Open to players of all skill levels, the "Snow-mageddon" cybersecurity competition is set in the world of Santa, elves, and Christmas mayhem.
Follow Dark Reading:
 December 14, 2024
LATEST SECURITY FEATURES & COMMENTARY
Test Your Cyber Skills With the SANS Holiday Hack Challenge
Open to players of all skill levels, the "Snow-mageddon" cybersecurity competition takes place in the world of Santa, elves, and Christmas mayhem.
Generative AI Security Tools Go Open Source
Businesses deploying large language models and other GenAI systems have a growing collection of open source tools for testing AI security.
Cybersecurity Lessons From 3 Public Breaches
High-profile security incidents provide examples of how common vulnerabilities can be exploited. If you pay attention, you can learn from others' mistakes.
Google Launches Open Source Patch Validation Tool
Vanir automates the process of scanning source code to identify missing security patches.
FCC Proposes New Cybersecurity Rules for Telecoms
FCC Chairwoman Jessica Rosenworcel recommended "urgent action" to safeguard the nation's communications systems from real and present cybersecurity threats.
Snowflake Rolls Out Mandatory MFA Plan
As part of the commitment to CISA's Secure by Design pledge, Snowflake will begin blocking sign-ins using single-factor authentication next year.
How Art Appreciation Supplements Cybersecurity Skills
Using different parts of our brains gives us different perspectives on the world around us and new approaches to the problems we face in security.
Lloyd's of London Launches New Cyber Insurance Consortium
Under the program, HITRUST-certified organizations gain access to exclusive coverage and rates.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
Researchers Crack Microsoft Azure MFA in an Hour
A critical flaw in the company's rate limit for failed sign-in attempts allowed unauthorized access to a user account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more.

Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack
Threat actors punch holes in the company's online ordering systems, tripping up doughnut deliveries across the US after a late November breach.

Governments, Telcos Ward Off China's Hacking Typhoons
Infiltrating other nations' telecom networks is a cornerstone of China's geopolitical strategy, and it's having the unintended consequence of driving the uptake of encrypted communications.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Name That Edge Toon: Shackled!
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 gift card.
Open Source Security Priorities Get a Reshuffle
The "Census of Free and Open Source Software" report, which identifies the most critical software projects, sees more cloud infrastructure and Python software designated as critical software components.
Cultivating a Hacker Mindset in Cybersecurity Defense
Security isn't just about tools — it's about understanding how the enemy thinks and why they make certain choices.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.