Blog


  • Memory-Based Attacks: How Fileless Malware Operates Without Leaving A Trace

    Threat actors are always developing new and more effective approaches to system breaches in the perpetually shifting field of cybersecurity.From…


  • Rhode Island ‘s data from health benefits system leaked on the dark web

    Rhode Island ‘s health benefits system was hacked, and threat actors leaked residents’ data on the dark web.————————————————————————————————————Cybercriminals leaked data…


  • US Army soldier who allegedly stole Trump’s AT&T call logs arrested

    #### [Cyber-crime](/security/cyber_crime/)US Army soldier who allegedly stole Trump’s AT-&T call logs arrested====================================================================Brings the arrest count related to the Snowflake hacks…


  • Bad Likert Judge: A Novel Multi-Turn Technique to Jailbreak LLMs by Misusing Their Evaluation Capabi

    ![Logo](https://unit42.paloaltonetworks.com/wp-content/uploads/2021/07/PANW_Parent.png) ![Unit42 Logo](https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/unit42-logo-white.svg) Menu* [Tools](https://unit42.paloaltonetworks.com/tools/)* [ATOMs](https://unit42.paloaltonetworks.com/atoms/)* [Security Consulting](https://www.paloaltonetworks.com/unit42)* [About Us](https://unit42.paloaltonetworks.com/about-unit-42/)* [**Under Attack?**](https://start.paloaltonetworks.com/contact-unit42.html) * [Threat Research Center](https://unit42.paloaltonetworks.com ‘Threat Research’)* [Threat Research](https://unit42.paloaltonetworks.com/category/threat-research/…


  • Westend Dental agrees to pay Indiana $350K and to implement corrective action plan to settle charges

    TechCrunch recently did its annual write-up of badly handled data security incidents. The following wasn’t in it but is one…


  • New Update – 35 Google Chrome Extensions Hacked to Inject Malicious Code

    A massive phishing campaign has compromised at least 35 Google Chrome extensions, collectively used by approximately 2.6 million users, injecting…


  • Cybersecurity Lags in Middle East Business Development

    * [Vulnerabilities -& Threats](/vulnerabilities-threats)* [Cybersecurity Operations](/cybersecurity-operations)* [Threat Intelligence](/threat-intelligence)* [Cyber Risk](/cyber-risk)[![Dark Reading Global Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc8a6395802cafad0/654e0d60123f32040a075bab/Dark_Reading_Logo_Global_k.png?width=700&auto=webp&quality=80&disable=upscale ‘Dark Reading Global Logo’)Breaking cybersecurity news, news…


  • New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy

    ![Bulk Data Transfers](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxJxbhNhZxKSE3p85wlDQchWrGaXzjn0HuooLCYbhpU1nmkCNCHFZGS2NxxbCQ7mR2szegGIuzSkpjwKsPvWRpJ5ra7A1B-f776Kfiw81IXVo0GjFxeCFAMLxyIUDWSLSKHIK4CUTDuKnEn-xvJI22_TJW0Ax6jAc49hmU6sBRdIUsPFVlepmk3SyzQAe5/s728-rw-e365/data.png ‘Bulk Data Transfers’)The U.S. Department of Justice (DoJ) has issued a final rule carrying out Executive Order…


  • Hacking campaign compromised at least 16 Chrome browser extensions

    Threat actors compromised at least 16 Chrome browser extensions leading to the exposure of data from over 600,000 users.————————————————————————————————————————A supply…


  • US Treasury Department outs the blast radius of BeyondTrust’s key leak

    #### [Cyber-crime](/security/cyber_crime/)**3** US Treasury Department outs the blast radius of BeyondTrust’s key leak======================================================================**3** Data pilfered as miscreants roamed affected workstations——————————————————–[Richard…