pr-9326-preview.darkreading.com Open in urlscan Pro
2606:4700::6810:ddab  Public Scan

URL: https://pr-9326-preview.darkreading.com/
Submission: On August 21 via api from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

Dark Reading is part of the Informa Tech Division of Informa PLC
Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT
This site is operated by a business or businesses owned by Informa PLC and all
copyright resides with them. Informa PLC's registered office is 5 Howick Place,
London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726.

Black Hat NewsOmdia Cybersecurity

Newsletter Sign-Up

Newsletter Sign-Up

Cybersecurity Topics

RELATED TOPICS

 * Application Security
 * Cybersecurity Careers
 * Cloud Security
 * Cyber Risk
 * Cyberattacks & Data Breaches
 * Cybersecurity Analytics
 * Cybersecurity Operations
 * Data Privacy
 * Endpoint Security
 * ICS/OT Security

 * Identity & Access Mgmt Security
 * Insider Threats
 * IoT
 * Mobile Security
 * Perimeter
 * Physical Security
 * Remote Workforce
 * Threat Intelligence
 * Vulnerabilities & Threats


World

RELATED TOPICS

 * DR Global

 * Middle East & Africa

See All
The Edge
DR Technology
Events

RELATED TOPICS

 * Upcoming Events
 * Podcasts

 * Webinars

SEE ALL
Resources

RELATED TOPICS

 * Library
 * Newsletters
 * Podcasts
 * Reports
 * Videos
 * Webinars
 * Whitepapers

 * 
 * 
 * 
 * 
 * Partner Perspectives:
 * > Microsoft

SEE ALL




MIDEAST & AFRICA NEWS


UN PEACE OPERATIONS UNDER FIRE FROM STATE-SPONSORED HACKERS

Mar 29, 2024


SAUDI ARABIA, UAE TOP LIST OF APT-TARGETED NATIONS IN THE MIDDLE EAST

Mar 28, 2024


PRO-IRAN ATTACKERS ACCESS MULTIPLE WATER FACILITY CONTROLLERS

Dec 4, 2023


HOW A TEENAGE SAUDI HACKER WENT FROM LOCKPICKING TO RANSOMWARE

Nov 29, 2023
More Mideast & Africa News
Software numbers floating in electronic space
Application Security


US GOVERNMENT EXPANDS ROLE IN SOFTWARE SECURITY


US GOVERNMENT EXPANDS ROLE IN SOFTWARE SECURITY

The White House Office of the National Cyber Director puts software developers
on notice, calling for a move to memory-safe programming languages and the
development of security metrics.

Feb 28, 2024
|
5 Min Read
Foreign money in a laundry machine
Threat Intelligence
Meet 'XHelper,' the All-in-One Android App for Global Money Laundering
Meet 'XHelper,' the All-in-One Android App for Global Money Laundering

Feb 29, 2024

X and O on a chalkboard outlining a play.
Cybersecurity Operations
Enhancing Incident Response Playbooks With Machine Learning
Enhancing Incident Response Playbooks With Machine Learning

Feb 28, 2024


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.

Subscribe

Latest News

Cyberattacks & Data Breaches
India Repatriates Citizens Duped Into Forced Cyber Fraud Labor in Cambodia
India Repatriates Citizens Duped Into Cyber Fraud Labor in Cambodia
Apr 1, 2024
|
1 Min Read
byDark Reading Staff
Vulnerabilities & Threats
Are You Affected by the Backdoor in XZ Utils?
Are You Affected by the Backdoor in XZ Utils?
Mar 29, 2024
|
2 Min Read
byDark Reading Staff

Vulnerabilities & Threats
Saudi Arabia, UAE Top List of APT-Targeted Nations in the Middle East
Saudi Arabia, UAE Top List of APT-Targeted Nations in the Middle East
Mar 28, 2024
|
4 Min Read
byRobert Lemos, Contributing Writer
Cybersecurity Analytics
Abstract Security Brings AI to Next-Gen SIEM
Abstract Security Brings AI to Next-Gen SIEM
Mar 26, 2024
|
2 Min Read
byFahmida Y. Rashid, Managing Editor, Features, Dark Reading
Threat Intelligence
Meet 'XHelper,' the All-in-One Android App for Global Money Laundering
Meet 'XHelper,' the All-in-One Android App for Global Money Laundering
Feb 29, 2024
|
4 Min Read
byNate Nelson, Contributing Writer
Application Security
US Government Expands Role in Software Security
US Government Expands Role in Software Security
Feb 28, 2024
|
5 Min Read
byRobert Lemos, Contributing Writer
Cybersecurity Operations
[Test] China Launches New Cyber-Defense Plan for Industrial Networks
China Launches New Cyber-Defense Plan for Industrial Networks
Feb 27, 2024
|
1 Min Read
byTara Seals

Endpoint Security
Apple Beefs Up iMessage With Quantum-Resistant Encryption
Apple Beefs Up iMessage With Quantum-Resistant Encryption
Feb 23, 2024
|
5 Min Read
byJeffrey Schwartz, Contributing Writer
Endpoint Security
TEST - Mladen - date checking
TEST - Mladen - date checking
Feb 7, 2024
|
1 Min Read
byMichael Armer
Endpoint Security
World Govs, Tech Giants Sign Spyware Responsibility Pledge
World Govs, Tech Giants Sign Spyware Responsibility Pledge
Feb 6, 2024
|
3 Min Read
byTara Seals, Managing Editor, News, Dark Reading
More News

Latest Commentary

Picture of Rob Jenks
Rob Jenks

Senior Vice President, Corporate Strategy, Tanium

Cyber Risk
Why CISOs Need to Make Cyber Insurers Their Partners
Dec 27, 2023
|
4 Min Read
Picture of Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
Cybersecurity Operations
Dark Reading Debuts Fresh New Site Design
Nov 28, 2023
|
2 Min Read

Picture of Ayan Halder
Ayan Halder

Principal Product Manager, Arkose Labs

Cyber Risk
Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity
Nov 27, 2023
|
4 Min Read

Picture of Kevin Bocek
Kevin Bocek

VP Security Strategy & Threat Intelligence

Cyber Risk
3 Ways to Stop Unauthorized Code From Running in Your Network
Nov 22, 2023
|
3 Min Read
Picture of Cathy Simms, Contributing Writer
Cathy Simms, Contributing Writer
Сloud Security
The Persian Gulf's March to the Cloud Presents Global Opportunities
Nov 22, 2023
|
3 Min Read
Picture of Maxine Holt
Maxine Holt

Research Director, Omdia

Cybersecurity Operations
Omdia Analyst Summit 2023 Highlight: Why Digital Dependence Demands Digital
Resilience
Nov 21, 2023
|
2 Min View
More Commentary



DEEP READING

See More Dark Reading Research
Comparative bar chart of cloud services security concerns from 2021 Dark Reading
Strategic Security Survey
Сloud Security
What Worries Security Teams About the Cloud?
What Worries Security Teams About the Cloud?

Aug 5, 2022

A pair of pie charts of the 2022 and 2021 answers from IT security pros on
balancing IR and intrusion prevention
Cyberattacks & Data Breaches
Prevention Takes Priority Over Response
Prevention Takes Priority Over Response

Jul 6, 2022


Chart showing changes in enterprise security strategy as a result of media
coverage of security breaches over the past year.
Cyberattacks & Data Breaches
High-Profile Breaches Are Shifting Enterprise Security Strategy
High-Profile Breaches Are Shifting Enterprise Security Strategy

Oct 12, 2021



The 7 Deadly Sins of Security Awareness Training

Stay away from using these tactics when trying to educate employees about risk.

AI Helps Uncover Russian State-Sponsored Disinformation in Hungary

Researchers used machine learning to analyze Hungarian media reports and found
Russian narratives soured the nation's perspective on EU sanctions and arms
deliveries months before the Ukraine invasion.

Exploited Vulnerabilities Can Take Months to Make KEV List

The Known Exploited Vulnerabilities (KEV) catalog is a high-quality source of
information on software flaws being exploited in the wild, but updates are often
delayed, which means companies need other sources of threat intelligence.

Cybersecurity Features In-Depth: On security strategy, latest trends, and people
to know. Brought to you by Mandiant.

Go to The Edge

Security Technology: Featuring news, news analysis, and commentary on the latest
technology trends.

Go to DR Technology
Generative AI Takes on SIEM

IBM joins Crowdstrike and Microsoft is releasing AI models to cloud-native SIEM
platforms.

Cybersecurity Investment Involves More Than Just Technology

Organizations are also looking at threat intelligence, risk assessment, cyber
insurance, and third-party risk management.

First Wave of Vulnerability-Fixing AIs Available for Developers

GitHub joins a handful of startups and established firms in the market, but all
the products are essentially "caveat developer" — let the developer beware.


India Repatriates Citizens Duped Into Forced Cyber Fraud Labor in Cambodia

So far some 250 citizens have been rescued and returned to India after being
lured to Cambodia in an phony employment scheme.

UN Peace Operations Under Fire From State-Sponsored Hackers

The international body isn't doing enough to protect details on dissidents and
activists gathered by peacekeeping operations, particularly across Central
Africa.

Saudi Arabia, UAE Top List of APT-Targeted Nations in the Middle East

Government, manufacturing, and the energy industry are the top targets of
advanced, persistent threat actors, with phishing attacks and remote exploits
the most common vectors.

Breaking cybersecurity news, news analysis, commentary, and other content from
around the world.

Go to DR Global


PARTNER PERSPECTIVES

More Partner Perspectives
test
Endpoint Security
TEST - Mladen - date checking
TEST - Mladen - date checking

Feb 7, 2024

Сloud Security
The Role of the CISO in Digital Transformation
The Role of the CISO in Digital Transformation

Nov 27, 2023

A person in a white collared shirt with a sober tie typing on a laptop while
looking at body charts on tablet.
Сloud Security
What Healthcare Cybersecurity Leaders Should Know About the FDA's Section 524B
Guidelines
What Healthcare Cybersecurity Leaders Should Know About the FDA's Section 524B
Guidelines

Nov 20, 2023

A white cloud against a blue sky. The cloud contains 0s and 1s and a security
lock.
Сloud Security
Combining Agentless and Agent-Based Cloud Security in CNAPPs
Combining Agentless and Agent-Based Cloud Security in CNAPPs

Nov 14, 2023

cloud against a ball background
Сloud Security
Considerations for Managing Digital Sovereignty: The Executive Perspective
Considerations for Managing Digital Sovereignty: The Executive Perspective

Nov 3, 2023

a padlock and documents displayed within a cloud.
Сloud Security
Doing It Together: Detection and Incident Response with Your Cloud Provider
Doing It Together: Detection and Incident Response with Your Cloud Provider

Nov 1, 2023


PRESS RELEASES

See all
Press Release Logo
Cybersecurity Operations
Hack The Box Launches 5th Annual University CTF CompetitionHack The Box Launches
5th Annual University CTF Competition
Nov 22, 2023
4 Min Read
Press Release Logo
Application Security
Kiteworks' Maytech Acquisition Reaffirms Commitment to UK MarketKiteworks'
Maytech Acquisition Reaffirms Commitment to UK Market
Nov 22, 2023
3 Min Read
thumbnail
Application Security
Lasso Security Emerges From Stealth With $6M Seed Funding for Gen AI and
Advanced LLM CybersecurityLasso Security Emerges From Stealth With $6M Seed
Funding for Gen AI and Advanced LLM Cybersecurity
Nov 20, 2023
4 Min Read
thumbnail
ICS/OT Security
VicOne and Block Harbor Deliver Integrated Workflow-Based Cybersecurity
SystemVicOne and Block Harbor Deliver Integrated Workflow-Based Cybersecurity
System
Nov 17, 2023
3 Min Read


DISCOVER MORE WITH INFORMA TECH

Black HatOmdia

WORKING WITH US

About UsAdvertiseReprints

JOIN US


Newsletter Sign-Up

FOLLOW US



Copyright © 2024 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

Home|Cookie Policy|Privacy|Terms of Use