Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

3 China Nation-State Actors Target SharePoint Bugs

Hackers and cybercrime groups are part of a virtual feeding frenzy, after Microsoft's recent disclosure of new vulnerabilities in on-premises editions of SharePoint Server.

DARKReading
#vulnerability#microsoft
CISO Conversations: How IT and OT Security Worlds Are Converging

Dark Reading's Kelly Jackson Higgins interviews Carmine Valente, Deputy CISO at Con Edison, about his role at the New York-based electric utility and the state of IT and OT security. Valente highlights current threats like ransomware and supply chain attacks, as well as the impact of AI on both defense and threats.

Dell Breached by Extortion Group, Says Data Stolen Was 'Fake'

The World Leaks group accessed and released data from the company's Customer Solution Center, which is separated from customer and partner systems and stores primarily "synthetic" datasets used for demos and testing, Dell said.

Darktrace Acquires Mira Security for Network Visibility

The acquisition gives the British cybersecurity solutions provider more insights into encrypted network traffic and additional decryption capabilities.

Critical Infrastructure Security Is a Critical Concern

To be truly resilient in the ever-growing threat landscape, organizations need to balance protection with preparation.

Coast Guard Issues Cybersecurity Rule for Maritime Transport Safety

The cybersecurity requirements follow an extended timeline over the next two years, and are meant to secure US shipping ports from disruption by malicious actors.

China-Backed APT41 Cyberattack Surfaces in Africa

Up to now, the prolific China-sponsored cyber-espionage group has been mostly absent from the region, but a sophisticated and highly targeted attack on an African IT company shows Beijing is branching out.

Human Digital Twins Could Give Attackers a Dangerous Advantage

While this emerging technology offers many benefits, digital twins also have several drawbacks, as these convincing impersonations can be used in social engineering attacks.

Malicious Implants Are Coming to AI Components, Applications

A red teamer is publishing research next month about how weaknesses in modern security products lay the groundwork for stealthy implants in AI-powered applications.

Europol Sting Leaves Russian Cybercrime's 'NoName057(16)' Group Fractured

National authorities have issued seven arrest warrants in total relating to the cybercrime collective known as NoName057(16), which recruits followers to carry out DDoS attacks on perceived enemies of Russia.