Plato Data Intelligence.
Vertical Search & Ai.

Cyber Security

Sophisticated Vishing Campaigns Take World by Storm

Voice phishing, or vishing, is having a moment right now, with numerous active campaigns across the world that are ensnaring even savvy victims who...

Top News

Japan Blames North Korea for PyPI Supply Chain Cyberattack

Japanese cybersecurity officials warned that North Korea's infamous Lazarus Group hacking team recently waged a supply chain attack targeting the PyPI software repository for...

Google Engineer Steals AI Trade Secrets for Chinese Companies

The US Justice Department has charged a former Google software engineer with stealing artificial intelligence-related trade secrets from the company, with an eye to...

Broke Cyber Pros Flock to Cybercrime Side Hustles

Cybersecurity professionals are finding it more attractive to take their talents to the Dark Web and earn money working on the offensive side of...

CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Each week, we'll offer articles...

South Korean Police Deploy Deepfake Detection Tool Prior to Elections

Amid a steep rise in politically motivated deepfakes, South Korea's National Police Agency (KNPA) has developed and deployed a tool for detecting AI-generated content...

Russia-Sponsored Cyberattackers Infiltrate Microsoft’s Code Base

The Russian state-sponsored advanced persistent threat (APT) group known as Midnight Blizzard has nabbed Microsoft source code after accessing internal repositories and systems, as...

Stealth Bomber: Atlassian Confluence Exploits Drop Web Shells In-Memory

Fresh proof-of-concept (PoC) exploits are circulating in the wild for a widely targeted Atlassian Confluence Data Center and Confluence Server flaw. The new attack...

Creating Security Through Randomness

When you step inside Cloudflare's San Francisco office, the first thing you notice is a wall of lava lamps. Visitors often stop to take...

The Ongoing Struggle to Protect PLCs

COMMENTARYTen years have passed since the infamous Stuxnet attack highlighted the vulnerabilities of the operational technology (OT) systems that play a crucial role in...

APT attacks taking aim at Tibetans – Week in security with Tony Anscombe

Video Evasive Panda has been spotted targeting Tibetans in several countries and territories...

NSA’s Zero-Trust Guidelines Focus on Segmentation

The US National Security Agency (NSA) delivered its guidelines for zero-trust network security this week, offering a more concrete roadmap towards zero-trust adoption. It's...

Nigerian National Pleads Guilty of Conspiracy in BEC Operation

Henry Onyedikachi Echefu, one of the three Nigerian men who were involved in an elaborate business email compromise (BEC) scheme, has pleaded guilty to...

Latest Intelligence

spot_img
spot_img