Plato Data Intelligence.
Vertical Search & Ai.

Tag: threat actors

Bitcoin scams, hacks and heists – and how to avoid them

Scams Here’s how cybercriminals target cryptocurrencies and how you can keep your bitcoin...

Critical Infrastructure Security: Observations From the Front Lines

COMMENTARYRecent headlines around Volt Typhoon, a state-sponsored Chinese threat actor targeting US critical infrastructure, have caused alarm over attacker dwell time and put critical infrastructure security in...

DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse

This month, MITRE will be adding two sub-techniques to its ATT&CK database that have been widely exploited by North Korean threat actors.The first, not...

Expired Redis Service Abused to Use Metasploit Meterpreter Maliciously

Attackers are using an 8-year-old version of the Redis open-source database server to maliciously use Metasploit's Meterpreter module to expose exploits within a system,...

Beyond fun and games: Exploring privacy risks in children’s apps

Kids Online Should children’s apps come with ‘warning labels’? Here's how to make...

Attack on Electronics Maker boAt Leaks Data on 7.5M

A hacker with no known history has leaked personal information belonging to millions of customers of boAt, a consumer electronics company in India.The company...

How Nation-State DDoS Attacks Impact Us All

COMMENTARYToday, it's rare for a month to pass without reports of new distributed denial-of-service (DDoS) attacks driven by geopolitical instability. Now, a single attack can include...

eXotic Visit campaign: Tracing the footprints of Virtual Invaders

ESET researchers have discovered an active espionage campaign targeting Android users with apps primarily posing as messaging services. While these apps offer functional services...

Vietnamese Cybergang Nets Financial, Social Media Data

A newcomer cybercrime group linked to Vietnam has targeted individuals and organizations in Asia, attempting to steal social media account information and user data.CoralRaider,...

Critical Bugs Put Hugging Face AI Platform in a ‘Pickle’

Two critical security vulnerabilities in the Hugging Face AI platform opened the door to attackers looking to access and alter customer data and models.One...

China’s use of AI to target US voters is on the rise

With the US presidential election looming, China is stepping up its disinformation game with increased use of AI, Microsoft's Threat Analysis Center (MTAC) reports. MTAC...

CISO Corner: Ivanti’s Mea Culpa; World Cup Hack; CISOs & Cyber-Awareness

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?