pr-9962-preview.darkreading.com
Open in
urlscan Pro
2606:4700::6810:e1ab
Public Scan
URL:
https://pr-9962-preview.darkreading.com/
Submission: On October 16 via api from US — Scanned from US
Submission: On October 16 via api from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
Dark Reading is part of the Informa Tech Division of Informa PLC Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726. Black Hat NewsOmdia Cybersecurity Newsletter Sign-Up Newsletter Sign-Up Cybersecurity Topics RELATED TOPICS * Application Security * Cybersecurity Careers * Cloud Security * Cyber Risk * Cyberattacks & Data Breaches * Cybersecurity Analytics * Cybersecurity Operations * Data Privacy * Endpoint Security * ICS/OT Security * Identity & Access Mgmt Security * Insider Threats * IoT * Mobile Security * Perimeter * Physical Security * Remote Workforce * Threat Intelligence * Vulnerabilities & Threats World RELATED TOPICS * DR Global * Middle East & Africa See All The Edge DR Technology Events RELATED TOPICS * Upcoming Events * Podcasts * Webinars SEE ALL Resources RELATED TOPICS * Library * Newsletters * Podcasts * Reports * Videos * Webinars * Whitepapers * * * * * Partner Perspectives: * > Microsoft SEE ALL CISO CORNER REACHABILITY ANALYSIS PARES DOWN STATIC SECURITY-TESTING OVERLOAD Sep 30, 2024 HOW SHOULD CISOS NAVIGATE THE SEC CYBERSECURITY AND DISCLOSURE RULES? Sep 27, 2024 DARK READING CONFIDENTIAL: PEN-TEST ARRESTS, 5 YEARS LATER Sep 10, 2024 More Articles for CISOs Three golden chickens in the grass Cyberattacks & Data Breaches CYBERATTACKERS USE HR TARGETS TO LAY MORE_EGGS BACKDOOR CYBERATTACKERS USE HR TARGETS TO LAY MORE_EGGS BACKDOOR The FIN6 group is the likely culprit behind a spear-phishing campaign that demonstrates a shift in tactics, from targeting job seekers to going after those who hire. Oct 1, 2024 | 4 Min Read Dubai UAE skyline with Burj Khalifa at dusk Cyberattacks & Data Breaches UAE, Saudi Arabia Become Plum Cyberattack Targets UAE, Saudi Arabia Become Plum Cyberattack Targets Sep 30, 2024 A stylized crystal-looking judge's gavel with the letters AI standing behind it Application Security Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players Sep 30, 2024 Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe Vulnerabilities & Threats PODCAST DARK READING CONFIDENTIAL: PEN-TEST ARRESTS, 5 YEARS LATER Episode 3: On Sept. 11, 2019, two cybersecurity professionals, Gary De Mercurio and Justin Wynn, were arrested in Dallas County, Iowa, and forced to spend the night in jail — just for doing their jobs. Despite the criminal charges against them eventually being dropped, the saga that night five years ago continues to haunt De Mercurio and Wynn personally and professionally. In this episode, the pair and Coalfire CEO Tom McAndrew share how the arrest and fallout has shaped their lives and careers as well as how it has transformed physical penetration tests for the cybersecurity industry as a whole. LISTEN TO THE EPISODE Latest News Cyberattacks & Data Breaches Cyberattackers Use HR Targets to Lay More_Eggs Backdoor Cyberattackers Use HR Targets to Lay More_Eggs Backdoor Oct 1, 2024 | 4 Min Read byElizabeth Montalbano, Contributing Writer Cyberattacks & Data Breaches UAE, Saudi Arabia Become Plum Cyberattack Targets UAE, Saudi Arabia Become Plum Cyberattack Targets Oct 1, 2024 | 4 Min Read byRobert Lemos, Contributing Writer Application Security Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players Sep 30, 2024 | 5 Min Read byJai Vijayan, Contributing Writer Cyber Risk FERC Outlines Supply Chain Security Rules for Power Plants FERC Outlines Supply Chain Security Rules for Power Plants Sep 30, 2024 | 1 Min Read byEdge Editors Application Security Congress Advances Bill to Add AI to National Vulnerability Database Congress Advances Bill to Add AI to NVD Sep 26, 2024 | 2 Min Read byJennifer Lawinski, Contributing Writer Application Security Moving DevOps Security Out of 'the Stone Age' Moving DevOps Security Out of 'the Stone Age' Sep 26, 2024 | 6 Min Read byRobert Lemos, Contributing Writer Cyberattacks & Data Breaches India Repatriates Citizens Duped Into Forced Cyber Fraud Labor in Cambodia India Repatriates Citizens Duped Into Cyber Fraud Labor in Cambodia Apr 1, 2024 | 1 Min Read byDark Reading Staff Vulnerabilities & Threats Are You Affected by the Backdoor in XZ Utils? Are You Affected by the Backdoor in XZ Utils? Mar 29, 2024 | 2 Min Read byDark Reading Staff Vulnerabilities & Threats Saudi Arabia, UAE Top List of APT-Targeted Nations in the Middle East Saudi Arabia, UAE Top List of APT-Targeted Nations in the Middle East Mar 28, 2024 | 4 Min Read byRobert Lemos, Contributing Writer Cybersecurity Analytics Abstract Security Brings AI to Next-Gen SIEM Abstract Security Brings AI to Next-Gen SIEM Mar 26, 2024 | 2 Min Read byFahmida Y. Rashid, Managing Editor, Features, Dark Reading More News Latest Commentary Picture of Rob Jenks Rob Jenks Senior Vice President, Corporate Strategy, Tanium Cyber Risk Why CISOs Need to Make Cyber Insurers Their Partners Dec 27, 2023 | 4 Min Read Picture of Kelly Jackson Higgins, Editor-in-Chief, Dark Reading Kelly Jackson Higgins, Editor-in-Chief, Dark Reading Cybersecurity Operations Dark Reading Debuts Fresh New Site Design Nov 28, 2023 | 2 Min Read Picture of Ayan Halder Ayan Halder Principal Product Manager, Arkose Labs Cyber Risk Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity Nov 27, 2023 | 4 Min Read Picture of Kevin Bocek Kevin Bocek VP Security Strategy & Threat Intelligence Cyber Risk 3 Ways to Stop Unauthorized Code From Running in Your Network Nov 22, 2023 | 3 Min Read Picture of Cathy Simms, Contributing Writer Cathy Simms, Contributing Writer Сloud Security The Persian Gulf's March to the Cloud Presents Global Opportunities Nov 22, 2023 | 3 Min Read Picture of Maxine Holt Maxine Holt Research Director, Omdia Cybersecurity Operations Omdia Analyst Summit 2023 Highlight: Why Digital Dependence Demands Digital Resilience Nov 21, 2023 | 2 Min View More Commentary STARTUP ALLEY Read More Startup Launches X and O on a chalkboard outlining a play. Cybersecurity Operations Enhancing Incident Response Playbooks With Machine Learning Enhancing Incident Response Playbooks With Machine Learning Feb 29, 2024 Endpoint Security Apple Beefs Up iMessage With Quantum-Resistant Encryption Apple Beefs Up iMessage With Quantum-Resistant Encryption Feb 23, 2024 A white robot sitting and typing on a keyboard. Cybersecurity Operations Generative AI Takes on SIEM Generative AI Takes on SIEM Nov 22, 2023 FERC Outlines Supply Chain Security Rules for Power Plants The US Federal Energy Regulatory Commission spells out what electric utilities should do to protect their software supply chains, as well as their network "trust zones." How Should CISOs Navigate the SEC Cybersecurity and Disclosure Rules? Companies that commit to risk management have a strong cybersecurity foundation that makes it easier to comply with the SEC's rules. Here is what you need to know about 8K and 10K filings. Congress Advances Bill to Add AI to National Vulnerability Database The AI Incident Reporting and Security Enhancement Act would allow NIST to create a process for reporting and tracking vulnerabilities found in AI systems. Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant. Go to The Edge Security Technology: Featuring news, news analysis, and commentary on the latest technology trends. Go to DR Technology Reachability Analysis Pares Down Static Security-Testing Overload For development teams awash in vulnerability reports, reachability analysis can help tame the chaos and offer another path to prioritize exploitable issues. Moving DevOps Security Out of 'the Stone Age' Developers need to do more than scan code and vet software components, and ops should do more than just defend the deployment pipeline. Keep Tier-One Applications Out of Virtual Environments Crafty bad actors can infect all of an organization's virtual machines at once, rendering tier-one applications useless. UAE, Saudi Arabia Become Plum Cyberattack Targets Hacktivism-related DDoS attacks have risen 70% in the region, most often targeting the public sector, while stolen data and access offers dominate the Dark Web. India Repatriates Citizens Duped Into Forced Cyber Fraud Labor in Cambodia So far some 250 citizens have been rescued and returned to India after being lured to Cambodia in an phony employment scheme. UN Peace Operations Under Fire From State-Sponsored Hackers The international body isn't doing enough to protect details on dissidents and activists gathered by peacekeeping operations, particularly across Central Africa. Breaking cybersecurity news, news analysis, commentary, and other content from around the world. Go to DR Global PRESS RELEASES See all Press Release Logo Cybersecurity Operations Hack The Box Launches 5th Annual University CTF CompetitionHack The Box Launches 5th Annual University CTF Competition Nov 22, 2023 4 Min Read Press Release Logo Application Security Kiteworks' Maytech Acquisition Reaffirms Commitment to UK MarketKiteworks' Maytech Acquisition Reaffirms Commitment to UK Market Nov 22, 2023 3 Min Read thumbnail Application Security Lasso Security Emerges From Stealth With $6M Seed Funding for Gen AI and Advanced LLM CybersecurityLasso Security Emerges From Stealth With $6M Seed Funding for Gen AI and Advanced LLM Cybersecurity Nov 20, 2023 4 Min Read thumbnail ICS/OT Security VicOne and Block Harbor Deliver Integrated Workflow-Based Cybersecurity SystemVicOne and Block Harbor Deliver Integrated Workflow-Based Cybersecurity System Nov 17, 2023 3 Min Read TEST resources date hidden Recently added - Date hidden * Cyberattackers Use HR Targets to Lay More_Eggs Backdoor * UAE, Saudi Arabia Become Plum Cyberattack Targets * Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players * FERC Outlines Supply Chain Security Rules for Power Plants See all Events * State of AI in Cybersecurity: Beyond the Hype * [Virtual Event] The Essential Guide to Cloud Management * Black Hat Europe - December 9-12 - Learn More * SecTor - Canada's IT Security Conference Oct 22-24 - Learn More More Events Webinars * DevSecOps/AWS * Social Engineering: New Tricks, New Threats, New Defenses * 10 Emerging Vulnerabilities Every Enterprise Should Know * Simplify Data Security with Automation * Unleashing AI to Assess Cyber Security Risk More Webinars PARTNER PERSPECTIVES More Partner Perspectives test Endpoint Security TEST - Mladen - date checking TEST - Mladen - date checking Feb 7, 2024 Сloud Security The Role of the CISO in Digital Transformation The Role of the CISO in Digital Transformation Nov 27, 2023 A person in a white collared shirt with a sober tie typing on a laptop while looking at body charts on tablet. Сloud Security What Healthcare Cybersecurity Leaders Should Know About the FDA's Section 524B Guidelines What Healthcare Cybersecurity Leaders Should Know About the FDA's Section 524B Guidelines Nov 20, 2023 A white cloud against a blue sky. The cloud contains 0s and 1s and a security lock. Сloud Security Combining Agentless and Agent-Based Cloud Security in CNAPPs Combining Agentless and Agent-Based Cloud Security in CNAPPs Nov 14, 2023 cloud against a ball background Сloud Security Considerations for Managing Digital Sovereignty: The Executive Perspective Considerations for Managing Digital Sovereignty: The Executive Perspective Nov 3, 2023 a padlock and documents displayed within a cloud. Сloud Security Doing It Together: Detection and Incident Response with Your Cloud Provider Doing It Together: Detection and Incident Response with Your Cloud Provider Nov 1, 2023 More Insights Webinars * DevSecOps/AWS Oct 17, 2024 * Social Engineering: New Tricks, New Threats, New Defenses Oct 23, 2024 * 10 Emerging Vulnerabilities Every Enterprise Should Know Oct 30, 2024 * Simplify Data Security with Automation Oct 31, 2024 * Unleashing AI to Assess Cyber Security Risk Nov 12, 2024 More Webinars Events * State of AI in Cybersecurity: Beyond the Hype Oct 30, 2024 * [Virtual Event] The Essential Guide to Cloud Management Oct 17, 2024 * Black Hat Europe - December 9-12 - Learn More Dec 10, 2024 * SecTor - Canada's IT Security Conference Oct 22-24 - Learn More Oct 22, 2024 More Events DISCOVER MORE WITH INFORMA TECH Black HatOmdia WORKING WITH US About UsAdvertiseReprints JOIN US Newsletter Sign-Up FOLLOW US Copyright © 2024 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. Home|Cookie Policy|Privacy|Terms of Use Cookies Button ABOUT COOKIES ON THIS SITE We and our partners use cookies to enhance your website experience, learn how our site is used, offer personalised features, measure the effectiveness of our services, and tailor content and ads to your interests while you navigate on the web or interact with us across devices. By clicking "Continue" or continuing to browse our site you are agreeing to our and our partners use of cookies. For more information seePrivacy Policy CONTINUE Do Not Sell My Personal Information DO NOT SELL MY PERSONAL INFORMATION When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information please see Privacy Policy Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. SALE OF PERSONAL DATA Sale of Personal Data Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link. If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences. * PERFORMANCE COOKIES Switch Label label These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. * TARGETING COOKIES Switch Label label These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices