Dark Reading: Connecting the Information and Security Community
-
Highlighting continued attacks on game developers, attackers stole source code from and issued a ransom demand to the maker of League of Legends.
-
Whether you dream of your child growing into a CISO or just want them to improve their security hygiene, consider this roundup of literary geekery.
-
Hackers don't need a key to get past your defenses, if they can essentially teleport using RMMs, warns CISA and the NSA.
-
The accused sold an enormous data set stolen from the Austrian radio and television licensing authority — to an undercover cop.
-
A vulnerability within Microsoft's OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.
-
The US Department of Justice hacked into Hive's infrastructure, made off with hundreds of decryptors, and seized the gang's operations.
-
After Berlin pledged tanks for Ukraine, some German websites were knocked offline temporarily by Killnet DDoS attacks.
-
The rapid maturation and rebranding of ransomware groups calls for relentless preparation and flexibility in response, according to one view from the trenches.
-
Only one in 10 enterprises will create a robust zero-trust foundation in the next three years, while more than half of attacks won't even be prevented by it, according to Gartner.
-