Рубрика: Без рубрики
‘Everest Group’ Extorts Global Orgs via SAP’s HR Tool
In addition to Coca-Cola, entities in Abu Dhabi, Jordan, Namibia, South Africa, and Switzerland are experiencing extortion attacks, all involving stolen SAP SuccessFactor data.
RSAC 2025: AI Everywhere, Trust Nowhere
We’re at an inflection point. AI is changing the game, but the rules haven’t caught up.
Building Effective Security Programs Requires Strategy, Patience, and Clear Vision
Capital One executives share insights on how organizations should design their security programs, implement passwordless technologies, and reduce their attack surface.
Zambia’s Updated Cyber Laws Prompt Surveillance Warnings
Critics — which include the US embassy in Zambia — contend the just-signed Cyber Security Act and the Cyber Crime Act allow suppression of dissent and too much concentration of power.
Secure Communications Evolve Beyond End-to-End Encryption
Signal, Wickr, WhatsApp, and Cape all have different approaches to security and privacy, yet most are finding ways to make secure communications more private.
Hoff’s Rule: People First
Dark Reading Confidential Episode 5: Christofer Hoff, chief secure technology officer at LastPass, shares the human side of the story of how he led his team through a major cyber incident and built from the ground up a security team and security culture.
When Seconds Count: How to Survive Fast-and-Furious DDoS Microbursts
In the battle against two-minute micro-attacks that can knock out critical communication services, the difference between success and failure can literally come down to seconds.
3 Things to Know About AI Data Poisoning
Data poisoning represents the next big existential cybersecurity threat — unless organizations can ensure their AI systems are safe and trustworthy.
Microsoft 365 Accounts Get Sprayed by Mega-Botnet
The threat actors are exploiting non-interactive sign-ins, an authentication feature that security teams don’t typically monitor.