The ransomware group has already claimed 116 victim organizations so far on its site, and it continues to mature as a thriving cybercriminal business, researchers said
The ransomware group has already claimed 116 victim organizations so far on its site, and it continues to mature as a thriving cybercriminal business, researchers said
Follow Dark Reading:
 March 17, 2023
LATEST SECURITY NEWS & COMMENTARY
BianLian Ransomware Pivots From Encryption to Pure Data-Theft Extortion
The ransomware group has already claimed 116 victim organizations so far on its site, and it continues to mature as a thriving cybercriminal business, researchers said.
$3B Crypto-Mixer Money Laundering Operation Seized by Cops
The 'ChipMixer' cryptocurrency service for cybercriminals was shut down by law enforcement, and its alleged operator has been charged.
5 Ways to Fight School Ransomware Attacks
The challenges are steep, but school districts can fight back with planning.
Change Is Coming to the Network Detection and Response (NDR) Market
After years of relative stability and steady growth, Omdia research indicates the NDR segment is poised for rapid change.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Cyberattackers Continue Assault Against Fortinet Devices
Patched earlier this month, a code-execution vulnerability is the latest FortiOS weakness to be exploited by attackers, who see the devices as well-placed targets for initial access operations.

Access Control Gap in Microsoft Active Directory Widens Enterprise Attack Surface
One researcher thinks trust is broken in AD. Microsoft disagrees that there's a security vulnerability. But enterprise IT environments should be aware of an authentication gap either way.

Why Security Practitioners Should Understand Their Business
The sooner CISOs become proactive in understanding the flip side of the organizations they protect, the better they'll be at their jobs.

Meet Data Privacy Mandates With Cybersecurity Frameworks
Protection laws are always evolving. Here's how you can streamline your compliance efforts .

MORE
EDITORS' CHOICE
Analysts Spot a Wave of SVB-Related Cyber Fraud Striking the Business Sector
Over the weekend, cybercriminals laid the groundwork for Silicon Valley Bank-related fraud attacks that they're now starting to cash in on. Businesses are the targets and, sometimes, the enablers.
LATEST FROM THE EDGE

'Skinny' Cyber-Insurance Policies Create Compliance Path
It's getting hard to buy cyber insurance, but not having it is not always an option. Low-coverage plans could bridge the gap.
LATEST FROM DR TECHNOLOGY

Orgs Have a Long Way to Go in Securing Remote Workforce
Organizations recognize that they are responsible for protecting remote workers from cyber threats, but they have a long way to go in deploying the necessary security technologies.
WEBINARS
  • Managing Identity in the Cloud

    Shifting identity management and provisioning to the cloud helps streamline these operations. It also brings a new set of challenges, including integrating and managing user identities, privileges, and other attributes used in various on-premise and cloud systems, especially if your ...

  • SecDevOps: The Smart Way to Shift Left

    DevOps has changed the way software is developed, written, and run. But many organizations are still trying to figure out how to build security into application development. In this webinar, experts discuss the integration of security and DevOps - sometimes ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.