www.darkreading.com Open in urlscan Pro
104.16.222.171  Public Scan

URL: https://www.darkreading.com/
Submission Tags: falconsandbox
Submission: On December 15 via api from US — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

Dark Reading is part of the Informa TechTarget Division of Informa PLC
Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT
This site is operated by a business or businesses owned by Informa PLC and all
copyright resides with them. Informa PLC's registered office is 5 Howick Place,
London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726.

Black Hat NewsOmdia CybersecurityAdvertise

Newsletter Sign-Up

Newsletter Sign-Up

Cybersecurity Topics

RELATED TOPICS

 * Application Security
 * Cybersecurity Careers
 * Cloud Security
 * Cyber Risk
 * Cyberattacks & Data Breaches
 * Cybersecurity Analytics
 * Cybersecurity Operations
 * Data Privacy
 * Endpoint Security
 * ICS/OT Security

 * Identity & Access Mgmt Security
 * Insider Threats
 * IoT
 * Mobile Security
 * Perimeter
 * Physical Security
 * Remote Workforce
 * Threat Intelligence
 * Vulnerabilities & Threats


World

RELATED TOPICS

 * DR Global
 * Middle East & Africa

 * Asia Pacific

See All
The Edge
DR Technology
Events

RELATED TOPICS

 * Upcoming Events
 * Podcasts

 * Webinars

SEE ALL
Resources

RELATED TOPICS

 * Library
 * Newsletters
 * Podcasts
 * Reports
 * Videos
 * Webinars

 * Whitepapers
 * 
 * 
 * 
 * 
 * Partner Perspectives

SEE ALL




CISO CORNER


CULTIVATING A HACKER MINDSET IN CYBERSECURITY DEFENSE

Dec 12, 2024


LESSONS FROM THE LARGEST SOFTWARE SUPPLY CHAIN INCIDENTS

Dec 10, 2024


LARGE-SCALE INCIDENTS & THE ART OF VULNERABILITY PRIORITIZATION

Dec 9, 2024


WHY SOC ROLES NEED TO EVOLVE TO ATTRACT A NEW GENERATION

Dec 6, 2024
More Articles for CISOs
A Coral AI USB accelerator
Vulnerabilities & Threats


WITH 'TPUXTRACT,' ATTACKERS CAN STEAL ORGS' AI MODELS


WITH 'TPUXTRACT,' ATTACKERS CAN STEAL ORGS' AI MODELS

A new side-channel attack method is a computationally practical way to infer the
structure of a convolutional neural network — meaning that cyberattackers or
rival companies can plagiarize AI models and take their data for themselves.

Dec 13, 2024
|
5 Min Read
Dubai downtown skyline at sunset, Dubai, United Arab Emirates, Burj Khalifa
Cyberattacks & Data Breaches
'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks
'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks

Dec 12, 2024

A Wi-Fi hotspot in a airport
ICS/OT Security
IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack
IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack

Dec 12, 2024


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.

Subscribe
Cyber Risk

PODCAST


DARK READING CONFIDENTIAL: QUANTUM HAS LANDED, SO NOW WHAT?

Episode #4: NIST's new post-quantum cryptography standards are here, so what
comes next? This episode of Dark Reading Confidential digs into the world of
quantum computing from a cybersecurity practitioner's point of view — with
guests Matthew McFadden, vice president, Cyber, General Dynamics Information
Technology (GDIT) and Thomas Scanlon, professor, Heinz College, Carnegie Mellon
University.

LISTEN TO THE EPISODE


Latest News

Application Security
Cleo MFT Zero-Day Exploits Are About Escalate, Analysts Warn
Cleo MFT Zero-Day Exploits Are About Escalate
Dec 13, 2024
|
3 Min Read
byBecky Bracken, Senior Editor, Dark Reading
Vulnerabilities & Threats
With 'TPUXtract,' Attackers Can Steal Orgs' AI Models
With 'TPUXtract,' Attackers Can Steal Orgs' AI Models
Dec 13, 2024
|
5 Min Read
byNate Nelson, Contributing Writer

Cyberattacks & Data Breaches
'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks
'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks
Dec 13, 2024
|
4 Min Read
byTara Seals, Managing Editor, News, Dark Reading
Cyber Risk
Lloyd's of London Launches New Cyber Insurance Consortium
Lloyd’s of London Launches New Cyber Insurance Consortium
Dec 12, 2024
|
1 Min Read
byJennifer Lawinski, Contributing Writer
Сloud Security
336K Prometheus Instances Exposed to DoS, 'Repojacking'
336K Prometheus Instances Exposed to DoS, 'Repojacking'
Dec 12, 2024
|
4 Min Read
byNate Nelson, Contributing Writer
Cyberattacks & Data Breaches
Chinese Cops Caught Using Android Spyware to Track Mobile Devices
Chinese Cops Caught Using Android Spyware to Track Mobile Devices
Dec 12, 2024
|
1 Min Read
byBecky Bracken, Senior Editor, Dark Reading
ICS/OT Security
IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack
IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack
Dec 12, 2024
|
3 Min Read
byBecky Bracken, Senior Editor, Dark Reading

Cyberattacks & Data Breaches
Europol Cracks Down on Holiday DDoS Attacks
Europol Cracks Down on Holiday DDoS Attacks
Dec 12, 2024
|
1 Min Read
byKristina Beek, Associate Editor, Dark Reading
Vulnerabilities & Threats
Efforts to Secure US Telcos Beset by Salt Typhoon Might Fall Flat
Efforts to Secure US Telcos Beset by Salt Typhoon Might Fall Flat
Dec 12, 2024
|
4 Min Read
byNate Nelson, Contributing Writer
Cyberattacks & Data Breaches
Chinese Hacker Pwns 81K Sophos Devices With Zero-Day Bug
Chinese Hacker Pwns 81K Sophos Devices With Zero-Day
Dec 11, 2024
|
1 Min Read
byKristina Beek, Associate Editor, Dark Reading
More News

Latest Commentary

Picture of Amichai Shulman
Amichai Shulman

CTO & Co-Founder, Nokod Security

Vulnerabilities & Threats
OData Injection Risk in Low-Code/No-Code Environments
Dec 13, 2024
|
4 Min Read
Picture of Roei Sherman
Roei Sherman

Field CTO, Mitiga

Cyberattacks & Data Breaches
Cultivating a Hacker Mindset in Cybersecurity Defense
Dec 12, 2024
|
5 Min Read

Picture of Pukar C. Hamal
Pukar C. Hamal

Founder & CEO, SecurityPal

Cyberattacks & Data Breaches
Tips for Preventing Breaches in 2025
Dec 11, 2024
|
4 Min Read

Picture of Eldan Ben-Haim
Eldan Ben-Haim

Chief Architect Officer, Apiiro

Vulnerabilities & Threats
Lessons From the Largest Software Supply Chain Incidents
Dec 10, 2024
|
5 Min Read
Picture of Audra Streetman
Audra Streetman

Senior Threat Intelligence Analyst, Splunk

Vulnerabilities & Threats
Large-Scale Incidents & the Art of Vulnerability Prioritization
Dec 9, 2024
|
4 Min Read
Picture of Jessica Belt
Jessica Belt

Solutions Engineer, Intezer

Cybersecurity Operations
Why SOC Roles Need to Evolve to Attract a New Generation
Dec 6, 2024
|
4 Min Read
More Commentary



STARTUP ALLEY

Read More Startup Launches
Scene of blue skiy with wispy clouds
Cybersecurity Operations
DeepTempo Launches AI-Based Security App for Snowflake
DeepTempo Launches AI-Based Security App for Snowflake

Nov 20, 2024

A keyboard with a red key marked RISK
Cyber Risk
RIIG Launches With Risk Intelligence Solutions
RIIG Launches With Risk Intelligence Solutions

Nov 20, 2024


a brass two-handled trophy against a red curtain in the background.
ICS/OT Security
Frenos Takes Home the Prize at 2024 DataTribe Challenge
Frenos Takes Home the Prize at 2024 DataTribe Challenge

Nov 14, 2024


Test Your Cyber Skills With the SANS Holiday Hack Challenge

Open to players of all skill levels, the "Snow-mageddon" cybersecurity
competition takes place in the world of Santa, elves, and Christmas mayhem.

Lloyd's of London Launches New Cyber Insurance Consortium

Under the program, HITRUST-certified organizations gain access to exclusive
coverage and rates.

Cybersecurity Lessons From 3 Public Breaches

High-profile security incidents provide examples of how common vulnerabilities
can be exploited. If you pay attention, you can learn from others' mistakes.

Cybersecurity Features In-Depth: On security strategy, latest trends, and people
to know. Brought to you by Mandiant.

Go to The Edge


Security Technology: Featuring news, news analysis, and commentary on the latest
technology trends.

Go to DR Technology
Generative AI Security Tools Go Open Source

Businesses deploying large language models and other GenAI systems have a
growing collection of open source tools for testing AI security.

Snowflake Rolls Out Mandatory MFA Plan

As part of the commitment to CISA's Secure by Design pledge, Snowflake will
begin blocking sign-ins using single-factor authentication next year.

Google Launches Open Source Patch Validation Tool

Vanir automates the process of scanning source code to identify missing security
patches.

'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks

A sophisticated social engineering cybercrime campaign bent on financial gain
was observed being run from Tencent servers in Singapore.

Governments, Telcos Ward Off China's Hacking Typhoons

Infiltrating other nations' telecom networks is a cornerstone of China's
geopolitical strategy, and it's having the unintended consequence of driving the
uptake of encrypted communications.

African Law Enforcement Nabs 1,000+ Cybercrime Suspects

Authorities across 19 African countries also dismantled their infrastructure and
networks, thanks to cooperation between global law enforcement and private
firms.

Breaking cybersecurity news, news analysis, commentary, and other content from
around the world.

Go to DR Global


PRESS RELEASES

See all
PR Logo
Сloud Security
Zerto Introduces Cloud Vault Solution for Enhanced Cyber Resilience Through
MSPsZerto Introduces Cloud Vault Solution for Enhanced Cyber Resilience Through
MSPs
Dec 13, 2024
4 Min Read
PR Logo
Endpoint Security
Versa Introduces Integrated Endpoint Data Loss Prevention in SASE SolutionVersa
Introduces Integrated Endpoint Data Loss Prevention in SASE Solution
Dec 13, 2024
2 Min Read
Press Release logo
Physical Security
Genetec Physical Security Report Shows Accelerating Hybrid Cloud AdoptionGenetec
Physical Security Report Shows Accelerating Hybrid Cloud Adoption
Dec 9, 2024
3 Min Read
PR Logo
Application Security
Compromised Software Code Poses New Systemic Risk to U.S. Critical
InfrastructureCompromised Software Code Poses New Systemic Risk to U.S. Critical
Infrastructure
Dec 5, 2024
2 Min Read

Resources
White Papers

 * The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

 * The Future of Cybersecurity is Passwordless and Keyless

 * The State of Vulnerability Management in the Enterprise

 * SecOps Checklist

 * How to Use Threat Intelligence to Mitigate Third-Party Risk

More Whitepapers
Webinars

 * Cybersecurity Day: How to Automate Security Analytics with AI and ML
   
   Dec 17, 2024

 * The Dirt on ROT Data
   
   Dec 18, 2024

 * Securing Your Cloud Data Across the Attack Timeline
   
   Jan 15, 2025

 * The Artificial Future Trend Micro Security Predictions for 2025
   
   Jan 16, 2025

More Webinars

DISCOVER MORE

Black HatOmdia

WORKING WITH US

About UsAdvertiseReprints

JOIN US


Newsletter Sign-Up

FOLLOW US



Copyright © 2024. This website is owned and operated by Informa TechTarget, part
of a global network that informs, influences and connects the world’s technology
buyers and sellers. All copyright resides with them. Informa PLC’s registered
office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales.
TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466.

Home|Cookie Policy|Privacy|Terms of Use