APT behind the attacks may also be working in concert with Russia, researchers say.
Follow Dark Reading:
 March 01, 2022
LATEST SECURITY NEWS & COMMENTARY
Phishing Attack in Ukraine Could Be Prelude to Disinformation Campaign
Belarus-based APT behind the attacks may also be working in concert with Russia, researchers say.
Researchers Warn of Stealthy Chinese Backdoor Targeting Multiple Foreign Agencies
A stealthy backdoor program used by China-linked threat actors has targeted government computers at multiple foreign agencies, allowing attackers to retain a presence on sensitive networks and exfiltrate data while remaining undetected.
Companies Borrow Attack Technique to Watermark Machine Learning Models
Researchers continue to improve on a technique for embedded crafted outputs into machine-learning models, an anti-copying technique originally thought up by adversarial researchers.
How to Boost Shift-Left Security in the SDLC
Organizations will see big wins from applying security controls early in the development life cycle.
(Sponsored Article) 4 Simple Steps to a Modernized Threat Intelligence Approach
As cybersecurity strategies continuously evolve to keep pace with attackers, the relevance of the traditional model is in need of an automation upgrade.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Fears Rise of Potential Russian Cyberattacks on US, Allies Over Sanctions
If past is precedent, the cyber impact of the war in Ukraine could be broad and bruising, experts say.

Open Source Code: The Next Major Wave of Cyberattacks
The ubiquity of open source software presents a significant security risk, as it opens the door for vulnerabilities to be introduced (intentionally or inadvertently) to those who use it.

Why Passwordless Is at an Impasse
Many widely used business applications aren't built to support passwordless login because identity and authentication remain siloed.

MORE
EDITORS' CHOICE

7 Steps to Take Right Now to Prepare for Cyberattacks by Russia
A lot of the recommended preparation involves measures organizations should have in place already.
LATEST FROM THE EDGE

CISO Checklist for Offboarding Security Staff
The Great Resignation strikes cybersecurity teams too. Here's a checklist for CISOs to ensure security is retained even as security staff is not.
LATEST FROM DR TECHNOLOGY

Putting AI to Practical Use in Cybersecurity
Almost every cybersecurity product has an AI component. Here is where it's working in the real world.

Tech Resources
ACCESS TECH LIBRARY NOW

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

  • Strategies For Securing Your Supply Chain

    Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.