Dark Reading
-
Beware: BofA Customers Alerted of Third-Party Data Leak
An attack on a technology partner claimed by LockBit ransomware exposed sensitive information, including Social Security numbers, of more than 57,000 banking customers.
-
Islamic Nonprofit Infiltrated: The Shocking Truth of a 3-Year Silent Backdoor Attack
Saudi Arabia charity was under surveillance with the modified reverse proxy tool, researchers discovered.
-
CISO and CIO Convergence – Are You Ready?
Recent shifts underscore the importance of collaboration and alignment between these two IT leaders for successful digital transformation.
-
Raspberry Robin: 1-Day Bugs for Deep Windows Network Nesting
The developers behind a widespread worm are nesting further into networks by exploiting Windows escalation opportunities faster than organizations can patch them.
-
United Nations Exposes $3B Cyberattacks by DPRK
The UN is reportedly investigating dozens of crypto cyberattacks suspected to have earned the North Korean regime billions to fund its nuclear program.
-
Unleashing Bounties: US Govt. Seeks Hive Ransomware Actors!
The move by the State Department complements a Hive infrastructure takedown by international law enforcement.
-
33 Million French Citizens Impacted in France’s Biggest Data Breach
Viamedis and Almerys, two payment processors widely used by French health insurers, were victims of cyberattackers who struck five days apart.
-
State CIO Priorities in 2024: Impact on API Security
The National Association of State Chief Information Officers’ top 10 list sheds light on where state and local governments need to direct their cybersecurity efforts. Here’s what it means for application security.
-
Rethinking Third-Party Risk Assessment: A Necessary Shift
Continuously evaluating and updating your third-party risk assessment can improve your security posture and ensure your company doesn’t have the next headline-making incident.
-
Fortinet and Ivanti Uncover Critical Bugs, Keeping Customers Busy
Brand-new vulnerabilities from both vendors this week — one exploited in the wild — add to a steady stream of critical security issues in the security platforms.