The networking company confirms that cyberattackers illegally accessed data belonging to some of its customers.
Follow Dark Reading:
 October 22, 2024
LATEST SECURITY NEWS & COMMENTARY
Cisco Disables DevHub Access After Security Breach
The networking company confirms that cyberattackers illegally accessed data belonging to some of its customers.
Anti-Bot Services Help Cybercrooks Bypass Google 'Red Page'
The emergence of novel anti-detection kits for sale on the Dark Web limit the effectiveness of a Chrome browser feature that warns users that they have reached a phishing page.
Unmanaged Cloud Credentials Pose Risk to Half of Orgs
These types of "long-lived" credentials pose a risk for users across all major cloud service providers, and must meet their very timely ends, researchers say.
Russia-Linked Hackers Attack Japan's Govt, Ports
Russia-linked hackers have taken aim at Japan, following its ramping up of military exercises with regional allies and the increase of its defense budget.
Internet Archive Gets Pummeled in Round 2 Breach
This latest breach was through Zendesk, a customer service platform that the organization uses.
Name That Toon: The Big Jump
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Why I'm Excited About the Future of Application Security
The future of application security is no longer about reacting to the inevitable — it's about anticipating and preventing attacks before they can cause damage.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
MacOS Safari 'HM Surf' Exploit Exposes Camera, Mic, Browser Data
Microsoft researchers toyed with app permissions to uncover CVE-2024-44133, using it to access sensitive user data. Adware merchants may have as well.

ESET-Branded Wiper Attack Targets Israel; Firm Denies Compromise
The security firm is denying an assessment that its systems were compromised in Israel by pro-Palestinian cyberattackers, but acknowledged an attack on one of its partners.

Supply Chain Cybersecurity Beyond Traditional Vendor Risk Management
Traditional practices are no longer sufficient in today's threat landscape. It's time for cybersecurity professionals to rethink their approach.

4 Ways to Address Zero-Days in AI/ML Security
As the unique challenges of AI zero-days emerge, the approach to managing the accompanying risks needs to follow traditional security best practices but be adapted for AI.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
CISOs: Throwing Cash at Tools Isn't Helping Detect Breaches
A survey shows three-quarters of CISOs are drowning in threat detections put out by a sprawling stack of tools, yet still lack the basic visibility necessary to identify breaches.
LATEST FROM THE EDGE

EU Adopts Cyber Resilience Act to Regulate Internet of Things
The European Union adopted a new law setting EU-wide cybersecurity requirements for connected devices to ensure their safety.
LATEST FROM DR TECHNOLOGY

Time to Get Strict With DMARC
Adoption of the email authentication and policy specification remains low, and only about a tenth of DMARC-enabled domains enforce policies. Everyone is waiting for major email providers to get strict.
LATEST FROM DR GLOBAL

DPRK Uses Microsoft Zero-Day in No-Click Toast Attacks
The "Code-on-Toast" supply chain cyberattacks by APT37 delivered data-stealing malware to users in South Korea who had enabled Toast pop-up ads.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.