Plato Data Intelligence.
Vertical Search & Ai.

Tag: Dark reading

CISO Corner: AI Supply Chain; AI Security Platforms; Cyber Awareness

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

Top News

Attack on Electronics Maker boAt Leaks Data on 7.5M

A hacker with no known history has leaked personal information belonging to millions of customers of boAt, a consumer electronics company in India.The company...

Panera Bread Fuels Ransomware Suspicions With Silence

Panera Bread customers and employees reported experiencing outages with the restaurant chain's ordering system, mobile apps, loyalty programs, and more on March 22.Although the...

CISO Corner: Ivanti’s Mea Culpa; World Cup Hack; CISOs & Cyber-Awareness

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

AI’s Dual Role in SMB Brand Spoofing

Artificial intelligence (AI) is simultaneously making it easier for adversaries to pull off brand spoofing and easier for organizations to block spoofing and other...

LockBit Ransomware Takedown Strikes Deep Into Brand’s Viability

Despite the LockBit ransomware-as-a-service (RaaS) gang claiming to be back after a high-profile takedown in mid-February, an analysis reveals significant, ongoing disruption to the...

How Soccer’s 2022 World Cup in Qatar Was Nearly Hacked

About six months before the 2022 FIFA World Cup soccer tournament in Qatar, a threat actor — later identified as China-linked BlackTech — quietly...

Omni Hotel IT Outage Disrupts Reservations, Digital Key Systems

Omni Hotels & Resorts last week reportedly experienced an outage that brought down the company's IT systems.It's unclear whether the service disruption was the...

CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

Cloud Email Filtering Bypass Attack Works 80% of the Time

Computer scientists have uncovered a shockingly prevalent misconfiguration in popular enterprise cloud-based email spam filtering services, along with an exploit for taking advantage of...

Suspected MFA Bombing Attacks Target Apple iPhone Users

Attackers are targeting Apple iPhone users with a rash of MFA bombing attacks that use a relentless series of legitimate password-reset notification alerts in...

AWS CISO: Pay Attention to How AI Uses Your Data

Enterprises are increasingly adopting generative AI to automate IT processes, detect security threats, and take over front-line customer service functions. An IBM survey in...

Identity Concepts Underlie Cyber-Risk ‘Perfect Storm’

Security teams are facing "the perfect storm" these days, with four seemingly major contributing factors at play: AI and generative AI; geopolitical dynamics; changing...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?