Cybersecurity Across Spacecraft

May 3, 2024

A hooded figure in front of the Ukraine flag
Cybersecurity Operations
REvil Affiliate Off to Jail for Multimillion-Dollar Ransomware Scheme
REvil Affiliate Off to Jail for Multimillion-Dollar Ransomware Scheme

May 3, 2024


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.

Subscribe

Latest News

Cyber Risk
Citrix Addresses High-Severity Flaw in NetScaler ADC and Gateway
Citrix Addresses High-Severity Flaw in NetScaler ADC and Gateway
May 7, 2024
|
3 Min Read
byJai Vijayan, Contributing Writer
Cyber Risk
Supply Chain Breaches Up 68% Year Over Year, According to DBIR
DBIR: Supply Chain Breaches Up 68% YoY (Depending on your Definition)
May 6, 2024
|
2 Min Read
byNate Nelson, Contributing Writer

Application Security
LLMs & Malicious Code Injections: 'We Have to Assume It's Coming'
LLMs & Malicious Code Injections: 'We Have to Assume It's Coming'
May 6, 2024
|
2 Min Read
byJeffrey Schwartz, Contributing Writer
Cybersecurity Operations
AT&T Splits Cybersecurity Services Business, Launches LevelBlue
AT&T Splits Cybersecurity Services Business, Launches LevelBlue
May 6, 2024
|
4 Min Read
byRobert Lemos, Contributing Writer
Identity & Access Management Security
Anetac Targets Service Account Security
Anetac Targets Service Account Security
May 6, 2024
|
2 Min Read
byDark Reading Staff
Cybersecurity Operations
Amnesty International Cites Indonesia as a Spyware Hub
Amnesty International Cites Indonesia as a Spyware Hub
May 6, 2024
|
1 Min Read
byDark Reading Staff
Vulnerabilities & Threats
CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs
CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs
May 3, 2024
|
7 Min Read
byTara Seals, Managing Editor, News, Dark Reading

Vulnerabilities & Threats
Paris Olympics Cybersecurity at Risk via Attack Surface Gaps
Paris Olympics Cybersecurity at Risk via Attack Surface Gaps
May 3, 2024
|
5 Min Read
byJai Vijayan, Contributing Writer
ICS/OT Security
GAO: NASA Faces 'Inconsistent' Cybersecurity Across Spacecraft
GAO: NASA Faces 'Inconsistent' Cybersecurity Across Spacecraft
May 3, 2024
|
3 Min Read
byNate Nelson, Contributing Writer
Cybersecurity Operations
REvil Affiliate Off to Jail for Multimillion-Dollar Ransomware Scheme
REvil Affiliate Off to Jail for Multimillion-Dollar Ransomware Scheme
May 3, 2024
|
1 Min Read
byDark Reading Staff
More News

Latest Commentary

Picture of Tara Lemieux
Tara Lemieux

CMMC Consultant, Redspin

Vulnerabilities & Threats
The Psychological Underpinnings of Modern Hacking Techniques
May 6, 2024
|
4 Min Read
Picture of Michael Marcotte
Michael Marcotte

Founder & CEO, artius.iD

Vulnerabilities & Threats
Innovation, Not Regulation, Will Protect Corporations From Deepfakes
May 3, 2024
|
4 Min Read

Picture of Nitin Uttreja
Nitin Uttreja

Global Director, Cybersecurity Architecture and Engineering, Estee Lauder
Companies

Endpoint Security
Safeguarding Your Mobile Workforce
May 2, 2024
|
4 Min Read

Picture of Craig Davies
Craig Davies

CISO, Gathid

Cyber Risk
The Cybersecurity Checklist That Could Save Your M&A Deal
May 1, 2024
|
4 Min Read
Picture of Liat Hayun
Liat Hayun

Co-Founder & CEO, Eureka Security

Cyberattacks & Data Breaches
The 6 Data Security Sessions You Shouldn't Miss at RSAC 2024
Apr 30, 2024
|
3 Min Read
Picture of Steve Soukup
Steve Soukup

CEO, DefenseStorm

Cyber Risk
Addressing Risk Caused by Innovation
Apr 29, 2024
|
4 Min Read
More Commentary



DEEP READING

See More Dark Reading Research
A chart showing all the fallout from a future data breach
Remote Workforce
Enterprises Worry End Users Will Be the Cause of Next Major Breach
Enterprises Worry End Users Will Be the Cause of Next Major Breach

Feb 16, 2024

cover of the report on securing cloud-native applications.
Сloud Security
Time to Secure Cloud-Native Apps Is Now
Time to Secure Cloud-Native Apps Is Now

Jan 23, 2024


Bar chart from Dark Reading's Incident Response survey
Cybersecurity Operations
Effective Incident Response Relies on Internal and External Partnerships
Effective Incident Response Relies on Internal and External Partnerships

Jan 17, 2024

Chat showing all the ways organizations plan to use generative AI tools
Сloud Security
GenAI Tools Will Permeate All Areas of the Enterprise
GenAI Tools Will Permeate All Areas of the Enterprise

Dec 22, 2023



Name That Edge Toon: Puppet Master

Feeling creative? Submit your caption and our panel of experts will reward the
winner with a $25 Amazon gift card.

Facebook at 20: Contemplating the Cost of Privacy

As the social media giant celebrates its two-decade anniversary, privacy experts
reflect on how it changed the way the world shares information.

Intel Harnesses Hackathons to Tackle Hardware Vulnerabilities

The semiconductor manufacturing giant's security team describes how hardware
hackathons, such as Hack@DAC, have helped chip security by finding and sharing
hardware vulnerabilities.

Cybersecurity Features In-Depth: On security strategy, latest trends, and people
to know. Brought to you by Mandiant.

Go to The Edge

Security Technology: Featuring news, news analysis, and commentary on the latest
technology trends.

Go to DR Technology
AT&T Splits Cybersecurity Services Business, Launches LevelBlue

The new company will focus on cybersecurity services as a top 10 managed
security service provider, but must expand outside the low-margin management of
security into detection and response.

Microsoft Previews Feature to Block Malicious OAuth Apps

Microsoft is previewing new AI and machine learning capabilities in Defender XDR
that will help detect and block malicious OAuth applications.

Anetac Targets Service Account Security

The startup's new identity and access management platform uncovers poorly
monitored service accounts and secures them from abuse.


Amnesty International Cites Indonesia as a Spyware Hub

The growing amount of surveillance technology being deployed in the country is
concerning due to Indonesia's increasing blows to citizens' civil rights.

'DuneQuixote' Shows Stealth Cyberattack Methods Are Evolving. Can Defenders Keep
Up?

A recent campaign targeting Middle Eastern government organizations plays
standard detection tools like a fiddle. With cyberattackers getting more
creative, defenders must start keeping pace.

Qantas Customers' Boarding Passes Exposed in Flight App Mishap

Some customers found that they had the ability to cancel a stranger's flight to
another country after opening the app, which was showing other individuals'
flight details.

Breaking cybersecurity news, news analysis, commentary, and other content from
around the world.

Go to DR Global


PARTNER PERSPECTIVES

More Partner Perspectives
blue team against red team representing concept of red teaming using foosball
table
Vulnerabilities & Threats
How to Red Team GenAI: Challenges, Best Practices, and Learnings
How to Red Team GenAI: Challenges, Best Practices, and Learnings

Apr 29, 2024

Five Darts Hit Bulls-Eye on Dart Board Competition. 4 darts are blue and one
dart is red.
Threat Intelligence
5 Attack Trends Organizations of All Sizes Should Be Monitoring
5 Attack Trends Organizations of All Sizes Should Be Monitoring

Apr 25, 2024

Blue cloud with yellow closed padlock on technology background
Сloud Security
Why a Native-First Approach Is Key to Cloud Security
Why a Native-First Approach Is Key to Cloud Security

Apr 17, 2024

Image of blue security lock layered over a fluffy white cloud.
Сloud Security
Reconsider Your CNAPP Strategy Using These 5 Scenarios
Reconsider Your CNAPP Strategy Using These 5 Scenarios

Apr 5, 2024

Iranian and Israeli flags, side by side
Threat Intelligence
Iran's Evolving Cyber-Enabled Influence Operations to Support Hamas
Iran's Evolving Cyber-Enabled Influence Operations to Support Hamas

Mar 29, 2024

Robot with red eyes meant to convey that AI is a threat.
Cyberattacks & Data Breaches
Threat Report: Examining the Use of AI in Attack Techniques
Threat Report: Examining the Use of AI in Attack Techniques

Mar 27, 2024


PRESS RELEASES

See all
PR Logo
Cybersecurity Operations
AttackIQ Partners With Cyber Poverty Line Institute to Provide Academy Courses
to Underserved CommunitiesAttackIQ Partners With Cyber Poverty Line Institute to
Provide Academy Courses to Underserved Communities
May 6, 2024
2 Min Read
PR Logo
Сloud Security
BigID Launches Industry-First Hybrid Scanning for Cloud Native WorkloadsBigID
Launches Industry-First Hybrid Scanning for Cloud Native Workloads
May 6, 2024
2 Min Read
PR Logo
Vulnerabilities & Threats
Introducing the NetBeacon Institute: Empowering a Safer WebIntroducing the
NetBeacon Institute: Empowering a Safer Web
May 6, 2024
4 Min Read
PR Logo
Vulnerabilities & Threats
AXA XL Introduces Endorsement to Help Public Companies Address SEC Cyber
Reporting CostsAXA XL Introduces Endorsement to Help Public Companies Address
SEC Cyber Reporting Costs
May 6, 2024
2 Min Read

Resources
White Papers

 * Shining a light in the dark: observability and security, a SANS profile

 * Elastic named a Leader in The Forrester Wave™: Security Analytics Platforms,
   Q4 2022

 * Application Security's New Mandate in a DevOps World

 * How Enterprises Secure Their Applications

 * Understanding Today's Threat Actors

More Whitepapers
Events

 * Black Hat USA - August 3-8 - Learn More
   
   August 3, 2024

 * Cybersecurity's Hottest New Technologies: What You Need To Know
   
   March 21, 2024

More Events
Webinars

 * Key Findings from the State of AppSec Report 2024
   
   May 7, 2024

 * Is AI Identifying Threats to Your Network?
   
   May 14, 2024

 * Where and Why Threat Intelligence Makes Sense for Your Enterprise Security
   Strategy
   
   May 15, 2024

 * Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
   
   May 16, 2024

 * Why Effective Asset Management is Critical to Enterprise Cybersecurity
   
   May 21, 2024

More Webinars

DISCOVER MORE WITH INFORMA TECH

Black HatOmdia

WORKING WITH US

About UsAdvertiseReprints

JOIN US


Newsletter Sign-Up

FOLLOW US



Copyright © 2024 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

Home|Cookie Policy|Privacy|Terms of Use

Cookies Button


ABOUT COOKIES ON THIS SITE

We and our partners use cookies to enhance your website experience, learn how
our site is used, offer personalised features, measure the effectiveness of our
services, and tailor content and ads to your interests while you navigate on the
web or interact with us across devices. You can choose to accept all of these
cookies or only essential cookies. To learn more or manage your preferences,
click “Settings”. For further information about the data we collect from you,
please see our Privacy Policy

Accept All
Settings



COOKIE PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


BACK



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * 
   
   View Cookies
   
    * Name
      cookie name

Confirm My Choices