Threat detection tools yield too many false positives, security pros say, leading to burnout and resentment.
Follow Dark Reading:
 October 17, 2024
LATEST SECURITY NEWS & COMMENTARY
SOC Teams: Threat Detection Tools Are Stifling Us
Threat detection tools yield too many false positives, security pros say, leading to burnout and resentment.
WP Engine Accuses WordPress of 'Forcibly' Taking Over Its Plug-in
WordPress moves could have security implications for sites using Advanced Custom Fields plug-in.
Chinese Researchers Tap Quantum to Break Encryption
But the time when quantum computers pose a tangible threat to modern encryption is likely still several years away.
ConfusedPilot Attack Can Manipulate RAG-Based AI Systems
Attackers can introduce a malicious document in systems such as Microsoft 365 Copilot to confuse the system, potentially leading to widespread misinformation and compromised decision-making processes.
Microsoft: BYOD, QR Codes Lead Rampant Education Attacks
The average higher education institution is getting hit once a week now, and as one Oregon State University attack shows, the sector often lacks the resources to keep pace.
Microsoft Previews New Windows Feature to Limit Admin Privileges
In its latest Windows preview, Microsoft adds a feature — Administrator Protection — designed to prevent threat actors from easily escalating privileges and restrict lateral movement.
Fidelity Notifies 77K Customers of Data Breach
The third-party actor had access for two days, in the financial services company's second major breach of the year.
Iran's APT34 Abuses MS Exchange to Spy on Gulf Gov'ts
A MOIS-aligned threat group has been using Microsoft Exchange servers to exfiltrate sensitive data from Gulf-state government agencies.
LLMs Are a New Type of Insider Adversary
The inherent intelligence of large language models gives them unprecedented capabilities like no other enterprise tool before.
Vulnerability Prioritization & the Magic 8 Ball
Vulnerability prioritization has evolved over the years. Several frameworks exist to help organizations make the right decisions when it comes to deciding which patches to apply and when. But are these better than a Magic 8 Ball?
Why Your Identity Is the Key to Modernizing Cybersecurity
Ultimately, the goal of creating a trusted environment around all digital assets and devices is about modernizing the way you do business.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Walking the Tightrope Between Innovation & Risk
When employees and leaders engage with CISOs early in innovation projects, security concerns are addressed proactively, building trust and ensuring innovation and security coexist.

The Invisible Army of Non-Human Identities
The future of cybersecurity will be shaped by how well we manage the explosion of NHIs.

What Cybersecurity Leaders Can Learn From the Game of Golf
As in golf, security requires collaboration across the entire organization, from individual contributors in each department to the executive level and the board.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity
Organizations should be on high alert until next month's US presidential election to ensure the integrity of the voting process, researchers warn.
LATEST FROM THE EDGE

The Lingering 'Beige Desktop' Paradox
Organizations are grappling with the risks of having outdated hardware handling core workloads, mission-critical applications no one knows how to update or maintain, and systems that IT and security teams don't know about.
LATEST FROM DR TECHNOLOGY

Fighting Crime With Technology: Safety First
By combining human and nonhuman identity management in one solution, Flock Safety is helping law enforcement solve an impressive number of criminal cases every day.
LATEST FROM DR GLOBAL

Southeast Asian Cybercrime Profits Fuel Shadow Economy
With cybercriminal gangs raking in at least $18 billion regionally — and much more globally — law enforcement and policymakers are struggling to keep up as the syndicates innovate and entrench themselves in national economies.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.