www.darkreading.com Open in urlscan Pro
2606:4700::6810:deab  Public Scan

Submitted URL: http://darkreading.com/
Effective URL: https://www.darkreading.com/
Submission: On October 10 via manual from CA — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

Dark Reading is part of the Informa Tech Division of Informa PLC
Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT
This site is operated by a business or businesses owned by Informa PLC and all
copyright resides with them. Informa PLC's registered office is 5 Howick Place,
London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726.

Black Hat NewsOmdia CybersecurityAdvertise

Newsletter Sign-Up

Newsletter Sign-Up

Cybersecurity Topics

RELATED TOPICS

 * Application Security
 * Cybersecurity Careers
 * Cloud Security
 * Cyber Risk
 * Cyberattacks & Data Breaches
 * Cybersecurity Analytics
 * Cybersecurity Operations
 * Data Privacy
 * Endpoint Security
 * ICS/OT Security

 * Identity & Access Mgmt Security
 * Insider Threats
 * IoT
 * Mobile Security
 * Perimeter
 * Physical Security
 * Remote Workforce
 * Threat Intelligence
 * Vulnerabilities & Threats


World

RELATED TOPICS

 * DR Global
 * Middle East & Africa

 * Asia Pacific

See All
The Edge
DR Technology
Events

RELATED TOPICS

 * Upcoming Events
 * Podcasts

 * Webinars

SEE ALL
Resources

RELATED TOPICS

 * Library
 * Newsletters
 * Podcasts
 * Reports
 * Videos
 * Webinars

 * Whitepapers
 * 
 * 
 * 
 * 
 * Partner Perspectives

SEE ALL




CISO CORNER


HEALTHCARE'S GRIM CYBER PROGNOSIS REQUIRES SECURITY BOOSTER

Oct 8, 2024


CISO PAYCHECKS: WORTH THE GROWING SECURITY HEADACHES?

Oct 7, 2024


NAVIGATING THE COMPLEXITIES & SECURITY RISKS OF MULTICLOUD MANAGEMENT

Oct 3, 2024


INFRASTRUCTURE VS. RUNTIME — WHERE ARE YOUR PRIORITIES?

Oct 1, 2024
More Articles for CISOs
thumbnail
Сloud Security


CLOUD, AI TALENT GAPS PLAGUE CYBERSECURITY TEAMS


CLOUD, AI TALENT GAPS PLAGUE CYBERSECURITY TEAMS

Cyber pros are scrambling to stay up-to-date as the businesses they work for
quickly roll out AI tools and keep expanding their cloud initiatives.

Oct 9, 2024
|
3 Min Read
A laptop on the table with software update progress bar on screen
Vulnerabilities & Threats
5 Zero-Days in Microsoft's October Update to Patch Immediately
5 Zero-Days in Microsoft's October Update to Patch Immediately

Oct 8, 2024

A cloud hologram projecting from a microchip
Cyberattacks & Data Breaches
3 More Ivanti Cloud Vulns Exploited in the Wild
3 More Ivanti Cloud Vulns Exploited in the Wild

Oct 9, 2024


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.

Subscribe
Vulnerabilities & Threats


PODCAST


DARK READING CONFIDENTIAL: PEN-TEST ARRESTS, 5 YEARS LATER

Episode 3: On Sept. 11, 2019, two cybersecurity professionals, Gary De Mercurio
and Justin Wynn, were arrested in Dallas County, Iowa, and forced to spend the
night in jail — just for doing their jobs. Despite the criminal charges against
them eventually being dropped, the saga that night five years ago continues to
haunt De Mercurio and Wynn personally and professionally. In this episode, the
pair and Coalfire CEO Tom McAndrew share how the arrest and fallout has shaped
their lives and careers as well as how it has transformed physical penetration
tests for the cybersecurity industry as a whole.

LISTEN TO THE EPISODE


Latest News

Threat Intelligence
AI-Powered Cybercrime Cartels on the Rise in Asia
AI-Powered Cybercrime Cartels on the Rise in Asia
Oct 10, 2024
|
4 Min Read
byNate Nelson, Contributing Writer
Vulnerabilities & Threats
Hackers Hide Remcos RAT in GitHub Repository Comments
Hackers Hide Remcos RAT in GitHub Repository Comments
Oct 9, 2024
|
4 Min Read
byJai Vijayan, Contributing Writer

Cybersecurity Operations
Australia Intros Its First National Cyber Legislation
Australia Intros Its First National Cyber Legislation
Oct 9, 2024
|
1 Min Read
byDark Reading Staff
Cyberattacks & Data Breaches
Mamba 2FA Cybercrime Kit Targets Microsoft 365 Users
Mamba 2FA Cybercrime Kit Targets Microsoft 365 Users
Oct 9, 2024
|
1 Min Read
byTara Seals, Managing Editor, News, Dark Reading
Cyberattacks & Data Breaches
3 More Ivanti Cloud Vulns Exploited in the Wild
3 More Ivanti Cloud Vulns Exploited in the Wild
Oct 9, 2024
|
1 Min Read
byDark Reading Staff
Сloud Security
Cloud, AI Talent Gaps Plague Cybersecurity Teams
Cloud, AI Talent Gaps Plague Cybersecurity Teams
Oct 9, 2024
|
3 Min Read
byKristina Beek, Associate Editor, Dark Reading
Cyberattacks & Data Breaches
Microsoft: Creative Abuse of Cloud Files Bolsters BEC Attacks
Microsoft: Creative Abuse of Cloud Files Bolsters BEC Attacks
Oct 9, 2024
|
5 Min Read
byElizabeth Montalbano, Contributing Writer

Cyberattacks & Data Breaches
Ex-Uber CISO Requests a New, 'Fair' Trial
Ex-Uber CISO Requests a New, 'Fair' Trial
Oct 8, 2024
|
2 Min Read
byKristina Beek, Associate Editor, Dark Reading
Vulnerabilities & Threats
5 Zero-Days in Microsoft's October Update to Patch Immediately
5 Zero-Days in Microsoft's October Update to Patch Immediately
Oct 8, 2024
|
4 Min Read
byJai Vijayan, Contributing Writer
Threat Intelligence
Healthcare's Grim Cyber Prognosis Requires Security Booster
Healthcare's Grim Cyber Prognosis Requires Security Booster
Oct 8, 2024
|
6 Min Read
byRobert Lemos, Contributing Writer
More News

Latest Commentary

Picture of Mark Logan
Mark Logan

CEO, One Identity

Vulnerabilities & Threats
Building Cyber Resilience in SMBs With Limited Resources
Oct 9, 2024
|
6 Min Read
Picture of Chris Betz
Chris Betz

Chief Information Security Officer, AWS

Vulnerabilities & Threats
How Major Companies Are Honoring Cybersecurity Awareness Month
Oct 8, 2024
|
9 Min Read

Picture of Ken Frantz
Ken Frantz

Managing Director, BPM

Cyberattacks & Data Breaches
Your IT Systems Are Being Attacked. Are You Prepared?
Oct 8, 2024
|
5 Min Read

Picture of Jason Healey
Jason Healey

Senior Research Scholar, Columbia University School of International and Public
Affairs

Vulnerabilities & Threats
What the White House Should Do Next for Cyber Regulation
Oct 7, 2024
|
5 Min Read
Picture of Akhil Mittal
Akhil Mittal

Senior Manager, Black Duck Software

Cybersecurity Operations
Cybersecurity Is Serious — but It Doesn't Have to Be Boring
Oct 4, 2024
|
5 Min Read
Picture of Debrup Ghosh
Debrup Ghosh

Principal Product Manager, F5 Inc.

Vulnerabilities & Threats
The Future of AI Safety: California's Vetoed Bill & What Comes Next
Oct 3, 2024
|
4 Min Read
More Commentary



STARTUP ALLEY

Read More Startup Launches
PR Logo
Сloud Security
Apono Raises $15.5M Series A Funding for AI-driven, Least Privilege Solution Set
Apono Raises $15.5M Series A Funding for AI-driven, Least Privilege Solution Set

Oct 1, 2024

Icons and fingerprints suggesting various authentication schemes on top of a
laptop keyboard.
Identity & Access Management Security
Startup Finds 'Hydden' Identities in IT Environment
Startup Finds 'Hydden' Identities in IT Environment

Sep 17, 2024


A sunset scene with clouds against a blue sky
Сloud Security
Startup Spotlight: RAD Security Brings Behavioral Profiling to Cloud
Startup Spotlight: RAD Security Brings Behavioral Profiling to Cloud

Aug 6, 2024


The Perils of Ignoring Cybersecurity Basics

The massive outage involving a faulty Falcon update is an excellent illustration
of what happens when organizations neglect security fundamentals.

Name That Edge Toon: And For My Next Trick ...

Feeling creative? Submit your caption and our panel of experts will reward the
winner with a $25 Amazon gift card.

Criminals Are Testing Their Ransomware Campaigns in Africa

The booming economies of Africa, rich in natural resources and brimming with
potential, are attracting not just investors but also cybercriminals.

Cybersecurity Features In-Depth: On security strategy, latest trends, and people
to know. Brought to you by Mandiant.

Go to The Edge


Security Technology: Featuring news, news analysis, and commentary on the latest
technology trends.

Go to DR Technology
AI-Augmented Email Analysis Spots Latest Scams, Bad Content

Multimodal AI systems can help enterprise defenders weed out fraudulent emails,
even if the system has not seen that type of message before.

Despite Prevalence of Online Threats, Users Aren't Changing Behavior

Consumers are victims of online scams and have their data stolen, but they are
lagging on adopting security tools to protect themselves.

MITRE Launches AI Incident Sharing Initiative

The collaboration with industry partners aims to improve collective AI defenses.
Trusted contributors receive protected and anonymized data on real-world AI
incidents.

AI-Powered Cybercrime Cartels on the Rise in Asia

All across the Asia-Pacific region, large and diverse marketplaces for AI
cybercrime tools have developed, with deepfakes proving most popular.

Australia Intros Its First National Cyber Legislation

The bill is broken up into several pieces, including ransomware reporting and
securing smart devices, among other objectives.

DPRK's APT37 Targets Cambodia With Khmer, 'VeilShell' Backdoor

It's North Korea versus Cambodia, with Windows default settings and sheer
patience allowing the bad guys to avoid easy detection.

Breaking cybersecurity news, news analysis, commentary, and other content from
around the world.

Go to DR Global


PRESS RELEASES

See all
PR Logo
Application Security
Introducing Mayhem: ForAllSecure Unveils New Name and Company FocusIntroducing
Mayhem: ForAllSecure Unveils New Name and Company Focus
Oct 9, 2024
2 Min Read
PR Logo
Cyber Risk
CYRISMA Secures $7M Growth Equity Financing led by Blueprint EquityCYRISMA
Secures $7M Growth Equity Financing led by Blueprint Equity
Oct 9, 2024
2 Min Read
PR Logo
Application Security
OpenGradient Raises $8.5M to Decentralize AI Infrastructure and Accelerate
Secure, Open-Source AIOpenGradient Raises $8.5M to Decentralize AI
Infrastructure and Accelerate Secure, Open-Source AI
Oct 9, 2024
2 Min Read
PR Logo
Cyberattacks & Data Breaches
90% of Successful Attacks Seen in the Wild Resulted in Leaked Sensitive Data90%
of Successful Attacks Seen in the Wild Resulted in Leaked Sensitive Data
Oct 9, 2024
3 Min Read


DISCOVER MORE WITH INFORMA TECH

Black HatOmdia

WORKING WITH US

About UsAdvertiseReprints

JOIN US


Newsletter Sign-Up

FOLLOW US



Copyright © 2024 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

Home|Cookie Policy|Privacy|Terms of Use
Cookies Button


ABOUT COOKIES ON THIS SITE

We and our partners use cookies to enhance your website experience, learn how
our site is used, offer personalised features, measure the effectiveness of our
services, and tailor content and ads to your interests while you navigate on the
web or interact with us across devices. By clicking "Continue" or continuing to
browse our site you are agreeing to our and our partners use of cookies. For
more information seePrivacy Policy
CONTINUE




COOKIE POLICY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices