Week in Review: Iran's 'Cyber Centers', China's 'Pre-positioning,' and Cloud Identity

Week in Review: Iran's 'Cyber Centers', China's 'Pre-positioning,' and Cloud Identity

Lots of global coverage this week. Security researchers exposed Iran's use of cyber centers to hide the activity of their advanced persistent threat (APT) groups, while US officials warned that China's state-sponsored actors were 'pre-positioning' to attack US critical infrastructure, as an adjunct to a physical conflict, such as an …

Continue Reading
Week in Review: Magecart attacks in MEA, AI Threats, and Water Sector Cybersecurity

Week in Review: Magecart attacks in MEA, AI Threats, and Water Sector Cybersecurity

I wrote three articles this week, including efforts by the the US federal government to help critical infrastructure firms to defend against increasing cyberattacks on water suppliers and wastewater utilities. Also, researchers are delving into the security risks associated with the rapid adoption of large language models, indicating that many …

Continue Reading
Week in Review: Cloud-Security Consolidation, Cybersecurity in the Middle East & Africa, Cyber Insurance Data

Week in Review: Cloud-Security Consolidation, Cybersecurity in the Middle East & Africa, Cyber Insurance Data

I wrote four articles this week. The Charming Kitten-related cyber-espionage group, linked to Iran's Mint Sandstorm APT, is reportedly posing as legitimate journalists and researchers to gather intelligence on the Israel-Hamas war, showcasing a sophisticated method of targeting educators and researchers. I also covered the rise in cyberattacks, which is …

Continue Reading
Week in Review: Data Privacy Regs, Passkeys and 2 Cyber Threats

Week in Review: Data Privacy Regs, Passkeys and 2 Cyber Threats

Happy New Year! I took off running this year with four articles published to Dark Reading, including two forward looking articles I wrote last year: First, covering the privacy landscape facing companies, and second, technical advice on how to get up and running with passkeys, which are more convenient and …

Continue Reading