The company has jettisoned hundreds of thousands of unused apps and millions of unused tenants as part of its Secure Future Initiative.
Follow Dark Reading:
 September 24, 2024
LATEST SECURITY NEWS & COMMENTARY
Microsoft Trims Cloud Cyberattack Surface in Security Push
The company has jettisoned hundreds of thousands of unused apps and millions of unused tenants as part of its Secure Future Initiative.
Mastercard's Bet on Recorded Future a Win for Cyber-Threat Intel
The $2.65B buy validates the growing importance of threat intelligence to enterprise security strategies.
Kaspersky Rolls Back for US Customers, Makes Way for UltraAV
Some users complain they had no idea the switch would be automatic on their devices, vowing to uninstall the unwanted antivirus software.
RomCom Malware Resurfaces With SnipBot Variant
The latest version of the evolving threat is a multistage attack demonstrating a move away from ransomware to purely espionage activities, typically targeting Ukraine and its supporters.
Commerce Dept. Proposes Ban on Automotive Software & Hardware From China, Russia
After launching an investigation in February into vehicles made by foreign adversaries, the Biden administration is finally making its move in the name of national security.
Data Security Posture Management: Accelerating Time to Value
Data discovery and classification are foundational for data security, data governance, and data protection.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Zero-Click MediaTek Bug Opens Phones, Wi-Fi to Takeover
Critical-rated CVE-2024-20017 allows remote code execution (RCE) on a range of phones and Wi-Fi access points from a variety of OEMs.

Citrine Sleet Poisons PyPI Packages With Mac & Linux Malware
A North Korean advanced persistent threat (APT) actor (aka Gleaming Pisces) tried to sneak simple backdoors into public software packages.

GenAI in Cybersecurity: Insights Beyond the Verizon DBIR
The lack of abundant data on AI-enabled attacks in official reports shouldn't prevent us from preparing for and mitigating potential future threats.

Vice Society Pivots to Inc Ransomware in Healthcare Attack
Inc ransomware — one of the most popular among cybercriminals today — meets healthcare, the industry sector most targeted by RaaS.

An AI-Driven Approach to Risk-Scoring Systems in Cybersecurity
By enhancing threat detection, enabling real-time risk assessment, and providing predictive insights, AI is empowering organizations to build more robust defenses against cyber threats.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
LinkedIn Addresses User Data Collection for AI Training
The company announced an update to its privacy policy, acknowledging it is using customer data to train its AI models.
LATEST FROM THE EDGE

Target Practice: Honing Critical Skills on Cyber Ranges
Cyber ranges are a great way for cyber professionals to keep up on emerging threats and new technologies — while having a little fun.
LATEST FROM DR TECHNOLOGY

Mastercard's Recorded Future Deal Furthers Its AI Security Goals
Mastercard's $2.65 billion deal to acquire the threat intelligence provider will boost the credit-card company's AI-based cybersecurity protection capabilities.
LATEST FROM DR GLOBAL

China's 'Earth Baxia' Spies Exploit Geoserver to Target APAC Orgs
The APT group uses spear-phishing and a vulnerability in a geospatial data-sharing server to compromise organizations in Taiwan, Japan, the Philippines, and South Korea.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.