Plato Data Intelligence.
Vertical Search & Ai.

Tag: Dark reading

10 Vulnerabilities Types to Focus On This Year

Keeping applications and networks secure can seem like a Sisyphean task. No matter how much time and resources security and IT teams devote to...

Top News

SVB Meltdown: What It Means for Cybersecurity Startups’ Access to Capital

Last week's stunning collapse of Silicon Valley Bank (SVB) could put a damper on the ability of venture-backed cybersecurity startups to secure vital capital...

Pig Butchering & Investment Scams: The $3B Cybercrime Threat Overtaking BEC

Pig butchering is a repulsively named, rising investment scam that uses a potent mix of the promise of romance and the lure of making...

IceFire Ransomware Portends a Broader Shift From Windows to Linux

In recent weeks, hackers have been deploying the "IceFire" ransomware against Linux enterprise networks, a noted shift for what was once a Windows-only malware.A...

US Lawmakers Face Cyberattacks, Potential Physical Harm After DC Health Link Breach

Hundreds of US lawmakers and their families are at risk of identity theft, financial scams, and potentially even physical threats after a known info-theft threat...

TSA Issues Urgent Directive to Make Aviation More Cyber Resilient

The Transportation Security Administration (TSA) announced a new set of cybersecurity requirements this week for airport and aircraft operators. The initiative constitutes "an emergency...

Russian Influence Duo Targets Politicians, CEOs for Embarrassing Video Calls

A Russian duo notorious for pranking numerous high-profile individuals, including Canadian Prime Minister Trudeau, is at it again — this time seeking to embarrass...

Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears

Employees are submitting sensitive business data and privacy-protected information to large language models (LLMs) such as ChatGPT, raising concerns that artificial intelligence (AI) services...

Police Raid Rounds Up Core Members of DoppelPaymer Ransomware Gang

On Feb. 28, multiple police forces carried out a coordinated action against two suspected members of the cybercrime gang behind the DoppelPaymer ransomware.These latest...

Rapid7 Brings Threat Intel Data to USF Cybersecurity Lab

At the most basic level, security research happens when curious people poke around data. What makes it good security research is when these people...

Chick-fil-A Customers Have a Bone to Pick After Account Takeovers

Fried chicken specialist Chick-fil-A has alerted customers to an automated credential stuffing attack that ran for months, impacting more than 71,000 of its customers,...

IBM Contributes Supply Chain Security Tools to OWASP

IBM has contributed two open source supply chain tools — SBOM Utility and License Scanner — to the Open Worldwide Application Security Project (OWASP)...

What GoDaddy’s Years-Long Breach Means for Millions of Clients

For years, the domain registrar and Web hosting company GoDaddy has experienced a cyber barrage of extraordinary scale, it has confirmed — affecting both...

Latest Intelligence

spot_img
spot_img
spot_img