Though the cybersecurity vendor has since reverted the update, chaos continues as companies continue to struggle to get back up and running.
Follow Dark Reading:
 July 22, 2024
LATEST SECURITY NEWS & COMMENTARY
Buggy CrowdStrike EDR Update Crashes Windows Systems Worldwide
Though the cybersecurity vendor has since reverted the update, chaos continues as companies continue to struggle to get back up and running.
Fallout From Faulty Friday CrowdStrike Update Persists
Historic IT outage expected to spur regulatory scrutiny, soul-searching over "monoculture" of IT infrastructure - and cyberattack threats.
Notorious Chinese Hacker Gang GhostEmperor Re-Emerges After 2 Years
After an extended period underground, the Chinese hackers have added a more sophisticated infection chain and additional EDR evasion techniques.
China's APT41 Targets Global Logistics, Utilities Companies
According to Mandiant, among the many cyber espionage tools the threat actor is using is a sophisticated new dropper called DustTrap.
DHS Inspector General: Coast Guard Shortcomings Hinder US Maritime Security
Private sector organizations are "hesitant" to seek guidance from the Coast Guard, which isn't sufficiently equipped to help them yet.
Ransomware Has Outsized Impact on Gas, Energy & Utility Firms
Attackers are more likely to target critical infrastructure industries and, when they do, they cause more disruption and ask higher ransoms, with the median payment topping $2.5 million.
In Cybersecurity, Mitigating Human Risk Goes Far Beyond Training
As threat actors get smarter about how they target employees, the onus is on organizations to create a strong line of defense — and the human element is a critical component.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
High-Severity Cisco Bug Grants Attackers Password Access
The vulnerability was given the highest CVSS score possible, though few details have been released due to its severity.

Snowflake Account Attacks Driven by Exposed Legitimate Credentials
Credential management gets a boost with the latest infostealers' extortion campaign built on info stolen from cloud storage systems.

US Data Breach Victim Numbers Increase by 1,000%, Literally
Though the number of victims has risen, the actual number of breaches has gone down, as fewer, bigger breaches affect more individuals.

AI Remains a Wild Card in the War Against Disinformation
Digital literacy and protective measures will be key to detecting disinformation and deepfakes as AI is used to shape public opinion and erode trust in the democratic processes, as well as identify nefarious content.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Sizable Chunk of SEC Charges Against SolarWinds Tossed Out of Court
Judge dismisses claims against SolarWinds for actions taken after its systems had been breached, but allows the case to proceed for alleged misstatements prior to the incident.
LATEST FROM THE EDGE

Training at Black Hat to Focus on Equipping Cybersecurity Leaders With Soft Skills
A two-day presentation will examine the social-behavioral aspects of cybersecurity leadership to drive team success.
LATEST FROM DR TECHNOLOGY

Tech Giants Agree to Standardize AI Security
The Coalition for Secure AI is a consortium of influential AI companies aiming to develop tools to secure AI applications and set up an ecosystem for sharing best practices.
LATEST FROM DR GLOBAL

Under-Resourced Maintainers Pose Risk to Africa's Open Source Push
Many nations see open source software as a great equalizer, giving the Global South the tools necessary for sustainable development. But recent supply chain attacks highlight the need for security.
WEBINARS
  • The CIOs Guide to Enhancing GRC in 2024

    When structured correctly, Governance, Risk, and Compliance (GRC) can enable enterprises to align IT and business goals, while mitigating risks and abiding by industry and government requirements. Effectively manage your resources and unify your enterprise by utilizing emerging technology that ...

  • Tales of a Modern Data Breach: The Rise of Mobile Attacks

    Modern breaches now happen in minutes, not months. Threat actors are exploiting the fact that mobile devices are more susceptible to social engineering, enabling them to gain direct access to cloud infrastructure with legitimate credentials and swiftly compromise data. Recent ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.