Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Tips for a Successful SecOps Game Plan

Dark Reading's special report on SecOps data analytics looks at the elements needed to set up a proper data foundation — because getting the data right when collecting, aggregating, and analyzing it is essential.

DARKReading
#google
AI-Powered Israeli 'Cyber Dome' Defense Operation Comes to Life

The Israelis are building a cyber defense system that will use ChatGPT-like generative AI platforms to parse threat intelligence.

Why Do We Need Real-World Context to Prioritize CVEs?

Without the proper context, organizations waste time mitigating software flaws that won't likely affect their systems.

Q&A: The Outlook for Israeli Cyber Startups, As War Clouds Gather

Amid the burgeoning war, Israel's tech sector is focused on resilience. Ofer Schreiber, senior partner at YL Ventures, weighs in on the conflict, funding for cybersecurity startups, overblown valuations, and what the future holds.

Patch Now: APTs Continue to Pummel WinRAR Bug

State-sponsored cyber espionage actors from Russia and China continue to target WinRAR users with various info-stealing and backdoor malware, as a patching lag plagues the software's footprint.

Iran-Linked 'MuddyWater' Spies on Mideast Gov't for 8 Months

The state-sponsored threat actors (aka APT34, Crambus, Helix Kitten, or OilRig) spent months seemingly taking whatever government data they wished, using never-before-seen tools.

The Trifecta of Consumer Data Privacy: Education, Advocacy & Accountability

It's time to build a culture of privacy, one that businesses uphold.

What CISOs Should Exclude From SEC Cybersecurity Filings

Should CISOs include only known information in the SEC filings for a material security incident, or is there room to include details that may change during the investigation?

D-Link Confirms Breach, Rebuts Hacker's Claims About Scope

The router specialist says the attacker's claims to have heisted millions and millions of records are significantly overblown. But an incident did happen, stemming from a successful phish.

FBI: Hackers Are Extorting Plastic Surgery Providers, Patients

The sensitive nature of medical records, combined with providers' focus on patient care, make small doctor's offices ideal targets for cyber extortion.