Leaky DICOM Medical Standard Exposes Millions of Patient Records
A 30-year-old, rarely updated protocol for medical devices has exposed reams of highly personal data, thanks to a lack of proper security throughout owner environments.
View ArticleChatGPT: OpenAI Attributes Regular Outages to DDoS Attacks
ChatGPT and the associated APIs have been affected by regular outages, citing DDoS attacks as the reason — the Anonymous Sudan group claimed responsibility.
View Article'Shields Ready' Critical Infrastructure Initiative Addresses Inevitable...
A cyberattack is coming, disasters are certain, and the US government wants critical infrastructure firms ready to handle any disruption. Welcome to Shields Ready.
View Article'CitrixBleed' Linked to Ransomware Hit on China's State-Owned Bank
Meanwhile, CISA joins the call to patch CVE-2023-4966 immediately amid reports of mass-exploit activity; at least 5,000 orgs remain exposed.
View ArticleState of Maine Becomes Latest MOVEit Victim to Surface
The state said 1.3 million individuals have been affected by this breach, which includes Social Security numbers and taxpayer information.
View ArticleIntel Faces 'Downfall' Bug Lawsuit
A class action suit claims Intel knowingly sold billions of faulty chips for years. The outcome could help define where poor vulnerability remediation becomes outright negligence.
View ArticleSaaS Vendor Risk Assessment in 3 Steps
SaaS applications are the new supply chain and, practically speaking, SaaS is the modern vendor. Here are three straightforward steps to manage this new vendor risk.
View ArticleSecurity Is a Process, Not a Tool
Process failures are the root cause of most serious cybersecurity incidents. We need to treat security as a process issue, not try to solve it with a collection of tools.
View ArticleSEC Suit Ushers in New Era of Cyber Enforcement
A federal push to enforce cybersecurity requirements is holding public companies and government contractors accountable as a matter of law and for national security.
View ArticleAzerbaijan Agencies Sign Cyber-Partner Deals
The country has signed fresh deals to boost cyber intelligence and preparedness capabilities.
View ArticleA Closer Look at State and Local Government Cybersecurity Priorities
Complexity impedes the universal and consistent application of security policies, which is an obstacle to adequately securing government environments.
View ArticleDucktail Malware Targets the Fashion Industry
Threat actors distributed an archive containing images of new products by major clothing companies, along with a malicious executable disguised with a PDF icon.
View ArticleQ&A: Generative AI Comes to the Middle East, Driving Security Changes
The influx of generative AI could cause security leaders to learn new skills and defensive tactics.
View ArticleAustralian Ports Resume Operation After Crippling Cyber Disruption
Details of a major cyberattack against Australia's shipping industry remain few and far between, but the economic impact is clear.
View Article'Hunters International' Cyberattackers Take Over Hive Ransomware
Hunters International appears to have acquired Hive ransomware from its original operators and may be seeking to cash in on the malware's reputation.
View ArticleMake Changes to Be Ready for the New SEC Cybersecurity Disclosure Rule
Mandiant/Google Cloud's Jill C. Tyson and Dark Reading's Terry Sweeney on how companies can better plan and prepare for the Securities and Exchange Commission's new cybersecurity disclosure rule.
View ArticleMolerats Group Wields Custom Cybertool to Steal Secrets in the Middle East
The so-called TA402 group continues to focus on cyber espionage against government agencies with the "IronWInd" malware.
View ArticleSteps CISOs Should Take Before, During & After a Cyberattack
By creating a plan of action, organizations can better respond to attacks.
View ArticleRoyal Ransom Demands Exceed $275M, Rebrand in Offing
The swift-moving ransomware crew continues to evolve quickly and has already attacked more than 350 victims since it was first detected just over a year ago.
View ArticleHARmor Cleans, Sanitizes, Encrypts HAR Files
Okta's breach highlights the importance of sanitizing the data logged in HAR files before sharing them.
View Article
More Pages to Explore .....