Plato Data Intelligence.
Vertical Search & Ai.

Tag: Dark reading

Cyber-Insurance Firms Limit Payouts, Risk Obsolescence

Companies will need to re-evaluate their cyber-insurance premiums after major insurance companies have adopted exclusions for catastrophic cyberattacks conducted by "state-backed" actors.This limits the...

LastPass Suffers Data Breach, Source Code Stolen

Cyberattackers have compromised the internal systems of LastPass, making off with source code and intellectual property.The password management company said it detected anomalous activity...

‘Sliver’ Emerges as Cobalt Strike Alternative for Malicious C2

Enterprise security teams, which over the years have honed their ability to detect the use of Cobalt Strike by adversaries, may also want to keep...

‘No-Party’ Data Architectures Promise More Control, Better Security

For more than two decades, the economic advantages of third-party firms' collection of information on consumers stymied technologists' dreams of giving people more control...

More Bang for the Buck: Cross-Platform Ransomware Is the Next Problem

Two emerging ransomware gangs, known as RedAlert and Monster, have adopted cross-platform capabilities to make attacks easier to execute against multiple operating systems and environments....

Wyden Renews Call to Encrypt Twitter DMs, Secure Americans’ Data From Unfriendly Foreign Governments

Washington, D.C., Aug. 24 — Sen. Ron Wyden, D-Ore., issued the following statement following a complaint this week by a former Twitter employee that...

CISA: Just-Disclosed Palo Alto Networks Firewall Bug Under Active Exploit

The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that a high-severity security vulnerability in Palo Alto Networks firewalls is being actively exploited...

Efficient ‘MagicWeb’ Malware Subverts AD FS Authentication, Microsoft Warns

The attackers responsible for the SolarWinds supply chain attack have added a new arrow to their quiver of misery: A post-compromise capability dubbed MagicWeb,...

New Zero-Trust Maturity Data: Charting Your Own Organization

In the face of never-ending threats and continued technology evolution, zero trust has quickly progressed from an intriguing idea and buzzword to a critical...

CyberRatings.org Announces New Web Browser Test Results for 2022

AUSTIN, Texas – Aug. 16, 2022 — CyberRatings.org, the nonprofit entity dedicated to providing transparency on cybersecurity product efficacy, has published the results of...

Report: Financial Institutions Are Overwhelmed When Facing Growing Firmware Security and Supply Chain Threats

Portland, Ore. – Aug. 23, 2022 – Eclypsium® and Vanson Bourne today released a new report that reveals the financial sector is ill-equipped to effectively tackle...

DevSecOps Gains Traction — but Security Still Lags

Software developers and operations teams continue to adopt DevOps and other agile methodologies as well as automation and low-code services, but they still struggle...

Latest Intelligence

spot_img
spot_img
spot_img