Cybersecurity experts — including two former CISA executives — weigh in on alternate sources for threat intel, incident response, and other essential cybersecurity services.
Apr. 3, 2025
Weekly Edition
The latest news and insights for cybersecurity professionals
- The Latest News and Features -
Feed image
In this roundtable, cybersecurity experts — including two former CISA executives — weigh in on alternate sources for threat intel, incident response, and other essential cybersecurity services.‎
Feed image
Although Oracle has denied its cloud infrastructure services were breached, security experts recommend Oracle customers independently verify if they were affected and take measures to reduce exposure to potential fallout.‎
DR GLOBAL
Feed image
While Israel and Iranian proxies fight it out IRL, their conflict in cyberspace has developed in parallel. These days attacks have decelerated, but advanced in sophistication.‎
Feed image
A continuation of the North Korean nation-state threat's campaign against employment seekers uses the social engineering attack to target CeFi organizations with the GolangGhost backdoor.‎
Feed image
Based on the open source NGINX Web server, the malicious tool allows threat actors to steal user credentials and session tokens.‎
Feed image
Popularity of the generative AI platform makes it an obvious choice for cybercriminals abusing Google-sponsored search results, according to researchers.‎
Feed image
Attackers post links to fake websites on LinkedIn to ask people to complete malicious CAPTCHA challenges that install malware.‎
DR GLOBAL
Feed image
Transportation facilities and networks slowly adapt to changes and threats, leaving them vulnerable to agile cyberattackers, as demonstrated by the $10 million ransomware attack.‎
THE EDGE
Feed image
Merchants and retailers will now face penalties for not being compliant with PCI DSS 4.0.1, and the increased security standards make it clear they cannot transfer compliance responsibility to third-party service providers.‎
DR TECHNOLOGY
Feed image
With an increase in cyber-physical attacks that can cause significant disruptions, financial fallout and safety concerns for victim organizations, Renee Guttmann and Marc Sachs discuss why IT and OT security teams cannot keep working in silos.‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
Positioning security leaders as more than risk managers turns them into business enablers, trusted advisers, and, eventually, integral members of the C-suite.‎‎
Feed image
While industry experts continue to analyze, interpret, and act on threat data, the complexity of cyber threats necessitates solutions that can quickly convert expert knowledge into machine-readable formats.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber This Week -
BLETCHLEY PARK
FORTA TRIPWIRE
SCHNEIER ON SECURITY
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Weekly newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US