www.darkreading.com Open in urlscan Pro
2606:4700::6812:6b2f  Public Scan

Submitted URL: http://www.darkreading.com/
Effective URL: https://www.darkreading.com/
Submission: On March 21 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Dark Reading is part of the Informa Tech Division of Informa PLC
Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT
This site is operated by a business or businesses owned by Informa PLC and all
copyright resides with them. Informa PLC's registered office is 5 Howick Place,
London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726.

Black Hat NewsOmdia Cybersecurity

Newsletter Sign-Up

Newsletter Sign-Up

Cybersecurity Topics

RELATED TOPICS

 * Application Security
 * Cybersecurity Careers
 * Cloud Security
 * Cyber Risk
 * Cyberattacks & Data Breaches
 * Cybersecurity Analytics
 * Cybersecurity Operations
 * Data Privacy
 * Endpoint Security
 * ICS/OT Security

 * Identity & Access Mgmt Security
 * Insider Threats
 * IoT
 * Mobile Security
 * Perimeter
 * Physical Security
 * Remote Workforce
 * Threat Intelligence
 * Vulnerabilities & Threats


World

RELATED TOPICS

 * DR Global

 * Middle East & Africa

See All
The Edge
DR Technology
Events

RELATED TOPICS

 * Upcoming Events

 * Webinars

SEE ALL
Resources

RELATED TOPICS

 * Library
 * Newsletters
 * Reports
 * Videos
 * Webinars
 * Whitepapers

 * 
 * 
 * 
 * 
 * Partner Perspectives:
 * > Microsoft

SEE ALL




MIDEAST & AFRICA NEWS


UNITED ARAB EMIRATES FACES INTENSIFIED CYBER-RISK

Mar 21, 2024


SAUDI ARABIA'S NATIONAL CYBERSECURITY AUTHORITY ANNOUNCES THE GCF ANNUAL MEETING
2024

Mar 18, 2024


SOUTH AFRICAN GOVERNMENT PENSION DATA LEAK FEARS SPARK PROBE

Mar 18, 2024


3 WAYS BUSINESSES CAN OVERCOME THE CYBERSECURITY SKILLS SHORTAGE

Mar 18, 2024
More Mideast & Africa News
Aerial view of modern water cleaning facility at urban wastewater treatment
plant.
ICS/OT Security


FEDERAL WARNING HIGHLIGHTS CYBER VULNERABILITY OF US WATER SYSTEMS


FEDERAL WARNING HIGHLIGHTS CYBER VULNERABILITY OF US WATER SYSTEMS

The White House urged operators of water and wastewater systems to review and
beef up their security controls against attacks by Iran- and China-based groups.

Mar 20, 2024
|
4 Min Read
Calendar marking tax day deadline
Threat Intelligence
Tax Hackers Blitz Small Business With Phishing Emails
Tax Hackers Blitz Small Business With Phishing Emails

Mar 20, 2024

Red telephone receivers haning upside down from their cords
Cyberattacks & Data Breaches
Don't Answer the Phone: Inside a Real-Life Vishing Attack
Don't Answer the Phone: Inside a Real-Life Vishing Attack

Mar 20, 2024


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.

Subscribe

Latest News

Cyber Risk
United Arab Emirates Faces Intensified Cyber-Risk
United Arab Emirates Faces Intensified Cyber-Risk
Mar 21, 2024
|
5 Min Read
byRobert Lemos, Contributing Writer
ICS/OT Security
Federal Warning Highlights Cyber Vulnerability of US Water Systems
Federal Warning Highlights Cyber Vulnerability of US Water Systems
Mar 20, 2024
|
4 Min Read
byJai Vijayan, Contributing Writer

Threat Intelligence
Tax Hackers Blitz Small Business With Phishing Emails
Tax Hackers Blitz Small Business With Phishing Emails
Mar 20, 2024
|
2 Min Read
byBecky Bracken, Editor, Dark Reading
Cyberattacks & Data Breaches
India's Android Users Hit by Malware-as-a-Service Campaign
India's Android Users Hit by Malware-as-a-Service Campaign
Mar 20, 2024
|
1 Min Read
byDark Reading Staff
Threat Intelligence
After LockBit, ALPHV Takedowns, RaaS Startups Go on a Recruiting Drive
After LockBit, ALPHV Takedowns, RaaS Startups Go on a Recruiting Drive
Mar 20, 2024
|
5 Min Read
byNate Nelson, Contributing Writer
Threat Intelligence
'Fluffy Wolf' Spreads Meta Stealer in Corporate Phishing Campaign
'Fluffy Wolf' Spreads Meta Stealer in Corporate Phishing Campaign
Mar 20, 2024
|
3 Min Read
byElizabeth Montalbano, Contributing Writer
Cyberattacks & Data Breaches
Hackers Posing as Law Firms Phish Global Orgs in Multiple Languages
Hackers Posing as Law Firms Phish Global Orgs in Multiple Languages
Mar 20, 2024
|
3 Min Read
byNate Nelson, Contributing Writer

Threat Intelligence
Russian Intelligence Targets Victims Worldwide in Rapid-Fire Cyberattacks
Russian Intel Targets Victims Worldwide in Rapid-Fire Cyberattacks
Mar 20, 2024
|
4 Min Read
byNate Nelson, Contributing Writer
Cyber Risk
Airbus Calls Off Planned Acquisition of Atos Cybersecurity Group
Airbus Calls Off Planned Acquisition of Atos Cybersecurity Group
Mar 19, 2024
|
3 Min Read
byJai Vijayan, Contributing Writer
Vulnerabilities & Threats
Fortra Releases Update on Critical Severity RCE Flaw
Fortra Releases Update on Critical Severity RCE Flaw
Mar 19, 2024
|
1 Min Read
byDark Reading Staff
More News

Latest Commentary

Picture of Lisa Tetrault
Lisa Tetrault

Vice President, Global Security Operations, Arctic Wolf

Cybersecurity Operations
AI Won't Solve Cybersecurity's Retention Problem
Mar 20, 2024
|
3 Min Read
Picture of Hollie Hennessy
Hollie Hennessy

Principal Analyst, IoT Cybersecurity, Omdia

ICS/OT Security
Connectivity Standards Alliance Meets Device Security Challenges With a Unified
Standard and Certification
Mar 20, 2024
|
6 Min Read

Picture of John Klossner, Cartoonist
John Klossner, Cartoonist
Сloud Security
Name That Toon: Bridge the Gap
Mar 19, 2024
|
1 Min Read

Picture of James Doggett
James Doggett

CISO, Semperis

Cybersecurity Operations
The New CISO: Rethinking the Role
Mar 19, 2024
|
5 Min Read
Picture of Itzik Alvas
Itzik Alvas

Co-Founder & CEO, Entro Security

Vulnerabilities & Threats
Tracking Everything on the Dark Web Is Mission Critical
Mar 18, 2024
|
5 Min Read
Picture of Jesper Trolle
Jesper Trolle

CEO, Exclusive Networks

Cybersecurity Operations
3 Ways Businesses Can Overcome the Cybersecurity Skills Shortage
Mar 18, 2024
|
4 Min Read
More Commentary



DEEP READING

See More Dark Reading Research
A chart showing all the fallout from a future data breach
Remote Workforce
Enterprises Worry End Users Will Be the Cause of Next Major Breach
Enterprises Worry End Users Will Be the Cause of Next Major Breach

Feb 16, 2024

cover of the report on securing cloud-native applications.
Сloud Security
Time to Secure Cloud-Native Apps Is Now
Time to Secure Cloud-Native Apps Is Now

Jan 23, 2024


Bar chart from Dark Reading's Incident Response survey
Cybersecurity Operations
Effective Incident Response Relies on Internal and External Partnerships
Effective Incident Response Relies on Internal and External Partnerships

Jan 17, 2024

Chat showing all the ways organizations plan to use generative AI tools
Сloud Security
GenAI Tools Will Permeate All Areas of the Enterprise
GenAI Tools Will Permeate All Areas of the Enterprise

Dec 22, 2023



Don't Answer the Phone: Inside a Real-Life Vishing Attack

Successful attackers focus on the psychological manipulation of human emotions,
which is why anyone, even a tech-savvy person, can become a victim.

New Regulations Make D&O Insurance a Must for CISOs

CISOs currently hold all of the responsibility to stop cyberattacks yet have
none of the authority to fund the technological defenses that regulations
require.

10 Tips for Better Security Data Management

CISOs must build out a security data management and security data architecture
to get the most out of their security data for the least amount of investment.

Cybersecurity Features In-Depth: On security strategy, latest trends, and people
to know. Brought to you by Mandiant.

Go to The Edge

Security Technology: Featuring news, news analysis, and commentary on the latest
technology trends.

Go to DR Technology
Detecting Cloud Threats With CloudGrappler

The open source tool from Permiso can help security teams identify threat actors
lurking within their AWS and Azure environments.

Google's Post-Quantum Upgrade Doesn't Mean We're All Protected Yet

Just because Google has put in the work to quantum-proof Chrome doesn't mean
post-quantum security is all set.

To Spot Attacks Through AI Models, Companies Need Visibility

Rushing to onboard artificial intelligence, companies and their developers are
downloading a variety of pretrained machine learning models, but verifying
security and integrity remains a challenge.


United Arab Emirates Faces Intensified Cyber-Risk

The UAE leads the Middle East in digital-transformation efforts, but slow
patching and legacy technology continue to thwart its security posture.

India's Android Users Hit by Malware-as-a-Service Campaign

Hackers are seeking sensitive personal information on user devices, including
banking data and SMS messages.

Russian Intelligence Targets Victims Worldwide in Rapid-Fire Cyberattacks

Russia's government is pretending to be other governments in emails, with an eye
toward stealing strategic intel.

Breaking cybersecurity news, news analysis, commentary, and other content from
around the world.

Go to DR Global


PARTNER PERSPECTIVES

More Partner Perspectives
Multifactor authentication concept. A person is typing on smartphone in front of
a laptop to help prevent social engineering.
Cyberattacks & Data Breaches
The Rise of Social Engineering Fraud in Business Email Compromise
The Rise of Social Engineering Fraud in Business Email Compromise

Mar 6, 2024

A single white robot is typing on a laptop keyboard to represent concept of
generative artificial intelligence (GenAI)
Cybersecurity Operations
Automate Routine Operational Workflows With Generative AI
Automate Routine Operational Workflows With Generative AI

Feb 6, 2024

Russian hacking, conceptual illustration
Threat Intelligence
Microsoft Threat Report: How Russia’s War on Ukraine Is Impacting the Global
Cybersecurity Community
Microsoft Threat Report: How Russia’s War on Ukraine Is Impacting the Global
Cybersecurity Community

Jan 31, 2024

DDoS Cyber Attack. Technology, Internet and Protection Network concept. Server
datacenter background
Vulnerabilities & Threats
How to Prepare for DDoS Attacks During Peak Business Times
How to Prepare for DDoS Attacks During Peak Business Times

Dec 27, 2023

Internet security. Firewall or other software or network security. Cyber data
defense or information protection concept. Blue abstract technology
Threat Intelligence
5 Essential Insights From the 'Microsoft Digital Defense Report 2023'
5 Essential Insights From the 'Microsoft Digital Defense Report 2023'

Dec 20, 2023

Robot looking through a pair of binoculars.
Cyber Risk
Key Building Blocks to Advance American Leadership in AI
Key Building Blocks to Advance American Leadership in AI

Dec 20, 2023


PRESS RELEASES

See all
PR Logo
Cybersecurity Operations
Deloitte Launches CyberSphere Platform to Simplify Cyber Operations for
ClientsDeloitte Launches CyberSphere Platform to Simplify Cyber Operations for
Clients
Mar 20, 2024
3 Min Read
PR Logo
Cyber Risk
Pathlock Introduces Continuous Controls Monitoring to Reduce Time and
CostsPathlock Introduces Continuous Controls Monitoring to Reduce Time and Costs
Mar 20, 2024
4 Min Read
PR Logo
Application Security
Akamai Research Finds 29% of Web Attacks Target APIsAkamai Research Finds 29% of
Web Attacks Target APIs
Mar 20, 2024
3 Min Read
PR Logo
Endpoint Security
Kaspersky Identifies Three New Android Malware ThreatsKaspersky Identifies Three
New Android Malware Threats
Mar 20, 2024
3 Min Read

Resources
White Papers

 * Upgrade your cybersecurity in the era of AI

 * Stopping Active Adversaries: Lessons from the Cyber Frontline

 * Endpoint Best Practices to Block Ransomware

 * Fortinet Named a Leader in the Forrester Wave: Zero Trust Edge (ZTE)
   Solutions

 * 2023 Software Supply Chain Attack Report

More Whitepapers
Events

 * CYBERSECURITY’S HOTTEST NEW TECHNOLOGIES: WHAT YOU NEED TO KNOW
   
   March 21, 2024

 * Cybersecurity's Hottest New Technologies - Dark Reading March 21 Event
   
   March 21, 2024

 * Black Hat Asia - April 16-19 - Learn More
   
   April 16, 2024

More Events
Webinars

 * How To Optimize and Accelerate Cybersecurity Initiatives for Your Business
   
   March 26, 2024

 * Building a Modern Endpoint Strategy for 2024 and Beyond
   
   March 27, 2024

 * Building a Modern Endpoint Strategy for 2024 and Beyond
   
   March 27, 2024

 * Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
   
   April 4, 2024

 * Cybersecurity Strategies for Small and Med Sized Businesses
   
   April 11, 2024

More Webinars

DISCOVER MORE WITH INFORMA TECH

Black HatOmdia

WORKING WITH US

About UsAdvertiseReprints

JOIN US


Newsletter Sign-Up

FOLLOW US



Copyright © 2024 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

Home|Cookie Policy|Privacy|Terms of Use

Cookies Button


ABOUT COOKIES ON THIS SITE

We and our partners use cookies to enhance your website experience, learn how
our site is used, offer personalised features, measure the effectiveness of our
services, and tailor content and ads to your interests while you navigate on the
web or interact with us across devices. You can choose to accept all of these
cookies or only essential cookies. To learn more or manage your preferences,
click “Settings”. For further information about the data we collect from you,
please see our Privacy Policy

Accept All
Settings



COOKIE PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


BACK



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * 
   
   View Cookies
   
    * Name
      cookie name

Confirm My Choices