pr-10490-preview.darkreading.com
Open in
urlscan Pro
104.16.222.171
Public Scan
URL:
https://pr-10490-preview.darkreading.com/
Submission: On December 13 via api from US — Scanned from US
Submission: On December 13 via api from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
Dark Reading is part of the Informa TechTarget Division of Informa PLC Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726. Black Hat NewsOmdia CybersecurityAdvertise Newsletter Sign-Up Newsletter Sign-Up Cybersecurity Topics RELATED TOPICS * Application Security * Cybersecurity Careers * Cloud Security * Cyber Risk * Cyberattacks & Data Breaches * Cybersecurity Analytics * Cybersecurity Operations * Data Privacy * Endpoint Security * ICS/OT Security * Identity & Access Mgmt Security * Insider Threats * IoT * Mobile Security * Perimeter * Physical Security * Remote Workforce * Threat Intelligence * Vulnerabilities & Threats World RELATED TOPICS * DR Global * Middle East & Africa * Asia Pacific See All The Edge DR Technology Events RELATED TOPICS * Upcoming Events * Podcasts * Webinars SEE ALL Resources RELATED TOPICS * Library * Newsletters * Podcasts * Reports * Videos * Webinars * Whitepapers * * * * * Partner Perspectives SEE ALL CISO CORNER DARK READING CONFIDENTIAL: QUANTUM HAS LANDED, SO NOW WHAT? Nov 5, 2024 REACHABILITY ANALYSIS PARES DOWN STATIC SECURITY-TESTING OVERLOAD Sep 30, 2024 HOW SHOULD CISOS NAVIGATE THE SEC CYBERSECURITY AND DISCLOSURE RULES? Sep 27, 2024 DARK READING CONFIDENTIAL: PEN-TEST ARRESTS, 5 YEARS LATER Sep 10, 2024 More Articles for CISOs Three golden chickens in the grass Cyberattacks & Data Breaches CYBERATTACKERS USE HR TARGETS TO LAY MORE_EGGS BACKDOOR CYBERATTACKERS USE HR TARGETS TO LAY MORE_EGGS BACKDOOR The FIN6 group is the likely culprit behind a spear-phishing campaign that demonstrates a shift in tactics, from targeting job seekers to going after those who hire. Oct 1, 2024 | 4 Min Read Dubai UAE skyline with Burj Khalifa at dusk Cyberattacks & Data Breaches UAE, Saudi Arabia Become Plum Cyberattack Targets UAE, Saudi Arabia Become Plum Cyberattack Targets Sep 30, 2024 A stylized crystal-looking judge's gavel with the letters AI standing behind it Application Security Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players Sep 30, 2024 Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe Vulnerabilities & Threats PODCAST DARK READING CONFIDENTIAL: PEN-TEST ARRESTS, 5 YEARS LATER Episode 3: On Sept. 11, 2019, two cybersecurity professionals, Gary De Mercurio and Justin Wynn, were arrested in Dallas County, Iowa, and forced to spend the night in jail — just for doing their jobs. Despite the criminal charges against them eventually being dropped, the saga that night five years ago continues to haunt De Mercurio and Wynn personally and professionally. In this episode, the pair and Coalfire CEO Tom McAndrew share how the arrest and fallout has shaped their lives and careers as well as how it has transformed physical penetration tests for the cybersecurity industry as a whole. LISTEN TO THE EPISODE Latest News Endpoint Security AI 'Nude Photo Generator' Delivers Infostealers Instead of Images AI 'Nude Photo Generator' Delivers Infostealers Instead of Images Oct 3, 2024 | 4 Min Read byElizabeth Montalbano, Contributing Writer Cyberattacks & Data Breaches Cyberattackers Use HR Targets to Lay More_Eggs Backdoor Cyberattackers Use HR Targets to Lay More_Eggs Backdoor Oct 1, 2024 | 4 Min Read byElizabeth Montalbano, Contributing Writer Cyberattacks & Data Breaches UAE, Saudi Arabia Become Plum Cyberattack Targets UAE, Saudi Arabia Become Plum Cyberattack Targets Oct 1, 2024 | 4 Min Read byRobert Lemos, Contributing Writer Application Security Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players Sep 30, 2024 | 5 Min Read byJai Vijayan, Contributing Writer Cyber Risk FERC Outlines Supply Chain Security Rules for Power Plants FERC Outlines Supply Chain Security Rules for Power Plants Sep 30, 2024 | 1 Min Read byEdge Editors, Dark Reading Application Security Congress Advances Bill to Add AI to National Vulnerability Database Congress Advances Bill to Add AI to NVD Sep 26, 2024 | 2 Min Read byJennifer Lawinski, Contributing Writer Application Security Moving DevOps Security Out of 'the Stone Age' Moving DevOps Security Out of 'the Stone Age' Sep 26, 2024 | 6 Min Read byRobert Lemos, Contributing Writer Cyberattacks & Data Breaches India Repatriates Citizens Duped Into Forced Cyber Fraud Labor in Cambodia India Repatriates Citizens Duped Into Cyber Fraud Labor in Cambodia Apr 1, 2024 | 1 Min Read byDark Reading Staff, Dark Reading Vulnerabilities & Threats Are You Affected by the Backdoor in XZ Utils? Are You Affected by the Backdoor in XZ Utils? Mar 29, 2024 | 2 Min Read byDark Reading Staff, Dark Reading Vulnerabilities & Threats Saudi Arabia, UAE Top List of APT-Targeted Nations in the Middle East Saudi Arabia, UAE Top List of APT-Targeted Nations in the Middle East Mar 28, 2024 | 4 Min Read byRobert Lemos, Contributing Writer More News Latest Commentary Picture of Rob Jenks Rob Jenks Senior Vice President, Corporate Strategy, Tanium Cyber Risk Why CISOs Need to Make Cyber Insurers Their Partners Dec 27, 2023 | 4 Min Read Picture of Kelly Jackson Higgins, Editor-in-Chief, Dark Reading Kelly Jackson Higgins, Editor-in-Chief, Dark Reading Cybersecurity Operations Dark Reading Debuts Fresh New Site Design Nov 28, 2023 | 2 Min Read Picture of Ayan Halder Ayan Halder Principal Product Manager, Arkose Labs Cyber Risk Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity Nov 27, 2023 | 4 Min Read Picture of Kevin Bocek Kevin Bocek VP Security Strategy & Threat Intelligence Cyber Risk 3 Ways to Stop Unauthorized Code From Running in Your Network Nov 22, 2023 | 3 Min Read Picture of Cathy Simms, Contributing Writer Cathy Simms, Contributing Writer Сloud Security The Persian Gulf's March to the Cloud Presents Global Opportunities Nov 22, 2023 | 3 Min Read Picture of Maxine Holt Maxine Holt Research Director, Omdia Cybersecurity Operations Omdia Analyst Summit 2023 Highlight: Why Digital Dependence Demands Digital Resilience Nov 21, 2023 | 2 Min View More Commentary STARTUP ALLEY Read More Startup Launches X and O on a chalkboard outlining a play. Cybersecurity Operations Enhancing Incident Response Playbooks With Machine Learning Enhancing Incident Response Playbooks With Machine Learning Feb 29, 2024 Endpoint Security Apple Beefs Up iMessage With Quantum-Resistant Encryption Apple Beefs Up iMessage With Quantum-Resistant Encryption Feb 23, 2024 A white robot sitting and typing on a keyboard. Cybersecurity Operations Generative AI Takes on SIEM Generative AI Takes on SIEM Nov 22, 2023 FERC Outlines Supply Chain Security Rules for Power Plants The US Federal Energy Regulatory Commission spells out what electric utilities should do to protect their software supply chains, as well as their network "trust zones." How Should CISOs Navigate the SEC Cybersecurity and Disclosure Rules? Companies that commit to risk management have a strong cybersecurity foundation that makes it easier to comply with the SEC's rules. Here is what you need to know about 8K and 10K filings. Congress Advances Bill to Add AI to National Vulnerability Database The AI Incident Reporting and Security Enhancement Act would allow NIST to create a process for reporting and tracking vulnerabilities found in AI systems. Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant. Go to The Edge Security Technology: Featuring news, news analysis, and commentary on the latest technology trends. Go to DR Technology Reachability Analysis Pares Down Static Security-Testing Overload For development teams awash in vulnerability reports, reachability analysis can help tame the chaos and offer another path to prioritize exploitable issues. Moving DevOps Security Out of 'the Stone Age' Developers need to do more than scan code and vet software components, and ops should do more than just defend the deployment pipeline. Keep Tier-One Applications Out of Virtual Environments Crafty bad actors can infect all of an organization's virtual machines at once, rendering tier-one applications useless. UAE, Saudi Arabia Become Plum Cyberattack Targets Hacktivism-related DDoS attacks have risen 70% in the region, most often targeting the public sector, while stolen data and access offers dominate the Dark Web. India Repatriates Citizens Duped Into Forced Cyber Fraud Labor in Cambodia So far some 250 citizens have been rescued and returned to India after being lured to Cambodia in an phony employment scheme. UN Peace Operations Under Fire From State-Sponsored Hackers The international body isn't doing enough to protect details on dissidents and activists gathered by peacekeeping operations, particularly across Central Africa. Breaking cybersecurity news, news analysis, commentary, and other content from around the world. Go to DR Global PRESS RELEASES See all Press Release Logo Cybersecurity Operations Hack The Box Launches 5th Annual University CTF CompetitionHack The Box Launches 5th Annual University CTF Competition Nov 22, 2023 4 Min Read Press Release Logo Application Security Kiteworks' Maytech Acquisition Reaffirms Commitment to UK MarketKiteworks' Maytech Acquisition Reaffirms Commitment to UK Market Nov 22, 2023 3 Min Read thumbnail Application Security Lasso Security Emerges From Stealth With $6M Seed Funding for Gen AI and Advanced LLM CybersecurityLasso Security Emerges From Stealth With $6M Seed Funding for Gen AI and Advanced LLM Cybersecurity Nov 20, 2023 4 Min Read thumbnail ICS/OT Security VicOne and Block Harbor Deliver Integrated Workflow-Based Cybersecurity SystemVicOne and Block Harbor Deliver Integrated Workflow-Based Cybersecurity System Nov 17, 2023 3 Min Read PARTNER PERSPECTIVES More Partner Perspectives test Endpoint Security TEST - Mladen - date checking TEST - Mladen - date checking Feb 7, 2024 Сloud Security The Role of the CISO in Digital Transformation The Role of the CISO in Digital Transformation Nov 27, 2023 A person in a white collared shirt with a sober tie typing on a laptop while looking at body charts on tablet. Сloud Security What Healthcare Cybersecurity Leaders Should Know About the FDA's Section 524B Guidelines What Healthcare Cybersecurity Leaders Should Know About the FDA's Section 524B Guidelines Nov 20, 2023 A white cloud against a blue sky. The cloud contains 0s and 1s and a security lock. Сloud Security Combining Agentless and Agent-Based Cloud Security in CNAPPs Combining Agentless and Agent-Based Cloud Security in CNAPPs Nov 14, 2023 cloud against a ball background Сloud Security Considerations for Managing Digital Sovereignty: The Executive Perspective Considerations for Managing Digital Sovereignty: The Executive Perspective Nov 3, 2023 a padlock and documents displayed within a cloud. Сloud Security Doing It Together: Detection and Incident Response with Your Cloud Provider Doing It Together: Detection and Incident Response with Your Cloud Provider Nov 1, 2023 More Insights Webinars * The Current State of AI Adoption in Cybersecurity, Including its Opportunities Dec 12, 2024 * Cybersecurity Day: How to Automate Security Analytics with AI and ML Dec 17, 2024 * The Dirt on ROT Data Dec 18, 2024 More Webinars TEST resources date hidden Recently added - Date hidden * AI 'Nude Photo Generator' Delivers Infostealers Instead of Images * Cyberattackers Use HR Targets to Lay More_Eggs Backdoor * UAE, Saudi Arabia Become Plum Cyberattack Targets * Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players See all Webinars * The Current State of AI Adoption in Cybersecurity, Including its Opportunities * Cybersecurity Day: How to Automate Security Analytics with AI and ML * The Dirt on ROT Data More Webinars DISCOVER MORE WITH INFORMA TECH Black HatOmdia WORKING WITH US About UsAdvertiseReprints JOIN US Newsletter Sign-Up FOLLOW US Copyright © 2024 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. Home|Cookie Policy|Privacy|Terms of Use Cookies Button ABOUT COOKIES ON THIS SITE We and our partners use cookies to enhance your website experience, learn how our site is used, offer personalised features, measure the effectiveness of our services, and tailor content and ads to your interests while you navigate on the web or interact with us across devices. By clicking "Continue" or continuing to browse our site you are agreeing to our and our partners use of cookies. For more information seePrivacy Policy CONTINUE COOKIE POLICY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Always Active These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Always Active These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Always Active These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices