Though Federal Civilian Executive Branch (FCEB) agencies are the primary targets, CISA encourages all organizations to up their security, given the high risk.
Follow Dark Reading:
 April 15, 2024
LATEST SECURITY NEWS & COMMENTARY
CISA Issues Emergency Directive After Midnight Blizzard Microsoft Hits
Though Federal Civilian Executive Branch (FCEB) agencies are the primary targets, CISA encourages all organizations to up their security, given the high risk.
CISO Corner: Securing the AI Supply Chain; AI-Powered Security Platforms; Fighting for Cyber Awareness
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: facing hard truths in software security, and the latest guidance from the NSA.
CISA's Malware Analysis Platform Could Foster Better Threat Intel
But just how the government differentiates its platform from similar private-sector options remains to be seen.
Critical Infrastructure Security: Observations From the Front Lines
Attacks on critical infrastructure are ramping up — but organizations now have the knowledge and tools needed to defend against them.
(Sponsored Article) See Your Attack Surface as Threat Actors Do With EASM and CNAPP
Layering external attack surface management with a cloud-native application protection platform gives visibility into unknown vulnerabilities.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Sisense Password Breach Triggers 'Ominous' CISA Warning
With stores of mega-corporate business intelligence, a Sisense compromise could potentially mushroom into supply chain cyberattack disaster, experts fear.

Why MLBOMs Are Useful for Securing the AI/ML Supply Chain
A machine learning bill of materials (MLBOM) framework can bring transparency, auditability, control, and forensic insight into AI and ML supply chains.

Critical Rust Flaw Poses Exploit Threat in Specific Windows Use Cases
Project behind the Rust programming language asserted that any calls to a specific API would be made safe, even with unsafe inputs, but researchers found ways to circumvent the protections.

How Nation-State DDoS Attacks Impact Us All
Global organizations and geopolitical entities must adopt new strategies to combat the growing sophistication in attacks that parallel the complexities of our new geopolitical reality.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse
North Korean hackers break ground with new exploitation techniques for Windows and macOS.
LATEST FROM THE EDGE

How Do We Integrate LLMs Security Into Application Development?
Large language models require rethinking how to bake security into the software development process earlier.
LATEST FROM DR TECHNOLOGY

The Race for AI-Powered Security Platforms Heats Up
Microsoft, Google, and Simbian each offers generative AI systems that allow security operations teams to use natural language to automate cybersecurity tasks.
LATEST FROM DR GLOBAL

Japan, Philippines & US Forge Cyber Threat Intel-Sharing Alliance
Following the Volt Typhoon attacks on critical infrastructure in the region by China, the US reportedly will share cybersecurity threat information with both countries.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.