Judge dismisses claims against SolarWinds for actions taken after its systems had been breached, but allows the case to proceed for alleged misstatements prior to the incident.
Follow Dark Reading:
 July 19, 2024
LATEST SECURITY NEWS & COMMENTARY
Sizable Chunk of SEC Charges Against SolarWinds Tossed Out of Court
Judge dismisses claims against SolarWinds for actions taken after its systems had been breached, but allows the case to proceed for alleged misstatements prior to the incident.
20 Million Trusted Domains Vulnerable to Email Hosting Exploits
Three newly discovered SMTP smuggling attack techniques can exploit misconfigurations and design decisions made by at least 50 email-hosting providers.
Iranian Cyber-Threat Group Drops New Backdoor, 'BugSleep'
The group — which has targeted Israel, Saudi Arabia, and other nations — often uses spear-phishing and legitimate remote management tools but is developing a brand-new homegrown tool set.
Microsoft-Signed Chinese Adware Opens the Door to Kernel Privileges
An official stamp of approval might give the impression that a purported "HotPage" adtech tool is not, in fact, a dangerous kernel-level malware — but that's just subterfuge.
AI Remains a Wild Card in the War Against Disinformation
Digital literacy and protective measures will be key to detecting disinformation and deepfakes as AI is used to shape public opinion and erode trust in the democratic processes, as well as identify nefarious content.
High-Severity Cisco Bug Grants Attackers Password Access
The vulnerability was given the highest CVSS score possible, though few details have been released due to its severity.
US Data Breach Victim Numbers Increase by 1,000%, Literally
Though the number of victims has risen, the actual number of breaches has gone down, as fewer, bigger breaches affect more individuals.
(Sponsored Article) GenAI-Powered Attacks Change the Game
While GenAI tools increase the speed at which employees and organizations can operate, they also afford adversaries the same luxury.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Threat Actors Ramp Up Use of Encoded URLs to Bypass Secure Email
The tactic is not new, but there has been a steady increase in its use as of this spring.

'BadPack' APK Files Make Android Malware Hard to Detect
Manipulated header info within files, in mobile Trojans like TeaBot and others, makes it difficult for defenders to analyze and detect them.

Training at Black Hat to Focus on Equipping Cybersecurity Leaders With Soft Skills
A two-day presentation will examine the social-behavioral aspects of cybersecurity leadership to drive team success.

Snowflake Account Attacks Driven by Exposed Legitimate Credentials
Credential management gets a boost with the latest infostealers' extortion campaign built on info stolen from cloud storage systems.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Orgs Are Finally Making Moves to Mitigate GenAI Risks
With AI use ramping up rapidly, a growing number of enterprise security teams have begun putting controls in place to protect sensitive data from accidental exposure and leaks.
LATEST FROM THE EDGE

CSA Updates Cloud Security Certificate, Training
Latest version of CSA’s Cloud Security Knowledge Certificate provides a comprehensive catalog of the essential skills cybersecurity professionals need to master.
LATEST FROM DR TECHNOLOGY

CISA Publishes Resiliency Playbook for Critical Infrastructure
The manual provides guidance on how to improve the resiliency of critical infrastructure.
LATEST FROM DR GLOBAL

West African Crime Syndicate Taken Down by Interpol Operation
Law enforcement managed to arrest numerous members of Black Axe, a notorious group engaged in a wide variety of criminal activity.
WEBINARS
  • Search Capabilities with PostgreSQL: From Standard to Semantic

    In the digital age, the ability to sift through vast amounts of text data efficiently and effectively is crucial. PostgreSQL, a robust open-source relational database, offers various search functionalities that cater to multiple needs, from simple pattern matching to linguistic ...

  • Enhance Cloud Security with Cloud-Native Security

    In this webinar, learn how your current cloud security measures may be falling short as you shift to cloud-native, and what new tools and processes you will need to put in place to stay ahead of attackers.

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.