Individuals concerned about the privacy of their communications should consider using encrypted messaging apps and encrypted voice communications, CISA and FBI officials say.
Follow Dark Reading:
 December 05, 2024
LATEST SECURITY NEWS & COMMENTARY
CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat
Individuals concerned about the privacy of their communications should consider using encrypted messaging apps and encrypted voice communications, CISA and FBI officials say.
Venom Spider Spins Web of New Malware for MaaS Platform
A novel backdoor malware and a loader that customizes payload names for each victim have been added to the threat group's cybercriminal tool set.
Russian FSB Hackers Breach Pakistan's APT Storm-0156
Parasitic advanced persistent threat Secret Blizzard accesses another APT's infrastructure and steals what it has stolen from South Asian government and military targets.
Decade-Old Cisco Vulnerability Under Active Exploit
Cisco encourages users to update to an unaffected version of its Adaptive Security Appliance (ASA) software since there are no workarounds for the 2014 vulnerability.
'Bootkitty' First Bootloader to Take Aim at Linux
Though it's still just a proof of concept, the malware is functional and can evade the Secure Boot process on devices from multiple vendors.
'Operation Undercut' Adds to Russia Malign Influence Campaigns
Just like Russia's Doppelgänger effort, the goal is to spread misinformation about Ukraine and Western efforts to help Ukraine in its war with Russia.
Ransomware Gangs Seek Pen Testers to Boost Quality
Qualified applicants must be able to test ransomware encryption and find bugs that might enable defenders to jailbreak the malware.
Incident Response Playbooks: Are You Prepared?
The playbooks that accompany your incident response plan provide efficiency and consistency in responses, help reduce downtime and dwell time, and can be a cost-saving and reputational-saving measure for your organization.
Ransomware's Grip on Healthcare
Until C-level executives fully understand potential threats and implement effective mitigation strategies, healthcare organizations will remain vulnerable and at risk of disruption.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
How Learning to Fly Made Me a Better Cybersecurity CEO
The lessons I've learned soaring through the skies have extended far beyond the runway.

Navigating the Changing Landscape of Cybersecurity Regulations
The evolving regulatory environment presents both challenges and opportunities for businesses.

My Car Knows My Secrets, and I'm (Mostly) OK With That
Imagine your car gossiping to insurance companies about your lead foot, or data brokers peddling your daily coffee run. Welcome to the world of connected cars, where convenience and privacy are locked in a head-on collision.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Note From the Editor-in-Chief
A change in ownership and what it means for our readers.
LATEST FROM THE EDGE

Does Your Company Need a Virtual CISO?
With cybersecurity talent hard to come by and companies increasingly looking for guidance and best practices, virtual and fractional chief information security officers can make a lot of sense.
LATEST FROM DR TECHNOLOGY

Phishing Prevention Framework Reduces Incidents by Half
The anti-fraud plan calls for companies to create a pipeline for compiling attack information, along with formal processes to disseminate that intelligence across business groups.
LATEST FROM DR GLOBAL

African Law Enforcement Nabs 1,000+ Cybercrime Suspects
Authorities across 19 African countries also dismantled their infrastructure and networks, thanks to cooperation between global law enforcement and private firms.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.