No details yet on what forced the court to shut down affected systems and halt operations as of late Feb. 23. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Category Archives: Uncategorized
The vendor’s products fall in a category that ransomware operators like to target to circumvent victims’ ability to recover from a successful attack. Go to Source Author: Jai Vijayan, Contributing Writer
Windows 11 users can deploy a workaround or await the update rollout. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country’s National Taxation Bureau. The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous attack chains that have leveraged malicious game-related applications. “The sender claimed that the malicious file […]
Data poisoning represents the next big existential cybersecurity threat — unless organizations can ensure their AI systems are safe and trustworthy. Go to Source Author: Arvind Nithrakashyap
Companies critical to the aviation and aerospace supply chains didn’t patch a known CVE, providing opportunity for foreign espionage. Go to Source Author: Nate Nelson, Contributing Writer
A host of automated approaches identifies and remediates potential vulns while still retaining a role for security analysts to filter for context and business criticality. Go to Source Author: Robert Lemos, Contributing Writer
It’s shockingly simple to turn a car dashcam into a powerful reconnaissance tool for gathering everyday routine and location data, researchers warn. Go to Source Author: Becky Bracken, Senior Editor, Dark Reading
The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology (IT) organizations with a previously undocumented malware called LuckyStrike Agent. The activity was detected in November 2024 by Solar, the cybersecurity arm of Russian state-owned telecom company Rostelecom. It’s tracking the activity under the name Erudite Mogwai. […]
Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their business plans, or both. To drive informed decision-making and effective planning, the availability of hard data is essential—yet such data remains surprisingly scarce. The “Enterprise GenAI Data Security Report 2025” by LayerX delivers unprecedented insights Go to Source Author:
