CINXE.COM

Cyberattacks & Data Breaches recent news | Dark Reading

<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="robots" content="max-image-preview:large"/><title>Cyberattacks &amp; Data Breaches recent news | Dark Reading</title><meta name="description" content="Explore the latest news and expert commentary on Cyberattacks &amp;amp; Data Breaches, brought to you by the editors of Dark Reading"/><meta property="og:title" content="Cyberattacks &amp; Data Breaches recent news | Dark Reading"/><meta property="og:description" content="Explore the latest news and expert commentary on Cyberattacks &amp;amp; Data Breaches, brought to you by the editors of Dark Reading"/><meta property="og:url" content="https://www.darkreading.com/cyberattacks-data-breaches"/><meta property="og:type" content="website"/><meta property="og:image" content="https://www.darkreading.com/build/_assets/darkreading-DSJITCUD.ico"/><meta property="og:site_name" content="Dark Reading"/><link rel="canonical" href="https://www.darkreading.com/cyberattacks-data-breaches"/><script type="application/ld+json">{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.darkreading.com"},{"@type":"ListItem","position":2,"name":"Cyberattacks & Data Breaches","item":"https://www.darkreading.com/cyberattacks-data-breaches"}]}</script><link rel="preload" href="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltac510e8eb99b81bb/66049de32485e72d8ed53763/Department_of_State_B_Christopher_Alamy.jpg?width=700&amp;auto=webp&amp;quality=10&amp;disable=upscale&amp;blur=40" as="image"/><meta property="twitter:card" content="summary"/><script type="text/javascript">window.NREUM||(NREUM={});NREUM.init={distributed_tracing:{enabled:true},privacy:{cookies_enabled:true},ajax:{deny_list:["bam.eu01.nr-data.net"]}}; ;NREUM.loader_config={accountID:"3936348",trustKey:"3288925",agentID:"538600199",licenseKey:"NRJS-26ae6a3b09493bbcc87",applicationID:"538600199"}; ;NREUM.info={beacon:"bam.eu01.nr-data.net",errorBeacon:"bam.eu01.nr-data.net",licenseKey:"NRJS-26ae6a3b09493bbcc87",applicationID:"538600199",sa:1}; ;/*! For license information please see nr-loader-spa-1.275.0.min.js.LICENSE.txt */ (()=>{var e,t,r={8122:(e,t,r)=>{"use strict";r.d(t,{a:()=>i});var n=r(944);function i(e,t){try{if(!e||"object"!=typeof e)return(0,n.R)(3);if(!t||"object"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])&&Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):"object"==typeof e[a]&&"object"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=>{"use strict";r.d(t,{Vp:()=>c,fn:()=>s,x1:()=>u});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey&&!!t.errorBeacon&&!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error("All info objects require an agent identifier!");if(!a[e])throw new Error("Info for ".concat(e," was never set"));return a[e]}function u(e,t){if(!e)throw new Error("All info objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.info=a[e])}},9417:(e,t,r)=>{"use strict";r.d(t,{D0:()=>h,gD:()=>g,xN:()=>p});var n=r(993);const i=e=>{if(!e||"string"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u="[data-nr-mask]",d=()=>{const e={mask_selector:"*",block_selector:"[data-nr-block]",mask_input_options:{color:!1,date:!1,"datetime-local":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,harvestTimeSeconds:10,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},feature_flags:[],generic_events:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},harvest:{tooManyRequestsDelay:60},jserrors:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},logging:{enabled:!0,harvestTimeSeconds:10,autoStart:!0,level:n.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},performance:{capture_marks:!1,capture_measures:!1},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,harvestTimeSeconds:60,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector="".concat(t,",").concat(u):""===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return"nr-block"},get ignore_class(){return"nr-ignore"},get mask_text_class(){return"nr-mask"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=",".concat(t):""!==t&&(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t&&"object"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},soft_navigations:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},spa:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},ssl:void 0,user_actions:{enabled:!0}}},l={},f="All configuration objects require an agent identifier!";function h(e){if(!e)throw new Error(f);if(!l[e])throw new Error("Configuration for ".concat(e," was never set"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r&&(r.init=l[e])}function g(e,t){if(!e)throw new Error(f);var r=h(e);if(r){for(var n=t.split("."),i=0;i<n.length-1;i++)if("object"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=>{"use strict";r.d(t,{a:()=>c,o:()=>s});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error("All loader-config objects require an agent identifier!");if(!a[e])throw new Error("LoaderConfig for ".concat(e," was never set"));return a[e]}function c(e,t){if(!e)throw new Error("All loader-config objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.loader_config=a[e])}},3371:(e,t,r)=>{"use strict";r.d(t,{V:()=>f,f:()=>l});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0},d={};function l(e){if(!e)throw new Error("All runtime objects require an agent identifier!");if(!d[e])throw new Error("Runtime for ".concat(e," was never set"));return d[e]}function f(e,t){if(!e)throw new Error("All runtime objects require an agent identifier!");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],"harvestCount")||Object.defineProperty(d[e],"harvestCount",{get:()=>++s});const r=(0,i.nY)(e);r&&(r.runtime=d[e])}},9324:(e,t,r)=>{"use strict";r.d(t,{F3:()=>i,Xs:()=>o,Yq:()=>a,xv:()=>n});const n="1.275.0",i="PROD",o="CDN",a="^2.0.0-alpha.17"},6154:(e,t,r)=>{"use strict";r.d(t,{A4:()=>s,OF:()=>d,RI:()=>i,WN:()=>h,bv:()=>o,gm:()=>a,lR:()=>f,m:()=>u,mw:()=>c,sb:()=>l});var n=r(1863);const i="undefined"!=typeof window&&!!window.document,o="undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self.navigator instanceof WorkerNavigator||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis.navigator instanceof WorkerNavigator),a=i?window:"undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis),s="complete"===a?.document?.readyState,c=Boolean("hidden"===a?.document?.visibilityState),u=""+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d&&"undefined"==typeof SharedWorker,f=(()=>{const e=a.navigator?.userAgent?.match(/Firefox[/\s](\d+\.\d+)/);return Array.isArray(e)&&e.length>=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=>{"use strict";r.d(t,{Xv:()=>a,gX:()=>i,iW:()=>o});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t<n.length;t++){var r=n[t];if("*"===r.hostname)return!1;if(s(r.hostname,e.hostname)&&c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e&&e.length)for(var t=0;t<e.length;t++){let r=e[t];if(!r)continue;0===r.indexOf("http://")?r=r.substring(7):0===r.indexOf("https://")&&(r=r.substring(8));const i=r.indexOf("/");let o,a;i>0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a="");let[s]=o.split(":");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length>t.length)&&t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf("/")&&(e=e.substring(1)),0===t.indexOf("/")&&(t=t.substring(1)),""===e||e===t}},1687:(e,t,r)=>{"use strict";r.d(t,{Ak:()=>c,Ze:()=>l,x3:()=>u});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e&&s[e]&&(s[e].get(t)&&s[e].delete(t),h(e,t,!1),s[e].size&&f(e))}function d(e){if(!e)throw new Error("agentIdentifier required");s[e]||(s[e]=new Map)}function l(e="",t="feature",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=>t.staged))&&(t.sort(((e,t)=>e[1].priority-t[1].priority)),t.forEach((([t])=>{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted&&o.backlog&&s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e&&t<e.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=>{Object.values(t||{}).forEach((t=>{t[0]?.on&&t[0]?.context()instanceof a.y&&t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit("drain-"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=>{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=>{"use strict";r.d(t,{P:()=>c,ee:()=>u});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c="nr@context:".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length&&(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i<r.length;i++)r[i]===t&&r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o&&(o=!0);if(u.aborted&&!i)return;t&&o&&t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l<d;l++)c[l].apply(a,r);var p=v()[s[e]];p&&p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||"feature",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=>{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=>{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t&&"object"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,"aborted",{get:()=>{let e=f._aborted||!1;return e||(t&&(e=t.aborted),e)}}),f;function h(e){return e&&e instanceof a.y?e:e?(0,i.I)(e,c,(()=>new a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,"globalEE"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=>{"use strict";r.d(t,{y:()=>n});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=>{"use strict";r.d(t,{d:()=>n,p:()=>i});var n=r(7836).ee.get("handle");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=>{"use strict";r.d(t,{i:()=>o});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o="feature"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=>{"use strict";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=>o,jT:()=>n,sp:()=>i})},5607:(e,t,r)=>{"use strict";r.d(t,{W:()=>n});const n=(0,r(9566).bz)()},9566:(e,t,r)=>{"use strict";r.d(t,{LA:()=>s,ZF:()=>c,bz:()=>a,el:()=>u});var n=r(6154);const i="xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx";function o(e,t){return e?15&e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e&&e.getRandomValues&&(t=e.getRandomValues(new Uint8Array(30))),i.split("").map((e=>"x"===e?o(t,r++).toString(16):"y"===e?(3&o()|8).toString(16):e)).join("")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t&&t.getRandomValues&&(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s<e;s++)a.push(o(r,i++).toString(16));return a.join("")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=>{"use strict";r.d(t,{BB:()=>a,H3:()=>n,g:()=>u,iL:()=>c,tS:()=>s,uh:()=>i,wk:()=>o});const n="NRBA",i="SESSION",o=144e5,a=18e5,s={STARTED:"session-started",PAUSE:"session-pause",RESET:"session-reset",RESUME:"session-resume",UPDATE:"session-update"},c={SAME_TAB:"same-tab",CROSS_TAB:"cross-tab"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=>{"use strict";function n(){return Math.floor(performance.now())}r.d(t,{t:()=>n})},7485:(e,t,r)=>{"use strict";r.d(t,{D:()=>i});var n=r(6154);function i(e){if(0===(e||"").indexOf("data:"))return{protocol:"data"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(":")),sameOrigin:t.protocol===n.gm?.location?.protocol&&t.host===n.gm?.location?.host};return r.port&&""!==r.port||("http:"===t.protocol&&(r.port="80"),"https:"===t.protocol&&(r.port="443")),r.pathname&&""!==r.pathname?r.pathname.startsWith("/")||(r.pathname="/".concat(r.pathname)):r.pathname="/",r}catch(e){return{}}}},944:(e,t,r)=>{"use strict";function n(e,t){"function"==typeof console.debug&&console.debug("New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#".concat(e),t)}r.d(t,{R:()=>n})},5284:(e,t,r)=>{"use strict";r.d(t,{t:()=>c,B:()=>s});var n=r(7836),i=r(6154);const o="newrelic";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e&&"object"==typeof e&&(a.has(t)||(r.emit("rumresp",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=>{"use strict";r.d(t,{I:()=>i});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty&&Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=>{"use strict";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=>{n&&void 0===i&&(e.apply(this,r),i=setTimeout((()=>{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=>{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=>{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=>i,s:()=>n})},3304:(e,t,r)=>{"use strict";r.d(t,{A:()=>o});var n=r(7836);const i=()=>{const e=new WeakSet;return(t,r)=>{if("object"==typeof r&&null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??""}catch(e){try{n.ee.emit("internal-error",[e])}catch(e){}return""}}},5289:(e,t,r)=>{"use strict";r.d(t,{GG:()=>o,sB:()=>a});var n=r(3878);function i(){return"undefined"==typeof document||"complete"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)("load",e,t)}function a(e){if(i())return e();(0,n.DD)("DOMContentLoaded",e)}},384:(e,t,r)=>{"use strict";r.d(t,{NT:()=>o,US:()=>d,Zm:()=>a,bQ:()=>c,dV:()=>s,nY:()=>u,pV:()=>l});var n=r(6154),i=r(1863);const o={beacon:"bam.nr-data.net",errorBeacon:"bam.nr-data.net"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic&&(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=>{"use strict";r.d(t,{u:()=>i});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)("visibilitychange",(function(){if(t)return void("hidden"===document.visibilityState&&e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=>{"use strict";r.d(t,{u:()=>f});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u="addEventListener",d="removeEventListener",l="nr@wrapped:".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get("events")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],"-",p)}function p(e,t){return e[1]}return"getPrototypeOf"in Object&&(a.RI&&h(document,f),c&&h(c.prototype,f),h(a.gm,f)),t.on(u+"-start",(function(e,t){var n=e[1];if(null!==n&&("function"==typeof n||"object"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if("function"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,"fn-",null,e.name||"anonymous"):n}));this.wrapped=e[1]=i}})),t.on(d+"-start",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;"object"==typeof n&&!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n&&t(n,...r)}},3434:(e,t,r)=>{"use strict";r.d(t,{Jt:()=>o,YM:()=>c});var n=r(7836),i=r(5607);const o="nr@original:".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n="");const a="-"===n.charAt(0);for(let s=0;s<t.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=""),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty&&Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)&&(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d="function"==typeof n?n(o,a):n||{}}catch(t){u([t,"",[o,a,s],d],e)}i(r+"start",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+"err",[o,a,e],d,c),e}finally{i(r+"end",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit("internal-error",e)}catch(e){}}function d(e){return!(e&&"function"==typeof e&&e.apply&&!e[o])}},9300:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.ajax},3333:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,Zp:()=>i,mq:()=>s,nf:()=>a,qN:()=>o});const n=r(860).K7.genericEvents,i=["auxclick","click","copy","keydown","paste","scrollend"],o=["focus","blur"],a=4,s=1e3},6774:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.jserrors},993:(e,t,r)=>{"use strict";r.d(t,{ET:()=>o,TZ:()=>a,p_:()=>i});var n=r(860);const i={ERROR:"ERROR",WARN:"WARN",INFO:"INFO",DEBUG:"DEBUG",TRACE:"TRACE"},o="log",a=n.K7.logging},3785:(e,t,r)=>{"use strict";r.d(t,{R:()=>c,b:()=>u});var n=r(9908),i=r(1863),o=r(860),a=r(3969),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,["API/logging/".concat(c.toLowerCase(),"/called")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return"string"==typeof e&&Object.values(s.p_).some((t=>t===e.toUpperCase().trim()))}},3969:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,XG:()=>s,rs:()=>i,xV:()=>a,z_:()=>o});const n=r(860).K7.metrics,i="sm",o="cm",a="storeSupportabilityMetrics",s="storeEventMetrics"},6630:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewEvent},782:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=>{"use strict";r.d(t,{BB:()=>d,G4:()=>o,Qb:()=>l,TZ:()=>i,Ug:()=>a,_s:()=>s,bc:()=>u,yP:()=>c});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:"recordReplay",PAUSE:"pauseReplay",REPLAY_RUNNING:"replayRunning",ERROR_DURING_REPLAY:"errorDuringReplay"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:"Session was reset",sm:"Reset"},IMPORT:{message:"Recorder failed to import",sm:"Import"},TOO_MANY:{message:"429: Too Many Requests",sm:"Too-Many"},TOO_BIG:{message:"Payload was too large",sm:"Too-Big"},CROSS_TAB:{message:"Session Entity was set to OFF on another tab",sm:"Cross-Tab"},ENTITLEMENTS:{message:"Session Replay is not allowed and will not be started",sm:"Entitlement"}},d=5e3,l={API:"api"}},5270:(e,t,r)=>{"use strict";r.d(t,{Aw:()=>c,CT:()=>u,SR:()=>s});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO&&(0,o.V)(e)&&!0===(0,i.gD)(e,"session_trace.enabled")}function c(e){return!0===(0,i.gD)(e,"session_replay.preload")&&s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}},3738:(e,t,r)=>{"use strict";r.d(t,{He:()=>i,Kp:()=>s,Lc:()=>u,Rz:()=>d,TZ:()=>n,bD:()=>o,d3:()=>a,jx:()=>l,uP:()=>c});const n=r(860).K7.sessionTrace,i="bstResource",o="resource",a="-start",s="-end",c="fn"+a,u="fn"+s,d="pushState",l=1e3},3962:(e,t,r)=>{"use strict";r.d(t,{AM:()=>o,O2:()=>s,Qu:()=>c,TZ:()=>a,ih:()=>u,tC:()=>i});var n=r(860);const i=["click","keydown","submit"],o="api",a=n.K7.softNav,s={INITIAL_PAGE_LOAD:"",ROUTE_CHANGE:1,UNSPECIFIED:2},c={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},u={IP:"in progress",FIN:"finished",CAN:"cancelled"}},7378:(e,t,r)=>{"use strict";r.d(t,{$p:()=>x,BR:()=>b,Kp:()=>R,L3:()=>y,Lc:()=>c,NC:()=>o,SG:()=>d,TZ:()=>i,U6:()=>p,UT:()=>m,d3:()=>w,dT:()=>f,e5:()=>A,gx:()=>v,l9:()=>l,oW:()=>h,op:()=>g,rw:()=>u,tH:()=>E,uP:()=>s,wW:()=>T,xq:()=>a});var n=r(384);const i=r(860).K7.spa,o=["click","submit","keypress","keydown","keyup","change"],a=999,s="fn-start",c="fn-end",u="cb-start",d="api-ixn-",l="remaining",f="interaction",h="spaNode",p="jsonpNode",g="fetch-start",m="fetch-done",v="fetch-body-",b="jsonp-end",y=(0,n.dV)().o.ST,w="-start",R="-end",x="-body",T="cb"+R,A="jsTime",E="fetch"},4234:(e,t,r)=>{"use strict";r.d(t,{W:()=>o});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=>{"use strict";r.d(t,{V:()=>o});var n=r(9417),i=r(6154);const o=e=>i.RI&&!0===(0,n.gD)(e,"privacy.cookies_enabled")},425:(e,t,r)=>{"use strict";r.d(t,{j:()=>P});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),h=r(384),p=r(6344);const g=["setErrorHandler","finished","addToTrace","addRelease","addPageAction","setCurrentRouteName","setPageViewName","setCustomAttribute","interaction","noticeError","setUserId","setApplicationVersion","start",p.G4.RECORD,p.G4.PAUSE,"log","wrapLogger"],m=["setErrorHandler","finished","addToTrace","addRelease"];var v=r(1863),b=r(2614),y=r(993),w=r(3785),R=r(2646),x=r(3434);const T=new Map;function A(e,t,r,n){if("object"!=typeof t||!t||"string"!=typeof r||!r||"function"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get("logger")}(e),o=(0,x.YM)(i),a=new R.y(s.P);a.level=n.level,a.customAttributes=n.customAttributes;const c=t[r]?.[x.Jt]||t[r];return T.set(c,a),o.inPlace(t,[r],"wrap-logger-",(()=>T.get(c))),i}function E(){const e=(0,h.pV)();g.forEach((t=>{e[t]=(...r)=>function(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=>{e&&e.api?e.exposed&&e.api[t]&&n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length>1?n:n[0]}(t,...r)}))}const S={};var N=r(9417),O=r(5603),_=r(5284);const I=e=>{const t=e.startsWith("http");e+="/",r.p=t?e:"https://"+e};let j=!1;function P(e,t={},g,R){let{init:x,info:T,loader_config:P,runtime:C={},exposed:k=!0}=t;C.loaderType=g;const L=(0,h.pV)();T||(x=L.init,T=L.info,P=L.loader_config),(0,N.xN)(e.agentIdentifier,x||{}),(0,O.a)(e.agentIdentifier,P||{}),T.jsAttributes??={},d.bv&&(T.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,T);const H=(0,N.D0)(e.agentIdentifier),D=[T.beacon,T.errorBeacon];j||(H.proxy.assets&&(I(H.proxy.assets),D.push(H.proxy.assets)),H.proxy.beacon&&D.push(H.proxy.beacon),E(),(0,h.US)("activatedFeatures",_.B),e.runSoftNavOverSpa&&=!0===H.soft_navigations.enabled&&H.feature_flags.includes("soft_nav")),C.denyList=[...H.ajax.deny_list||[],...H.ajax.block_internal?D:[]],C.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,C),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api&&(e.api=function(e,t,h=!1){t||(0,c.Ak)(e,"api");const g={};var R=s.ee.get(e),x=R.get("tracer");S[e]=b.g.OFF,R.on(p.G4.REPLAY_RUNNING,(t=>{S[e]=t}));var T="api-",E=T+"ixn-";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),I(T,n,!0,o||null===r?"session":void 0)(t,r)}function O(){}g.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,["API/log/called"],void 0,n.K7.metrics,R),(0,w.R)(R,e,t,r)},g.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=>{(0,a.p)(f.xV,["API/wrapLogger/called"],void 0,n.K7.metrics,R),A(R,e,t,{customAttributes:r,level:i})},m.forEach((e=>{g[e]=I(T,e,!0,"api")})),g.addPageAction=I(T,"addPageAction",!0,n.K7.genericEvents),g.setPageViewName=function(t,r){if("string"==typeof t)return"/"!==t.charAt(0)&&(t="/"+t),(0,o.f)(e).customTransaction=(r||"http://custom.transaction")+t,I(T,"setPageViewName",!0)()},g.setCustomAttribute=function(e,t,r=!1){if("string"==typeof e){if(["string","number","boolean"].includes(typeof t)||null===t)return N(e,t,"setCustomAttribute",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},g.setUserId=function(e){if("string"==typeof e||null===e)return N("enduser.id",e,"setUserId",!0);(0,l.R)(41,typeof e)},g.setApplicationVersion=function(e){if("string"==typeof e||null===e)return N("application.version",e,"setApplicationVersion",!1);(0,l.R)(42,typeof e)},g.start=()=>{try{(0,a.p)(f.xV,["API/start/called"],void 0,n.K7.metrics,R),R.emit("manual-start-all")}catch(e){(0,l.R)(23,e)}},g[p.G4.RECORD]=function(){(0,a.p)(f.xV,["API/recordReplay/called"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,R)},g[p.G4.PAUSE]=function(){(0,a.p)(f.xV,["API/pauseReplay/called"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,R)},g.interaction=function(e){return(new O).get("object"==typeof e?e:{})};const _=O.prototype={createTracer:function(e,t){var r={},i=this,o="function"==typeof t;return(0,a.p)(f.xV,["API/createTracer/called"],void 0,n.K7.metrics,R),h||(0,a.p)(E+"tracer",[(0,v.t)(),e,r],i,n.K7.spa,R),function(){if(x.emit((o?"":"no-")+"fn-start",[(0,v.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t="string"==typeof e?new Error(e):e;throw x.emit("fn-err",[arguments,this,t],r),t}finally{x.emit("fn-end",[(0,v.t)()],r)}}}};function I(e,t,r,i){return function(){return(0,a.p)(f.xV,["API/"+t+"/called"],void 0,n.K7.metrics,R),i&&(0,a.p)(e+t,[(0,v.t)(),...arguments],r?null:this,i,R),r?void 0:this}}function j(){r.e(478).then(r.bind(r,8778)).then((({setAPI:t})=>{t(e),(0,c.Ze)(e,"api")})).catch((e=>{(0,l.R)(27,e),R.abort()}))}return["actionText","setName","setAttribute","save","ignore","onEnd","getContext","end","get"].forEach((e=>{_[e]=I(E,e,void 0,h?n.K7.softNav:n.K7.spa)})),g.setCurrentRouteName=h?I(E,"routeName",void 0,n.K7.softNav):I(T,"routeName",!0,n.K7.spa),g.noticeError=function(t,r){"string"==typeof t&&(t=new Error(t)),(0,a.p)(f.xV,["API/noticeError/called"],void 0,n.K7.metrics,R),(0,a.p)("err",[t,(0,v.t)(),!1,r,!!S[e]],void 0,n.K7.jserrors,R)},d.RI?(0,u.GG)((()=>j()),!0):j(),g}(e.agentIdentifier,R,e.runSoftNavOverSpa)),void 0===e.exposed&&(e.exposed=k),j=!0}},8374:(e,t,r)=>{r.nc=(()=>{try{return document?.currentScript?.nonce}catch(e){}return""})()},860:(e,t,r)=>{"use strict";r.d(t,{$J:()=>o,K7:()=>n,P3:()=>i});const n={ajax:"ajax",genericEvents:"generic_events",jserrors:"jserrors",logging:"logging",metrics:"metrics",pageAction:"page_action",pageViewEvent:"page_view_event",pageViewTiming:"page_view_timing",sessionReplay:"session_replay",sessionTrace:"session_trace",softNav:"soft_navigations",spa:"spa"},i={[n.pageViewEvent]:1,[n.pageViewTiming]:2,[n.metrics]:3,[n.jserrors]:4,[n.spa]:5,[n.ajax]:6,[n.sessionTrace]:7,[n.softNav]:8,[n.sessionReplay]:9,[n.logging]:10,[n.genericEvents]:11},o={[n.pageViewTiming]:"events",[n.ajax]:"events",[n.spa]:"events",[n.softNav]:"events",[n.metrics]:"jserrors",[n.jserrors]:"jserrors",[n.sessionTrace]:"browser/blobs",[n.sessionReplay]:"browser/blobs",[n.logging]:"browser/logs",[n.genericEvents]:"ins"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=>{for(var r in t)i.o(t,r)&&!i.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=>Promise.all(Object.keys(i.f).reduce(((t,r)=>(i.f[r](e,t),t)),[])),i.u=e=>({212:"nr-spa-compressor",249:"nr-spa-recorder",478:"nr-spa"}[e]+"-1.275.0.min.js"),i.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),e={},t="NRBA-1.275.0.PROD:",i.l=(r,n,o,a)=>{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName("script"),d=0;d<u.length;d++){var l=u[d];if(l.getAttribute("src")==r||l.getAttribute("data-webpack")==t+o){s=l;break}}if(!s){c=!0;var f={478:"sha512-NvU3eQ7o5326npq3PdmyQFPyLLZ8dzJ2BG6+iqztQtUJe3LUirTbILWdA3lulN387X5fmO+nMjQ+LJRbkEPLVA==",249:"sha512-R/f355fvvfTK6aJgvL0I8Qhud5dLX6qQ7Zp5T6jXvMAyn8gP34jRy3hYQLS8EORUfSog20ecrDt9jLqfiNHbMQ==",212:"sha512-TFSNY6YbI0MLCIwHL77tq3s4Lpj2qr0N+8089sEUUOEdvqMeEJAchudmqpGRb5sfw6nx9uHsypk2HT16ipv7kg=="};(s=document.createElement("script")).charset="utf-8",s.timeout=120,i.nc&&s.setAttribute("nonce",i.nc),s.setAttribute("data-webpack",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+"/")&&(s.crossOrigin="anonymous"),f[a]&&(s.integrity=f[a])}e[r]=[n];var h=(t,n)=>{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode&&s.parentNode.removeChild(s),i&&i.forEach((e=>e(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:"timeout",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c&&document.head.appendChild(s)}},i.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},i.p="https://js-agent.newrelic.com/",(()=>{var e={38:0,788:0};i.f.j=(t,r)=>{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=>n=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=>{if(i.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&("load"===r.type?"missing":r.type),a=r&&r.target&&r.target.src;s.message="Loading chunk "+t+" failed.\n("+o+": "+a+")",s.name="ChunkLoadError",s.type=o,s.request=a,n[1](s)}}),"chunk-"+t,t)}};var t=(t,r)=>{var n,o,[a,s,c]=r,u=0;if(a.some((t=>0!==e[t]))){for(n in s)i.o(s,n)&&(i.m[n]=s[n]);if(c)c(i)}for(t&&t(r);u<a.length;u++)o=a[u],i.o(e,o)&&e[o]&&e[o][0](),e[o]=0},r=self["webpackChunk:NRBA-1.275.0.PROD"]=self["webpackChunk:NRBA-1.275.0.PROD"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=>{"use strict";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(e=(0,r.LA)(16)){this.agentIdentifier=e}#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e("addPageAction",e,t)}setPageViewName(e,t){return this.#e("setPageViewName",e,t)}setCustomAttribute(e,t,r){return this.#e("setCustomAttribute",e,t,r)}noticeError(e,t){return this.#e("noticeError",e,t)}setUserId(e){return this.#e("setUserId",e)}setApplicationVersion(e){return this.#e("setApplicationVersion",e)}setErrorHandler(e){return this.#e("setErrorHandler",e)}addRelease(e,t){return this.#e("addRelease",e,t)}log(e,t){return this.#e("log",e,t)}}class o extends n{#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e("start")}finished(e){return this.#e("finished",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e("addToTrace",e)}setCurrentRouteName(e){return this.#e("setCurrentRouteName",e)}interaction(){return this.#e("interaction")}wrapLogger(e,t,r){return this.#e("wrapLogger",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=>{t[r]=function(e,t){return!0===(0,s.gD)(t,"".concat(e,".enabled"))}(r,e)})),t}var d=i(425);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart&&(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on("manual-start-all",(0,v.J)((()=>{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=>{n=e}));const o=async()=>{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit("internal-error",[t]),this.featureName===a.K7.sessionReplay&&this.abortHandler?.()}try{if(t.sharedAggregator)await t.sharedAggregator;else{t.sharedAggregator=i.e(478).then(i.bind(i,9337));const{EventAggregator:e}=await t.sharedAggregator;t.sharedAggregator=new e}if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,"aggregate");this.featAggregate=new a(t,r),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee&&this.ee.abort()}};p.RI?(0,h.GG)((()=>o()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)&&!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),T=i(2843),A=i(3878),E=i(782),S=i(1863);class N extends b{static featureName=E.T;constructor(e,t=!0){super(e,E.T,t),p.RI&&((0,T.u)((()=>(0,x.p)("docHidden",[(0,S.t)()],void 0,E.T,this.ee)),!0),(0,A.sp)("pagehide",(()=>(0,x.p)("winPagehide",[(0,S.t)()],void 0,E.T,this.ee))),this.importAggregator(e))}}var O=i(3969);class _ extends b{static featureName=O.TZ;constructor(e,t=!0){super(e,O.TZ,t),this.importAggregator(e)}}var I=i(6774),j=i(3304);class P{constructor(e,t,r,n,i){this.name="UncaughtError",this.message="string"==typeof e?e:(0,j.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new P(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t="Unhandled Promise Rejection";if(!e?.reason)return;if(H(e.reason))try{return e.reason.message=t+": "+e.reason.message,C(e.reason)}catch(t){return C(e.reason)}const r=C(e.reason);return r.message=t+": "+r?.message,r}function L(e){if(e.error instanceof SyntaxError&&!/:\d+$/.test(e.error.stack?.trim())){const t=new P(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error&&!!e.stack}class D extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on("internal-error",(e=>{this.abortHandler&&(0,x.p)("ierr",[C(e),(0,S.t)(),!0,{},this.#r],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.#r=e})),p.gm.addEventListener("unhandledrejection",(e=>{this.abortHandler&&(0,x.p)("err",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener("error",(e=>{this.abortHandler&&(0,x.p)("err",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var M=i(8990);let K=1;const U="nr@id";function V(e){const t=typeof e;return!e||"object"!==t&&"function"!==t?-1:e===p.gm?0:(0,M.I)(e,U,(function(){return K++}))}function G(e){if("string"==typeof e&&e.length)return e.length;if("object"==typeof e){if("undefined"!=typeof ArrayBuffer&&e instanceof ArrayBuffer&&e.byteLength)return e.byteLength;if("undefined"!=typeof Blob&&e instanceof Blob&&e.size)return e.size;if(!("undefined"!=typeof FormData&&e instanceof FormData))try{return(0,j.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=["open","send"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get("xhr")}(r);if(void 0===p.gm.XMLHttpRequest)return n;if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u="readystatechange",d=["onload","onerror","onabort","onloadstart","onloadend","onprogress","ontimeout"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit("new-xhr",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState>3&&!s.resolved&&(s.resolved=!0,n.emit("xhr-resolved",[],e)),i.inPlace(e,d,"fn-",y)}),(0,A.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit("internal-error",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,["onreadystatechange"],"fn-",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,"-xhr-",y),n.on("send-xhr-start",(function(e,t){h(e,t),function(e){l.push(e),a&&(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on("open-xhr-start",h),a){var g=s&&s.resolve();if(!c&&!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on("fn-end",(function(e){e[0]&&e[0].type===u||b()}));function b(){for(var e=0;e<l.length;e++)h(0,l[e]);l.length&&(l=[])}function y(e,t){return t}return n}var Y="fetch-",X=Y+"body-",J=["arrayBuffer","blob","json","text","formData"],Q=p.gm.Request,ee=p.gm.Response,te="prototype";const re={};function ne(e){const t=function(e){return(e||B.ee).get("fetch")}(e);if(!(Q&&ee&&p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];"function"==typeof i&&(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+"before-start",[r],o),o[B.P]&&o[B.P].dt&&(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+"start",[r,e],a),a.then((function(e){return t.emit(n+"end",[null,e],a),e}),(function(e){throw t.emit(n+"end",[e],a),e}))})}return re[t.debugId]=1,J.forEach((e=>{r(Q[te],e,X),r(ee[te],e,X)})),r(p.gm,"fetch",Y),t.on(Y+"end",(function(e,r){var n=this;if(r){var i=r.headers.get("content-length");null!==i&&(n.rxSize=i),t.emit(Y+"done",[null,r],n)}else t.emit(Y+"done",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||"").toString()||null,i=(t.agentID||"").toString()||null,o=(t.trustKey||"").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)&&this.useTraceContextHeadersForCors())&&(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin&&!this.excludeNewrelicHeader()||!e.sameOrigin&&this.isAllowedOrigin(e)&&this.useNewrelicHeaderForCors())&&(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return"00-"+t+"-"+e+"-01"}generateTraceContextStateHeader(e,t,r,n,i){return i+"@nr=0-1-"+r+"-"+n+"-"+e+"----"+t}generateTraceHeader(e,t,r,n,i,o){if(!("function"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:"Browser",ac:n,ap:i,id:e,tr:t,ti:r}};return o&&n!==o&&(a.d.tk=o),btoa((0,j.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()&&this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,"distributed_tracing")&&(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n<r.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname&&e.protocol===i.protocol&&e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=["load","error","abort","timeout"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;class he extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=>(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:"xhr",fetch:"fetch",beacon:"beacon"};p.gm?.performance?.getEntriesByType("resource").forEach((t=>{if(t.initiatorType in e&&0!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};pe(r,t.name),this.handler("xhr",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener("load",(function(r){T(t,e)}),(0,A.jT)(!1)),p.lR||e.addEventListener("progress",(function(e){t.lastSize=e.loaded}),(0,A.jT)(!1))}function o(e){this.params={method:e[0]},pe(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid&&this.sameOrigin&&r.setRequestHeader("X-NewRelic-ID",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader&&(r.setRequestHeader("newrelic",i.newrelicHeader),o=!0),i.traceContextParentHeader&&(r.setRequestHeader("traceparent",i.traceContextParentHeader),i.traceContextStateHeader&&r.setRequestHeader("tracestate",i.traceContextStateHeader),o=!0),o&&(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n&&i){var a=G(i);a&&(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{"abort"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),("load"!==e.type||o.called===o.totalCbs&&(o.onloadCalled||"function"!=typeof r.onload)&&"function"==typeof o.end)&&o.end(r)}catch(e){try{t.emit("internal-error",[e])}catch(e){}}};for(var s=0;s<de;s++)r.addEventListener(ue[s],this.listener,(0,A.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled&&"function"==typeof r.onload||"function"!=typeof this.end||this.end(r)}function d(e,t){var r=""+V(e)+!!t;this.xhrGuids&&!this.xhrGuids[r]&&(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=""+V(e)+!!t;this.xhrGuids&&this.xhrGuids[r]&&(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe&&"load"===e[0]&&t.emit("xhr-load-added",[e[1],e[2]],r)}function g(e,r){r instanceof fe&&"load"===e[0]&&t.emit("xhr-load-removed",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe&&("onload"===r&&(this.onload=!0),("load"===(e[0]&&e[0].type)||this.onload)&&(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart&&t.emit("xhr-cb-time",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if("string"==typeof e[0]?0===(t=e[0]).length&&p.RI&&(t=""+p.gm.location.href):e[0]&&e[0].url?t=e[0].url:p.gm?.URL&&e[0]&&e[0]instanceof URL?t=e[0].href:"function"==typeof e[0].toString&&(t=e[0].toString()),"string"==typeof t&&0!==t.length){t&&(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i&&(i.newrelicHeader||i.traceContextParentHeader))if(e[0]&&e[0].headers)s(e[0].headers,i)&&(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)&&(this.dt=i),e.length>1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader&&(e.set("newrelic",t.newrelicHeader),r=!0),t.traceContextParentHeader&&(e.set("traceparent",t.traceContextParentHeader),t.traceContextStateHeader&&e.set("tracestate",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length>=1&&(this.target=e[0]),e.length>=2&&(this.opts=e[1]);var r,n=this.opts||{},i=this.target;"string"==typeof i?r=i:"object"==typeof i&&i instanceof le?r=i.url:p.gm?.URL&&"object"==typeof i&&i instanceof URL&&(r=i.href),pe(this,r);var o=(""+(i&&i instanceof le&&i.method||n.method||"GET")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,"string"==typeof this.rxSize&&this.rxSize.length>0&&(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r("xhr",[this.params,i,this.startTime,this.endTime,"fetch"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t<de;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCazptureCalled||4!==e.readyState?null==t.status&&(t.status=0):T(this,e),n.cbTime=this.cbTime,r("xhr",[t,n,this.startTime,this.endTime,"xhr"],this,a.K7.ajax))}}function T(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return"json"===r&&null!==t?t:"arraybuffer"===r||"blob"===r||"json"===r?G(e.response):"text"===r||""===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n&&(e.metrics.rxSize=n),e.sameOrigin){var i=r.getResponseHeader("X-NewRelic-App-Data");i&&((0,x.p)(O.rs,["Ajax/CrossApplicationTracing/Header/Seen"],void 0,a.K7.metrics,t),e.params.cat=i.split(", ").pop())}e.loadCaptureCalled=!0}t.on("new-xhr",i),t.on("open-xhr-start",o),t.on("open-xhr-end",s),t.on("send-xhr-start",c),t.on("xhr-cb-time",u),t.on("xhr-load-added",d),t.on("xhr-load-removed",l),t.on("xhr-resolved",f),t.on("addEventListener-end",h),t.on("removeEventListener-end",g),t.on("fn-end",v),t.on("fetch-before-start",b),t.on("fetch-start",y),t.on("fn-start",m),t.on("fetch-done",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function pe(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+":"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const ge={},me=["pushState","replaceState"];function ve(e){const t=function(e){return(e||B.ee).get("history")}(e);return!p.RI||ge[t.debugId]++||(ge[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,me,"-")),t}var be=i(3738);const{He:ye,bD:we,d3:Re,Kp:xe,TZ:Te,Lc:Ae,uP:Ee,Rz:Se}=be;class Ne extends b{static featureName=Te;constructor(e,t=!0){super(e,Te,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;ve(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Ee,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Ae,(function(e,t){(0,x.p)("bst",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Se+Re,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Se+xe,(function(e){(0,x.p)("bstHist",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=>{const t=e.getEntries();(0,x.p)(ye,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:we,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var Oe=i(2614);class _e extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem("".concat(Oe.H3,"_").concat(Oe.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)&&this.ee.on(t.G4.RECORD,(()=>this.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on("err",(e=>{this.replayRunning&&(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.replayRunning=e}))}#s(e){return e&&(e.sessionReplayMode===Oe.g.FULL||e.sessionReplayMode===Oe.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==Oe.g.FULL&&this.featAggregate.initializeRecording(Oe.g.FULL,!0):(this.#i=Oe.g.FULL,this.#c(t.Qb.API),this.recorder&&this.recorder.parent.mode!==Oe.g.FULL&&(this.recorder.parent.mode=Oe.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Ie=i(3962);class je extends b{static featureName=Ie.TZ;constructor(e,t=!0){if(super(e,Ie.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=ve(this.ee);Ie.tC.forEach((e=>{(0,A.sp)(e,(e=>{a(e)}),!0)}));const n=()=>(0,x.p)("newURL",[(0,S.t)(),""+window.location],void 0,this.featureName,this.ee);r.on("pushState-end",n),r.on("replaceState-end",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,A.sp)("popstate",(e=>(0,x.p)("newURL",[e.timeStamp,""+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=>{i||(i=!0,requestAnimationFrame((()=>{(0,x.p)("newDom",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=>{(0,x.p)("newUIEvent",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var Pe=i(7378);const Ce={},ke=["appendChild","insertBefore","replaceChild"];function Le(e){const t=function(e){return(e||B.ee).get("jsonp")}(e);if(!p.RI||Ce[t.debugId])return t;Ce[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?&](?:callback|cb)=([^&#]+)/,i=/(.*)\.([^.]+)/,o=/^(\w+)(\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,ke,"dom-"),t.on("dom-start",(function(e){!function(e){if(!e||"string"!=typeof e.nodeName||"script"!==e.nodeName.toLowerCase())return;if("function"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t&&t.length>=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if("function"!=typeof u.parent[u.key])return;var d={};function l(){t.emit("jsonp-end",[],d),e.removeEventListener("load",l,(0,A.jT)(!1)),e.removeEventListener("error",f,(0,A.jT)(!1))}function f(){t.emit("jsonp-error",[],d),t.emit("jsonp-end",[],d),e.removeEventListener("load",l,(0,A.jT)(!1)),e.removeEventListener("error",f,(0,A.jT)(!1))}r.inPlace(u.parent,[u.key],"cb-",d),e.addEventListener("load",l,(0,A.jT)(!1)),e.addEventListener("error",f,(0,A.jT)(!1)),t.emit("new-jsonp",[e.src],d)}(e[0])})),t}const He={};function De(e){const t=function(e){return(e||B.ee).get("promise")}(e);if(He[t.debugId])return t;He[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i&&function(){function e(r){var o=t.context(),a=n(r,"executor-",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,"name",{value:"Promise"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),["all","race"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=>{this.resolve(e).then(a("all"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit("propagate",[null,!i],o,!1,!1),i=i||!e}}}})),["resolve","reject"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r&&t.emit("propagate",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],"cb-",a,null,!1),e[1]=n(e[1],"cb-",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit("propagate",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on("executor-start",(function(e){e[0]=n(e[0],"resolve-",this,null,!1),e[1]=n(e[1],"resolve-",this,null,!1)})),t.on("executor-err",(function(e,t,r){e[1](r)})),t.on("cb-end",(function(e,r,n){t.emit("propagate",[n,!0],this.nextPromise,!1,!1)})),t.on("propagate",(function(e,r,n){this.getCtx&&!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r&&r.getCtx?r.getCtx():this})}))}(),t}const Me={},Ke="setTimeout",Ue="setInterval",Ve="clearTimeout",Ge="-start",Fe=[Ke,"setImmediate",Ue,Ve,"clearImmediate"];function Be(e){const t=function(e){return(e||B.ee).get("timer")}(e);if(Me[t.debugId]++)return t;Me[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Fe.slice(0,2),Ke+"-"),r.inPlace(p.gm,Fe.slice(2,3),Ue+"-"),r.inPlace(p.gm,Fe.slice(3),Ve+"-"),t.on(Ue+Ge,(function(e,t,n){e[0]=r(e[0],"fn-",null,n)})),t.on(Ke+Ge,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],"fn-",this,n)})),t}const We={};function ze(e){const t=function(e){return(e||B.ee).get("mutation")}(e);if(!p.RI||We[t.debugId])return t;We[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n&&(window.MutationObserver=function(e){return this instanceof n?new n(r(e,"fn-")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:qe,d3:Ze,Kp:Ye,$p:Xe,wW:Je,e5:Qe,tH:$e,uP:et,rw:tt,Lc:rt}=Pe;class nt extends b{static featureName=qe;constructor(e,t=!0){if(super(e,qe,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get("tracer"),o=Le(this.ee),a=De(this.ee),s=Be(this.ee),c=Z(this.ee),u=this.ee.get("events"),d=ne(this.ee),l=ve(this.ee),f=ze(this.ee);function h(e,t){l.emit("newURL",[""+window.location,t])}function g(){n++,r=window.location.hash,this[et]=(0,S.t)()}function m(){n--,window.location.hash!==r&&h(0,!0);var e=(0,S.t)();this[Qe]=~~this[Qe]+e-this[et],this[rt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(et,g),a.on(tt,g),o.on(tt,g),this.ee.on(rt,m),a.on(Je,m),o.on(Je,m),this.ee.on("fn-err",((...t)=>{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)("function-err",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([et,rt,"xhr-resolved"],this.featureName),u.buffer([et],this.featureName),s.buffer(["setTimeout"+Ye,"clearTimeout"+Ze,et],this.featureName),c.buffer([et,"new-xhr","send-xhr"+Ze],this.featureName),d.buffer([$e+Ze,$e+"-done",$e+Xe+Ze,$e+Xe+Ye],this.featureName),l.buffer(["newURL"],this.featureName),f.buffer([et],this.featureName),a.buffer(["propagate",tt,Je,"executor-err","resolve"+Ze],this.featureName),i.buffer([et,"no-"+et],this.featureName),o.buffer(["new-jsonp","cb-start","jsonp-error","jsonp-end"],this.featureName),v(d,$e+Ze),v(d,$e+"-done"),v(o,"new-jsonp"),v(o,"jsonp-end"),v(o,"cb-start"),l.on("pushState-end",h),l.on("replaceState-end",h),window.addEventListener("hashchange",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener("load",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener("popstate",(function(){h(0,n>1)}),(0,A.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var it=i(3333);class ot extends b{static featureName=it.TZ;constructor(e,t=!0){super(e,it.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled];p.RI&&e.init.user_actions.enabled&&(it.Zp.forEach((e=>(0,A.sp)(e,(e=>(0,x.p)("ua",[e],void 0,this.featureName,this.ee)),!0))),it.qN.forEach((e=>(0,A.sp)(e,(e=>(0,x.p)("ua",[e],void 0,this.featureName,this.ee)))))),r.some((e=>e))?this.importAggregator(e):this.deregisterDrain()}}var at=i(993),st=i(3785);class ct extends b{static featureName=at.TZ;constructor(e,t=!0){super(e,at.TZ,t);const r=this.ee;this.ee.on("wrap-logger-end",(function([e]){const{level:t,customAttributes:n}=this;(0,st.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t,r){super(r),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=>e.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||"agent"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=>a.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=>{if(!t[r.featureName]&&r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa&&r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa&&r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=>!(e in this.features)));n.length>0&&(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[he,w,N,Ne,_e,_,D,ot,ct,je,nt],loaderType:"spa"})})()})(); </script><link rel="preconnect" href="https://cdn.cookielaw.org"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin="anonymous"/><link rel="preconnect" href="https://fonts.googleapis.com" crossorigin="anonymous"/><link rel="preconnect" href="https://www.googletagmanager.com"/><link rel="stylesheet" href="/build/_assets/styles.generated-IVZR5GKI.css"/><link rel="stylesheet" href="/build/_assets/brand.generated-PZFOD3QD.css"/><link rel="stylesheet" href="https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900&amp;display=swap"/><link rel="stylesheet" href="https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900&amp;display=swap"/><link rel="icon" type="image/x-icon" href="/build/_assets/darkreading-DSJITCUD.ico"/><noscript><style type="text/css">.gptHideContent { opacity: 1!important; }</style></noscript><script src="https://loader.bridged.media/bridged-agent.js"></script><script type="text/javascript" src="https://cdn.cookielaw.org/consent/4b083961-e2ac-4755-8801-f7c83a5fb187/OtAutoBlock.js"></script><script type="text/javascript" src="https://cdn.cookielaw.org/scripttemplates/otSDKStub.js" data-domain-script="4b083961-e2ac-4755-8801-f7c83a5fb187"></script><script async="" src="//static.adsafeprotected.com/iasPET.1.js"></script><script async="" src="https://securepubads.g.doubleclick.net/tag/js/gpt.js" type="text/javascript"></script></head><body class="brand-darkreading gptHideContent"><noscript></noscript><div id="bigsky_v"></div><div id="fb-root"></div><div id="welcome_v"></div><main data-theme="theme1" class="Provider"><div data-testid="ad_blocker" class="ads ad adsbox doubleclick ad-placement carbon-ads" style="height:1px;width:1px;position:absolute;left:-999em;top:-999em"></div><div><div data-template="layout" class="Layout"><nav data-module="navigation" aria-label="navigation" class="Navigation"><div data-testid="header" class="Navigation-HeaderWrapper"><div class="FullScreenBackground Navigation-HeaderBackground"></div><div class="Navigation-Header"><div class="InformaBar" data-component="informa-bar"><div class="InformaBar-ContentSection InformaBar-ContentSection_hidden" data-testid="informa-bar-content-section"><div class="InformaBar-LeftSection" data-testid="informa-bar-left-section"><div>Dark Reading is part of the Informa TechTarget Division of Informa PLC</div><div><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/" title="Informa PLC" target="_blank" rel="noreferrer">Informa PLC</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/about-us/" title="ABOUT US" target="_blank" rel="noreferrer">ABOUT US</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/investors/" title="INVESTOR RELATIONS" target="_blank" rel="noreferrer">INVESTOR RELATIONS</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/talent/" title="TALENT" target="_blank" rel="noreferrer">TALENT</a></div></div><div class="InformaBar-RightSection" data-testid="informa-bar-right-section">This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC&#x27;s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726.</div></div><div class="InformaBar-LogoSection" data-testid="informa-bar-logo-section" role="button" tabindex="0" aria-label="Open Informa bar"><div class="InformaBar-LogoWrapper"><img class="InformaBar-Logo" src="/build/_assets/informaLogoWhite-RZAE7EJI.png" alt="Logo Informa"/></div><span class="InformaBar-IconWrapper InformaBar-IconWrapper_closed"><svg viewBox="0 0 320 512" aria-hidden="true" focusable="false" role="img" xml:space="preserve" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" fill="currentColor" height="100%"><path fill="#ffffff" d="M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z"></path></svg></span></div></div></div></div><div class="Navigation-SecondaryMenuWrapper"><div class="FullScreenBackground Navigation-SecondaryMenuBackground"></div><div class="Navigation-SecondaryMenu"><nav data-testid="SecondaryMenu" class="SecondaryMenu"><a class="SecondaryMenu-Link" data-discover="true" href="/program/black-hat">Black Hat News</a><a class="SecondaryMenu-Link" data-discover="true" href="/program/omdia-cybersecurity">Omdia Cybersecurity</a><a class="SecondaryMenu-Link" target="_blank" href="https://reg.darkreading.com/media-kit?kcode=drsitehd">Advertise</a></nav></div></div><div style="padding-top:0px"></div><div id="navigation-header" class="Navigation-NavBase"><div data-testid="navBase" class="NavBase"><div class="NavBase-Content"><div class="FullScreenBackground NavBase-SecondaryMenuBackground"></div><div class="NavBase-HeaderWrapper"><div class="NavBase-IconsWrapper"><button data-testid="navBase-megaMenuButton" class="NavBase-MegaMenuButton" aria-label="Open Mega menu"><span data-component="icon" data-name="Bars" class="NavBase-MegaMenuIcon NavBase-MegaMenuIcon_iconVariant_small NavBase-MegaMenuIcon_iconType_bars" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><button data-testid="SearchButtonDesktop" class="NavBase-SearchButtonDesktop" aria-label="Open Search"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_large NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><button data-testid="SearchButtonTablet" class="NavBase-SearchButtonTablet" aria-label="Open Search in MegaMenu"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_small NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div><div class="NavBase-LogoWrapper"><button data-testid="navBase-LogoMegaMenuButton" class="NavBase-LogoMegaMenuButton" aria-label="Open Mega menu"><span data-component="icon" data-name="Bars" class="NavBase-LogoMegaMenuIcon NavBase-LogoMegaMenuIcon_iconVariant_small NavBase-LogoMegaMenuIcon_iconType_bars" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><a class="NavBase-Logo" data-discover="true" href="/"><img data-testid="logo-image" data-component="image" class="NavBase-LogoImage" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg?width=476&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg?width=476&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Dark Reading Logo" title="Dark Reading Logo"/></a></div><div class="NavBase-RegisterWrapper"><div data-module="newsletter-signup-promo"><div class="NewsletterSignupPromo-Button NewsletterSignupPromo-Button_small NewsletterSignupButton"><a data-component="button" data-testid="headerSmallNewsletterButton" class="Button Button_size_small Button_variant_primaryFilled" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi" target="_blank" rel="nofollow" data-name="subscribe-nav" data-action-type="sign-up"><span data-component="icon" data-name="Email" class="Button-Icon Button-Icon_position_left" style="mask-image:url(/build/_assets/Email-47H7P533.svg);-webkit-mask-image:url(/build/_assets/Email-47H7P533.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div><div class="NewsletterSignupPromo-Button NewsletterSignupPromo-Button_medium NewsletterSignupButton"><div data-component="social-share" class="SocialShare SocialShare_variant_layout Layout-SocialShare"><a target="_blank" rel="noreferrer" aria-label="Twitter" class="Layout-SocialLink" href="https://twitter.com/DarkReading"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Twitter" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_twitter" style="mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);-webkit-mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Linkedin" class="Layout-SocialLink" href="https://www.linkedin.com/company/dark-reading/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Linkedin" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_linkedin" style="mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);-webkit-mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Facebook" class="Layout-SocialLink" href="https://www.facebook.com/darkreadingcom/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Facebook" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_facebook" style="mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);-webkit-mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Youtube" class="Layout-SocialLink" href="https://www.youtube.com/@DarkReadingOfficialYT"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Youtube" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_youtube" style="mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);-webkit-mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="RSS" class="Layout-SocialLink" href="https://www.darkreading.com/rss.xml"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="RSS" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_rss" style="mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);-webkit-mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="GoogleNews" class="Layout-SocialLink" href="https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&amp;oc=3&amp;hl=en-US&amp;gl=US"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="GoogleNews" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_googleNews" style="mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);-webkit-mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a></div><a data-component="button" data-testid="headerMediumNewsletterButton" class="Button Button_size_medium Button_variant_primaryFilled" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi" target="_blank" rel="nofollow" data-name="subscribe-nav" data-action-type="sign-up"><span data-component="icon" data-name="Email" class="Button-Icon Button-Icon_position_left" style="mask-image:url(/build/_assets/Email-47H7P533.svg);-webkit-mask-image:url(/build/_assets/Email-47H7P533.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div></div><button data-testid="RegisterSearchButton" class="NavBase-RegisterSearchButton" aria-label="Open Search in MegaMenu"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_large NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div><div class="NavBase-SearchWrapper"><div class="FullScreenBackground NavBase-SearchBackground"></div><button data-testid="SearchCloseButton" class="NavBase-SearchCloseButton" aria-label="Close Search"><span data-component="icon" data-name="Close" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_medium NavBase-SearchIcon_iconType_close" style="mask-image:url(/build/_assets/Close-KKOYAUD6.svg);-webkit-mask-image:url(/build/_assets/Close-KKOYAUD6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div></div><div class="Navigation-MainMenu"><div data-testid="mainMenu"><div class="FullScreenBackground MainMenu-BackgroundSubmenu"></div><div class="FullScreenBackground MainMenu-BackgroundMenuItem"></div><div class="MainMenu-Content"><div class="MainMenu-MegaMenuButtonWrapper"><button data-testid="mainMenu-MegaMenuButton" aria-label="Open MegaMenu" class="MainMenu-MegaMenuButton"><span data-component="icon" data-name="Bars" class="MainMenu-MegaMenuIcon" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div><div class="MainMenu-ItemsWrapper" role="menu"><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Cybersecurity Topics"><span class="MainMenu-MainTitle">Cybersecurity Topics<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/application-security">Application Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/cybersecurity-careers">Cybersecurity Careers</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cloud-security">Cloud Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyber-risk">Cyber Risk</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-analytics">Cybersecurity Analytics</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyber-risk/data-privacy">Data Privacy</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/endpoint-security">Endpoint Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ics-ot-security">ICS/OT Security</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/identity-access-management-security">Identity &amp; Access Mgmt Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/vulnerabilities-threats/insider-threats">Insider Threats</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ics-ot-security/iot">IoT</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/endpoint-security/mobile-security">Mobile Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/perimeter">Perimeter</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/physical-security">Physical Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/endpoint-security/remote-workforce">Remote Workforce</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/threat-intelligence">Threat Intelligence</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/vulnerabilities-threats">Vulnerabilities &amp; Threats</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of World "><span class="MainMenu-MainTitle">World <span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/program/dr-global">DR Global</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/keyword/middle-east-africa">Middle East &amp; Africa</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/keyword/asia-pacific">Asia Pacific</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent SubMenu-MoreContent_noRecent" data-discover="true" href="/program/dr-global"><span class="SubMenu-SeeMoreText">See All</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div></div></div></div></div></div><div class="MainMenu-TitleWrapper"><a class="MainMenu-Title" data-discover="true" href="/program/the-edge">The Edge</a></div><div class="MainMenu-TitleWrapper"><a class="MainMenu-Title" data-discover="true" href="/program/dr-technology">DR Technology</a></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Events"><span class="MainMenu-MainTitle">Events<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/events">Upcoming Events</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/podcasts">Podcasts</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Webinar">Webinars</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent SubMenu-MoreContent_noRecent" data-discover="true" href="/events"><span class="SubMenu-SeeMoreText">SEE ALL</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Resources"><span class="MainMenu-MainTitle">Resources<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources">Library</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" rel="nofollow" target="_blank" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi">Newsletters</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/podcasts">Podcasts</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Report">Reports</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/videos">Videos</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Webinar">Webinars</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Whitepaper">Whitepapers</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/keyword/partner-perspectives">Partner Perspectives</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent SubMenu-MoreContent_noRecent" data-discover="true" href="/resources"><span class="SubMenu-SeeMoreText">SEE ALL</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div></div></div></div></div></div></div><div class="MainMenu-SearchButtonWrapper"><button data-testid="mainMenu-SearchButton" aria-label="Open Search" class="MainMenu-SearchButton"><span data-component="icon" data-name="Search" class="MainMenu-SearchButtonIcon" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div><div class="MainMenu-SearchWrapper"><div class="FullScreenBackground MainMenu-SearchBackground MainMenu-SearchBackground_withSearchBar"></div><button data-testid="mainMenu-SearchCloseButton" class="MainMenu-SearchCloseButton" aria-label="Close Search"><span data-component="icon" data-name="Close" class="MainMenu-SearchCloseIcon" style="mask-image:url(/build/_assets/Close-KKOYAUD6.svg);-webkit-mask-image:url(/build/_assets/Close-KKOYAUD6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div></div></div></nav><section class="Layout-Section"><div id="iiris-identity" data-testid="iris-identity"></div><div data-template="topic-list"><div data-template="list-content" class="ListContent"><div class="TwoColumnLayout"><div id="portal-root"></div><div class="TwoColumnLayout-Head"><div class="TopicList-Head"><ul data-component="breadcrumb" class="Breadcrumb TopicList-Breadcrumbs"><li class="Breadcrumb-ListItem"><span data-component="icon" data-name="ChevronRight" class="Breadcrumb-DividerIcon Breadcrumb-PrevIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><a class="Breadcrumb-GetText Breadcrumb-GetText_isNearLastItem" data-testid="breadcrumb-link" data-discover="true" href="/">Home</a><span data-component="icon" data-name="ChevronRight" class="Breadcrumb-DividerIcon Breadcrumb-NextIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></li><li class="Breadcrumb-ListItem"><a class="Breadcrumb-GetText Breadcrumb-GetText_isLastItem" data-testid="breadcrumb-link" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></li></ul><div data-module="category-header" class="CategoryHeader CategoryHeader_primaryTitle"><div class="CategoryHeader-TitleWrapper CategoryHeader-TitleWrapper_primaryTitle"><div class="CategoryHeader-TitleContent"><h1 class="CategoryHeader-Title CategoryHeader-Title_primary" data-testid="category-header-title">Cyberattacks &amp; Data Breaches</h1></div><div class="CategoryHeader-SponsorAdsWrapper" data-testid="category-header-sponsor-ads"></div></div></div></div></div><div class="TwoColumnLayout-Content"><div class="TwoColumnLayout-Body"><div class="ListContent-Body" data-testid="list-content-body"><div class="ContentPreview ListContent-Content ListContent-Content_featured" data-module="content-preview" data-variant="summary"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_summary"><a data-testid="thumbnail" data-discover="true" href="/cyberattacks-data-breaches/chinese-hacker-pwns-81k-sophos-devices-with-zero-day-bug"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Department of State sign in front of a building </span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltac510e8eb99b81bb/66049de32485e72d8ed53763/Department_of_State_B_Christopher_Alamy.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltac510e8eb99b81bb/66049de32485e72d8ed53763/Department_of_State_B_Christopher_Alamy.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberattacksDataBreaches ContentPreview-Category" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a><div class="ArticlePreview"><div class="ArticlePreview-Body"><a class="ArticlePreview-Title ArticlePreview-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/chinese-hacker-pwns-81k-sophos-devices-with-zero-day-bug">Chinese Hacker Pwns 81K Sophos Devices With Zero-Day Bug</a><a class="ArticlePreview-Title ArticlePreview-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/chinese-hacker-pwns-81k-sophos-devices-with-zero-day-bug">Chinese Hacker Pwns 81K Sophos Devices With Zero-Day</a><p data-testid="preview-card-summary" class="ArticlePreview-Summary">The US State Department has offered a $10 million reward for Guan Tianfeng, who has been accused of developing and testing a critical SQL injection flaw with a CVSS score of 9.8 used in Sophos attacks.</p><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_summary Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Kristina Beek, Associate Editor, Dark Reading" data-discover="true" href="/author/kristinabeek"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2248772495e9caeb/64f17d73018a7c55e8822fc1/KristinaB.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2248772495e9caeb/64f17d73018a7c55e8822fc1/KristinaB.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Kristina Beek, Associate Editor, Dark Reading" title="Picture of Kristina Beek, Associate Editor, Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/kristinabeek">Kristina Beek, Associate Editor, Dark Reading</a></div></div></div><div class="ArticlePreview-Footer"><span class="ArticlePreview-Date">Dec 11, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ListContent-Content ListContent-Content_latest"><div class="ListContent-ContentWrapper"><div class="ListContent-ContentContainer"><div class="ContentPreview ListContent-LatestItem" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_big"><a data-testid="thumbnail" data-discover="true" href="/cyberattacks-data-breaches/krispy-kreme-doughnut-delivery-cooked-cyberattack"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Krispy Kreme doughnut assortment on plate</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt14c3ba617c41541b/675a08d8e1616ceb1427164f/krispy_kreme_Matthew_Horwood_Alamy_Stock_Photo.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt14c3ba617c41541b/675a08d8e1616ceb1427164f/krispy_kreme_Matthew_Horwood_Alamy_Stock_Photo.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberattacksDataBreaches ContentPreview-Category" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/krispy-kreme-doughnut-delivery-cooked-cyberattack">Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/krispy-kreme-doughnut-delivery-cooked-cyberattack">Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/becky-bracken">Becky Bracken, Senior Editor, Dark Reading</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Dec 11, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview ListContent-LatestItem" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_big"><a data-testid="thumbnail" data-discover="true" href="/cyberattacks-data-breaches/researchers-crack-microsoft-azure-mfa-hour"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">A woman sitting at a laptop and holding a mobile device, the screens of both displaying a green check mark in a circle</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt798f3186eb2cd32e/675968862190e33bc7f9319a/MFA-Fabio_Principe-AdobeStock.jpeg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt798f3186eb2cd32e/675968862190e33bc7f9319a/MFA-Fabio_Principe-AdobeStock.jpeg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberattacksDataBreaches ContentPreview-Category" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/researchers-crack-microsoft-azure-mfa-hour">Researchers Crack Microsoft Azure MFA in an Hour</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/researchers-crack-microsoft-azure-mfa-hour">Researchers Crack Microsoft Azure MFA in an Hour</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/elizabeth-montalbano">Elizabeth Montalbano, Contributing Writer</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Dec 11, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div><div class="ListContent-ContentWrapper"><div class="ListContent-ContentContainer"><div class="ContentPreview ListContent-LatestItem" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_small"><a data-testid="thumbnail" data-discover="true" href="/cyberattacks-data-breaches/cybersecurity-lessons-from-3-public-breaches"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">A stop sign that misspells it SOTP. To err is human.</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt0b5bdae5ee8f5433/6758b8c00203db1c6aca40ec/sotp-Alfonso_Fabio_Iozzino-alamy.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt0b5bdae5ee8f5433/6758b8c00203db1c6aca40ec/sotp-Alfonso_Fabio_Iozzino-alamy.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberattacksDataBreaches ContentPreview-Category" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/cybersecurity-lessons-from-3-public-breaches">Cybersecurity Lessons From 3 Public Breaches</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/cybersecurity-lessons-from-3-public-breaches">Cybersecurity Lessons From 3 Public Breaches</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dmytro-tereshchenko">Dmytro Tereshchenko</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Dec 11, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview ListContent-LatestItem" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_small"><a data-testid="thumbnail" data-discover="true" href="/cyberattacks-data-breaches/tips-preventing-breaches-2025"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Hand reaching into a screen of 1s and 0s</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt15c2853fa69a58ba/673f45b5df958859a25544ab/Breach_(1800)_Brain_light_Alamy.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt15c2853fa69a58ba/673f45b5df958859a25544ab/Breach_(1800)_Brain_light_Alamy.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberattacksDataBreaches ContentPreview-Category" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/tips-preventing-breaches-2025">Tips for Preventing Breaches in 2025</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/tips-preventing-breaches-2025">Tips for Preventing Breaches in 2025</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/pukar-c-hamal">Pukar C. Hamal</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Dec 11, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview ListContent-LatestItem" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_small"><a data-testid="thumbnail" data-discover="true" href="/cyberattacks-data-breaches/governments-telcos-chinas-hacking-typhoons"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">A globe overlaid with code</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt79352623e0f7eee0/67576a4fc70f33855a14205a/Ar_TH-cybersecurity-globe-shutterstock.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt79352623e0f7eee0/67576a4fc70f33855a14205a/Ar_TH-cybersecurity-globe-shutterstock.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberattacksDataBreaches ContentPreview-Category" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/governments-telcos-chinas-hacking-typhoons">Governments, Telcos Ward Off China's Hacking Typhoons</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/governments-telcos-chinas-hacking-typhoons">Governments, Telcos Ward Off China's Hacking Typhoons</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/robert-lemos">Robert Lemos, Contributing Writer</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Dec 11, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Cables plugged into a network switch" data-discover="true" href="/cyberattacks-data-breaches/fcc-new-cybersecurity-rules-telecoms"><div title="Cables plugged into a network switch"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte17bc7f9dced30f8/67598def098d3995d4241885/network-attack-HernanSchmidt-alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte17bc7f9dced30f8/67598def098d3995d4241885/network-attack-HernanSchmidt-alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Cables plugged into a network switch" title="Cables plugged into a network switch"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/fcc-new-cybersecurity-rules-telecoms">FCC Proposes New Cybersecurity Rules for Telecoms</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/fcc-new-cybersecurity-rules-telecoms">FCC Proposes New Cybersecurity Rules for Telecoms</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 10, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jennifer Lawinski" data-discover="true" href="/author/jennifer-lawinski"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Jennifer Lawinski" title="Picture of Jennifer Lawinski"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jennifer-lawinski">Jennifer Lawinski</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Writer</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: A patchwork quilt" data-discover="true" href="/application-security/microsoft-zero-day-critical-rces-patch-tuesday"><div title="A patchwork quilt"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt639e15f3db4adfc3/6758b7d51032ca38e01f0c90/patch-Zoonar_GmbH-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt639e15f3db4adfc3/6758b7d51032ca38e01f0c90/patch-Zoonar_GmbH-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="A patchwork quilt" title="A patchwork quilt"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_applicationSecurity ListPreview-Keyword" data-discover="true" href="/application-security">Application Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/application-security/microsoft-zero-day-critical-rces-patch-tuesday">Actively Exploited Zero-Day, Critical RCEs Lead Microsoft Patch Tuesday</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/application-security/microsoft-zero-day-critical-rces-patch-tuesday">Microsoft Fixes Active Zero-Day, Critical RCEs on Patch Tuesday</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 10, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Tara Seals, Managing Editor, News, Dark Reading" data-discover="true" href="/author/tara-seals"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt74c35947c6a4996b/64f1714aa5678002330c4412/Tara-Seals-Headshot2.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt74c35947c6a4996b/64f1714aa5678002330c4412/Tara-Seals-Headshot2.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Tara Seals, Managing Editor, News, Dark Reading" title="Picture of Tara Seals, Managing Editor, News, Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/tara-seals">Tara Seals, Managing Editor, News, Dark Reading</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: The words &quot;Zero-day exploit&quot; on a computer keyboard." data-discover="true" href="/cyberattacks-data-breaches/termite-ransomware-behind-cleo-zero-day-attacks"><div title=" The words &quot;Zero-day exploit&quot; on a computer keyboard."><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltca94707d9eb540ff/67589aeeae823361d7d14794/0day_znakki_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltca94707d9eb540ff/67589aeeae823361d7d14794/0day_znakki_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt=" The words &quot;Zero-day exploit&quot; on a computer keyboard." title=" The words &quot;Zero-day exploit&quot; on a computer keyboard."/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/termite-ransomware-behind-cleo-zero-day-attacks">'Termite' Ransomware Likely Behind Cleo Zero-Day Attacks</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/termite-ransomware-behind-cleo-zero-day-attacks">'Termite' Ransomware Likely Behind Cleo Zero-Day Attacks</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 10, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jai Vijayan, Contributing Writer" data-discover="true" href="/author/jai-vijayan"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Jai Vijayan, Contributing Writer" title="Picture of Jai Vijayan, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jai-vijayan">Jai Vijayan, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: The Debating Chamber of the Scottish Parliament in Holyrood, Edinburgh, Scotland" data-discover="true" href="/cyberattacks-data-breaches/scottish-parliament-tv-risk-deepfakes"><div title="The Debating Chamber of the Scottish Parliament in Holyrood, Edinburgh, Scotland"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt5db2efbed288c5d5/675883000203db7e28ca401d/scottishparliment1800_Norman_Pogson_alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt5db2efbed288c5d5/675883000203db7e28ca401d/scottishparliment1800_Norman_Pogson_alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="The Debating Chamber of the Scottish Parliament in Holyrood, Edinburgh, Scotland" title="The Debating Chamber of the Scottish Parliament in Holyrood, Edinburgh, Scotland"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/scottish-parliament-tv-risk-deepfakes">Scottish Parliament TV at Risk From Deepfakes</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/scottish-parliament-tv-risk-deepfakes">Scottish Parliament TV at Risk From Deepfakes</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 10, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Kristina Beek, Associate Editor, Dark Reading" data-discover="true" href="/author/kristinabeek"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2248772495e9caeb/64f17d73018a7c55e8822fc1/KristinaB.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2248772495e9caeb/64f17d73018a7c55e8822fc1/KristinaB.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Kristina Beek, Associate Editor, Dark Reading" title="Picture of Kristina Beek, Associate Editor, Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/kristinabeek">Kristina Beek, Associate Editor, Dark Reading</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Letters AWS in white with a yellow arrow pointing to the right underneath against a black backdrop" data-discover="true" href="/endpoint-security/cybercrime-gangs-steal-thousands-aws-credentials"><div title="Letters AWS in white with a yellow arrow pointing to the right underneath against a black backdrop"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf2d32eda0b327f90/6758361719771e7dfba856f5/AWS-GK_Images-Alamy.png?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf2d32eda0b327f90/6758361719771e7dfba856f5/AWS-GK_Images-Alamy.png?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Letters AWS in white with a yellow arrow pointing to the right underneath against a black backdrop" title="Letters AWS in white with a yellow arrow pointing to the right underneath against a black backdrop"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_endpointSecurity ListPreview-Keyword" data-discover="true" href="/endpoint-security">Endpoint Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/endpoint-security/cybercrime-gangs-steal-thousands-aws-credentials">Cybercrime Gangs Abscond With Thousands of Orgs' AWS Credentials</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/endpoint-security/cybercrime-gangs-steal-thousands-aws-credentials">Cybercrime Gangs Abscond With 1000s of AWS Credentials</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 10, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Elizabeth Montalbano, Contributing Writer" data-discover="true" href="/author/elizabeth-montalbano"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Elizabeth Montalbano, Contributing Writer" title="Picture of Elizabeth Montalbano, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/elizabeth-montalbano">Elizabeth Montalbano, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Metal chain with a broken link" data-discover="true" href="/vulnerabilities-threats/lessons-largest-software-supply-chain-incidents"><div title="Metal chain with a broken link"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltaff16487233e037f/66d5c1d6eb420ceb806ee6ee/Chain(1800)_Zoonar_GmbH_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltaff16487233e037f/66d5c1d6eb420ceb806ee6ee/Chain(1800)_Zoonar_GmbH_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Metal chain with a broken link" title="Metal chain with a broken link"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_vulnerabilitiesThreats ListPreview-Keyword" data-discover="true" href="/vulnerabilities-threats">Vulnerabilities &amp; Threats</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/vulnerabilities-threats/lessons-largest-software-supply-chain-incidents">Lessons From the Largest Software Supply Chain Incidents</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/vulnerabilities-threats/lessons-largest-software-supply-chain-incidents">Lessons From the Largest Software Supply Chain Incidents</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 10, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Eldan Ben-Haim" data-discover="true" href="/author/eldan-ben-haim"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt54db24db2bdce760/67584b6ee1616c4955270b3a/eldan.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt54db24db2bdce760/67584b6ee1616c4955270b3a/eldan.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Eldan Ben-Haim" title="Picture of Eldan Ben-Haim"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/eldan-ben-haim">Eldan Ben-Haim</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Chief Architect Officer, Apiiro</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: The Visual Studio Code logo" data-discover="true" href="/cyberattacks-data-breaches/operation-digital-eye-attack-targets-european-it-orgs"><div title="The Visual Studio Code logo"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf107a8b2df047202/67573f4aa643a9191dd33405/VS_Code-Araki_Illustrations-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf107a8b2df047202/67573f4aa643a9191dd33405/VS_Code-Araki_Illustrations-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="The Visual Studio Code logo" title="The Visual Studio Code logo"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/operation-digital-eye-attack-targets-european-it-orgs">Sprawling 'Operation Digital Eye' Attack Targets European IT Orgs</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/operation-digital-eye-attack-targets-european-it-orgs">'Operation Digital Eye' Attack Targets European IT Orgs</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 10, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Nate Nelson, Contributing Writer" data-discover="true" href="/author/nate-nelson"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Nate Nelson, Contributing Writer" title="Picture of Nate Nelson, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/nate-nelson">Nate Nelson, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Gloved hand stealing money out of man&#x27;s shirt pocket" data-discover="true" href="/cyberattacks-data-breaches/millionaire-airbnb-phishing-ring-busted-police"><div title="Gloved hand stealing money out of man&#x27;s shirt pocket"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt79f0121dcc99ca87/67575396098d3937b5240d57/thief_stealing_money_Hajrudin_Hodzic_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt79f0121dcc99ca87/67575396098d3937b5240d57/thief_stealing_money_Hajrudin_Hodzic_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Gloved hand stealing money out of man&#x27;s shirt pocket" title="Gloved hand stealing money out of man&#x27;s shirt pocket"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/millionaire-airbnb-phishing-ring-busted-police">Millionaire Airbnb Phishing Ring Busted Up by Police</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/millionaire-airbnb-phishing-ring-busted-police">Millionaire Airbnb Phishing Ring Busted Up by Police</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 9, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Becky Bracken, Senior Editor, Dark Reading" data-discover="true" href="/author/becky-bracken"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07f8ecb5868dd4fd/6750aa66113e14656849e053/becky_mug_2024.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07f8ecb5868dd4fd/6750aa66113e14656849e053/becky_mug_2024.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Becky Bracken, Senior Editor, Dark Reading" title="Picture of Becky Bracken, Senior Editor, Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/becky-bracken">Becky Bracken, Senior Editor, Dark Reading</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: QR code displayed on a mobile device next to lines of code with the outline of a shield with a padlock in the middle on top" data-discover="true" href="/endpoint-security/attackers-qr-codes-bypass-browser-isolation"><div title="QR code displayed on a mobile device next to lines of code with the outline of a shield with a padlock in the middle on top"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7daf9e4993e26979/6756da557f520448ae775fc7/sasin_paraksa-qr-code-security-shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7daf9e4993e26979/6756da557f520448ae775fc7/sasin_paraksa-qr-code-security-shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="QR code displayed on a mobile device next to lines of code with the outline of a shield with a padlock in the middle on top" title="QR code displayed on a mobile device next to lines of code with the outline of a shield with a padlock in the middle on top"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_endpointSecurity ListPreview-Keyword" data-discover="true" href="/endpoint-security">Endpoint Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/endpoint-security/attackers-qr-codes-bypass-browser-isolation">Attackers Can Use QR Codes to Bypass Browser Isolation</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/endpoint-security/attackers-qr-codes-bypass-browser-isolation">Attackers Can Use QR Codes to Bypass Browser Isolation</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 9, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Elizabeth Montalbano, Contributing Writer" data-discover="true" href="/author/elizabeth-montalbano"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Elizabeth Montalbano, Contributing Writer" title="Picture of Elizabeth Montalbano, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/elizabeth-montalbano">Elizabeth Montalbano, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem ListContent-ContentItem_borderless" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Globe with cybersecurity symbols circling it" data-discover="true" href="/vulnerabilities-threats/large-scale-incidents-art-vulnerability-prioritization"><div title="Globe with cybersecurity symbols circling it"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt554adda1d371f224/673df913f449ce5a206c9e6a/Cyersecurity_globe_1800_Skorzewiak_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt554adda1d371f224/673df913f449ce5a206c9e6a/Cyersecurity_globe_1800_Skorzewiak_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Globe with cybersecurity symbols circling it" title="Globe with cybersecurity symbols circling it"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_vulnerabilitiesThreats ListPreview-Keyword" data-discover="true" href="/vulnerabilities-threats">Vulnerabilities &amp; Threats</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/vulnerabilities-threats/large-scale-incidents-art-vulnerability-prioritization">Large-Scale Incidents &amp; the Art of Vulnerability Prioritization</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/vulnerabilities-threats/large-scale-incidents-art-vulnerability-prioritization">Large-Scale Incidents &amp; the Art of Vulnerability Prioritization</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 9, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Audra Streetman" data-discover="true" href="/author/audra-streetman"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd435b0d3c70140df/675209b3d09ea20440d8f0a7/Audra_Streetman_(4)_(1).jpeg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd435b0d3c70140df/675209b3d09ea20440d8f0a7/Audra_Streetman_(4)_(1).jpeg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Audra Streetman" title="Picture of Audra Streetman"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/audra-streetman">Audra Streetman</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Senior Threat Intelligence Analyst, Splunk</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Person with hands cuffed behind back" data-discover="true" href="/cyberattacks-data-breaches/texas-teen-arrested-scattered-spider-telecom-hacks"><div title="Person with hands cuffed behind back"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99e01e84782cb505/6753602922e63f8a96c7958a/arrest_steven_frame_alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99e01e84782cb505/6753602922e63f8a96c7958a/arrest_steven_frame_alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Person with hands cuffed behind back" title="Person with hands cuffed behind back"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/texas-teen-arrested-scattered-spider-telecom-hacks">Texas Teen Arrested for Scattered Spider Telecom Hacks</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/texas-teen-arrested-scattered-spider-telecom-hacks">Texas Teen Arrested for Scattered Spider Telecom Hacks</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 6, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Becky Bracken, Senior Editor, Dark Reading" data-discover="true" href="/author/becky-bracken"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07f8ecb5868dd4fd/6750aa66113e14656849e053/becky_mug_2024.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07f8ecb5868dd4fd/6750aa66113e14656849e053/becky_mug_2024.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Becky Bracken, Senior Editor, Dark Reading" title="Picture of Becky Bracken, Senior Editor, Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/becky-bracken">Becky Bracken, Senior Editor, Dark Reading</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: DMCA logo and gavel sitting on a computer keyboard" data-discover="true" href="/cyber-risk/library-congress-ai-legal-guidance-researchers"><div title="DMCA logo and gavel sitting on a computer keyboard"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt49bc5cf8b0ba0080/6752181394ad217545d4229c/Vitalii-Vodolazskyi-DMCA-keyboard-shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt49bc5cf8b0ba0080/6752181394ad217545d4229c/Vitalii-Vodolazskyi-DMCA-keyboard-shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="DMCA logo and gavel sitting on a computer keyboard" title="DMCA logo and gavel sitting on a computer keyboard"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberRisk ListPreview-Keyword" data-discover="true" href="/cyber-risk">Cyber Risk</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-risk/library-congress-ai-legal-guidance-researchers">Library of Congress Offers AI Legal Guidance to Researchers</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-risk/library-congress-ai-legal-guidance-researchers">Library of Congress Offers AI Legal Guidance to Researchers</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 5, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Robert Lemos, Contributing Writer" data-discover="true" href="/author/robert-lemos"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Robert Lemos, Contributing Writer" title="Picture of Robert Lemos, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/robert-lemos">Robert Lemos, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Great Siege Tunnels, Gibraltar, featuring a tableau of seven cannons overlooking Spanish positions " data-discover="true" href="/cloud-security/russias-bluealpha-apt-cloudflare-tunnels"><div title="Great Siege Tunnels, Gibraltar, featuring a tableau of seven cannons overlooking Spanish positions "><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4a5bfeaa660cbace/675221269156dc2f14d3ffda/tunnels-Classic_Image-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4a5bfeaa660cbace/675221269156dc2f14d3ffda/tunnels-Classic_Image-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Great Siege Tunnels, Gibraltar, featuring a tableau of seven cannons overlooking Spanish positions " title="Great Siege Tunnels, Gibraltar, featuring a tableau of seven cannons overlooking Spanish positions "/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_сloudSecurity ListPreview-Keyword" data-discover="true" href="/cloud-security">Сloud Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cloud-security/russias-bluealpha-apt-cloudflare-tunnels">Russia's 'BlueAlpha' APT Hides in Cloudflare Tunnels</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cloud-security/russias-bluealpha-apt-cloudflare-tunnels">Russia's 'BlueAlpha' APT Hides in Cloudflare Tunnels</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 5, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Tara Seals, Managing Editor, News, Dark Reading" data-discover="true" href="/author/tara-seals"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt74c35947c6a4996b/64f1714aa5678002330c4412/Tara-Seals-Headshot2.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt74c35947c6a4996b/64f1714aa5678002330c4412/Tara-Seals-Headshot2.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Tara Seals, Managing Editor, News, Dark Reading" title="Picture of Tara Seals, Managing Editor, News, Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/tara-seals">Tara Seals, Managing Editor, News, Dark Reading</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Abstract image of red human figure surrounded by black human figures" data-discover="true" href="/threat-intelligence/trojan-service-hits-euro-banks-crypto-exchanges"><div title="Abstract image of red human figure surrounded by black human figures"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9e879ab956bceb5b/6752065cfb1d680143b52372/abstract_crime_op_image_baosheng_feng_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9e879ab956bceb5b/6752065cfb1d680143b52372/abstract_crime_op_image_baosheng_feng_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Abstract image of red human figure surrounded by black human figures" title="Abstract image of red human figure surrounded by black human figures"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_threatIntelligence ListPreview-Keyword" data-discover="true" href="/threat-intelligence">Threat Intelligence</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/threat-intelligence/trojan-service-hits-euro-banks-crypto-exchanges">Trojan-as-a-Service Hits Euro Banks, Crypto Exchanges</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/threat-intelligence/trojan-service-hits-euro-banks-crypto-exchanges">Trojan-as-a-Service Hits Euro Banks, Crypto Exchanges</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 5, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Becky Bracken, Senior Editor, Dark Reading" data-discover="true" href="/author/becky-bracken"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07f8ecb5868dd4fd/6750aa66113e14656849e053/becky_mug_2024.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07f8ecb5868dd4fd/6750aa66113e14656849e053/becky_mug_2024.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Becky Bracken, Senior Editor, Dark Reading" title="Picture of Becky Bracken, Senior Editor, Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/becky-bracken">Becky Bracken, Senior Editor, Dark Reading</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Red hooded figures with blacked-out faces with three yellow stars in the upper left of the frame" data-discover="true" href="/cyberattacks-data-breaches/earth-minotaur-exploits-wechat-bugs-spyware-uyghurs"><div title="Red hooded figures with blacked-out faces with three yellow stars in the upper left of the frame"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blteee85674853bdcb9/6751936e9156dc0d82d3fd65/chinaspying_BeeBright_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blteee85674853bdcb9/6751936e9156dc0d82d3fd65/chinaspying_BeeBright_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Red hooded figures with blacked-out faces with three yellow stars in the upper left of the frame" title="Red hooded figures with blacked-out faces with three yellow stars in the upper left of the frame"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/earth-minotaur-exploits-wechat-bugs-spyware-uyghurs">'Earth Minotaur' Exploits WeChat Bugs, Sends Spyware to Uyghurs</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/earth-minotaur-exploits-wechat-bugs-spyware-uyghurs">'Earth Minotaur' Exploits WeChat Bugs, Sends Spyware to Uyghurs</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 5, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Elizabeth Montalbano, Contributing Writer" data-discover="true" href="/author/elizabeth-montalbano"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Elizabeth Montalbano, Contributing Writer" title="Picture of Elizabeth Montalbano, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/elizabeth-montalbano">Elizabeth Montalbano, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: A digital map of Africa, overlaid with padlocks" data-discover="true" href="/cyberattacks-data-breaches/african-law-enforcement-cybercrime-suspects"><div title="A digital map of Africa, overlaid with padlocks"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltaa0c5215b7706817/65ef244e617a0b040a5e0628/golden_dayz-africa-digital-security-shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltaa0c5215b7706817/65ef244e617a0b040a5e0628/golden_dayz-africa-digital-security-shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="A digital map of Africa, overlaid with padlocks" title="A digital map of Africa, overlaid with padlocks"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/african-law-enforcement-cybercrime-suspects">African Law Enforcement Nabs 1,000+ Cybercrime Suspects</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/african-law-enforcement-cybercrime-suspects">African Law Enforcement Nabs 1,000+ Cybercrime Suspects</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 5, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Robert Lemos, Contributing Writer" data-discover="true" href="/author/robert-lemos"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Robert Lemos, Contributing Writer" title="Picture of Robert Lemos, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/robert-lemos">Robert Lemos, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: American and Chinese flags on computer keyboard keys" data-discover="true" href="/cyberattacks-data-breaches/cisa-issue-guidance-telecoms-salt-typhoon-threat"><div title="American and Chinese flags on computer keyboard keys"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9bf7e6a9826c0aea/6750c624093fa132fa7059fc/chinacyber_Weitwinkel_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9bf7e6a9826c0aea/6750c624093fa132fa7059fc/chinacyber_Weitwinkel_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="American and Chinese flags on computer keyboard keys" title="American and Chinese flags on computer keyboard keys"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/cisa-issue-guidance-telecoms-salt-typhoon-threat">CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/cisa-issue-guidance-telecoms-salt-typhoon-threat">CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 4, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jai Vijayan, Contributing Writer" data-discover="true" href="/author/jai-vijayan"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Jai Vijayan, Contributing Writer" title="Picture of Jai Vijayan, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jai-vijayan">Jai Vijayan, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: The title screen for 1988&#x27;s &quot;Spy vs. Spy&quot; arcade game" data-discover="true" href="/threat-intelligence/russian-fsb-hackers-breach-pakistan-storm-0156"><div title="The title screen for 1988&#x27;s &quot;Spy vs. Spy&quot; arcade game"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt31277ae12047e355/6750c009baafbed865706548/Spy_vs_Spy-ArcadeImages-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt31277ae12047e355/6750c009baafbed865706548/Spy_vs_Spy-ArcadeImages-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="The title screen for 1988&#x27;s &quot;Spy vs. Spy&quot; arcade game" title="The title screen for 1988&#x27;s &quot;Spy vs. Spy&quot; arcade game"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_threatIntelligence ListPreview-Keyword" data-discover="true" href="/threat-intelligence">Threat Intelligence</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/threat-intelligence/russian-fsb-hackers-breach-pakistan-storm-0156">Russian FSB Hackers Breach Pakistani APT Storm-0156</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/threat-intelligence/russian-fsb-hackers-breach-pakistan-storm-0156">Russian FSB Hackers Breach Pakistani APT Storm-0156</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 4, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Nate Nelson, Contributing Writer" data-discover="true" href="/author/nate-nelson"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Nate Nelson, Contributing Writer" title="Picture of Nate Nelson, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/nate-nelson">Nate Nelson, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Words &quot;accelerating growth&quot; appear in white text on blue background of wave-like designs, accompanied by the Informa TechTarget logo and company name." data-discover="true" href="/cybersecurity-operations/note-from-editor-in-chief"><div title="Words &quot;accelerating growth&quot; appear in white text on blue background of wave-like designs, accompanied by the Informa TechTarget logo and company name."><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf018e64048346377/674f1e6b33b8f81de8b8aa90/iTT_accelerating-growth_2000_cropped.png?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf018e64048346377/674f1e6b33b8f81de8b8aa90/iTT_accelerating-growth_2000_cropped.png?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Words &quot;accelerating growth&quot; appear in white text on blue background of wave-like designs, accompanied by the Informa TechTarget logo and company name." title="Words &quot;accelerating growth&quot; appear in white text on blue background of wave-like designs, accompanied by the Informa TechTarget logo and company name."/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations ListPreview-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/note-from-editor-in-chief">Note From the Editor-in-Chief</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/note-from-editor-in-chief">Note From the Editor-in-Chief</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 3, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Kelly Jackson Higgins, Editor-in-Chief, Dark Reading" data-discover="true" href="/author/kelly-jackson-higgins"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9c6bc824e889565c/64f151b922fa7521c6d8d020/KJH.PNG?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9c6bc824e889565c/64f151b922fa7521c6d8d020/KJH.PNG?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Kelly Jackson Higgins, Editor-in-Chief, Dark Reading" title="Picture of Kelly Jackson Higgins, Editor-in-Chief, Dark Reading"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/kelly-jackson-higgins">Kelly Jackson Higgins, Editor-in-Chief, Dark Reading</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem ListContent-ContentItem_borderless" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Gold and black spider sitting on a web" data-discover="true" href="/cyberattacks-data-breaches/venom-spider-malware-maas-platform"><div title="Gold and black spider sitting on a web"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt50fc56d7793043ee/674edcb7ffe3c26cf1e5859a/spider_Photo_Spirit_shutterstock.png?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt50fc56d7793043ee/674edcb7ffe3c26cf1e5859a/spider_Photo_Spirit_shutterstock.png?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Gold and black spider sitting on a web" title="Gold and black spider sitting on a web"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/venom-spider-malware-maas-platform">Venom Spider Spins Web of New Malware for MaaS Platform</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/venom-spider-malware-maas-platform">Venom Spider Spins Web of Malware for MaaS Platform</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 3, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Elizabeth Montalbano, Contributing Writer" data-discover="true" href="/author/elizabeth-montalbano"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Elizabeth Montalbano, Contributing Writer" title="Picture of Elizabeth Montalbano, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/elizabeth-montalbano">Elizabeth Montalbano, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Padlock on a keyboard, with the word &quot;Ransomware&quot; on a large red key" data-discover="true" href="/cyberattacks-data-breaches/ransomware-grip-healthcare"><div title="Padlock on a keyboard, with the word &quot;Ransomware&quot; on a large red key"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltddc9deadc402008d/66a942c728f25e14063d1142/Ransomware(1800)_Olekcii_Mach_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltddc9deadc402008d/66a942c728f25e14063d1142/Ransomware(1800)_Olekcii_Mach_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Padlock on a keyboard, with the word &quot;Ransomware&quot; on a large red key" title="Padlock on a keyboard, with the word &quot;Ransomware&quot; on a large red key"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/ransomware-grip-healthcare">Ransomware's Grip on Healthcare</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/ransomware-grip-healthcare">Ransomware's Grip on Healthcare</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 3, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Claudio Gallo" data-discover="true" href="/author/claudio-gallo"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt8422a82193ba68b7/674e13fbab84626cb4c5e82e/Outlook-iwwatou3.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt8422a82193ba68b7/674e13fbab84626cb4c5e82e/Outlook-iwwatou3.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Claudio Gallo" title="Picture of Claudio Gallo"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/claudio-gallo">Claudio Gallo</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Lead Security Engineer, C4HCO</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: a person in a suit looking at a screen of indicators and icons showing threats and networks" data-discover="true" href="/threat-intelligence/aws-launches-new-incident-response-service"><div title="a person in a suit looking at a screen of indicators and icons showing threats and networks"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt67fdf013f7c9ef96/674e26a1a2308aa0156c5b50/incidentresponse-leowolfert-AdobeStock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt67fdf013f7c9ef96/674e26a1a2308aa0156c5b50/incidentresponse-leowolfert-AdobeStock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="a person in a suit looking at a screen of indicators and icons showing threats and networks" title="a person in a suit looking at a screen of indicators and icons showing threats and networks"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_threatIntelligence ListPreview-Keyword" data-discover="true" href="/threat-intelligence">Threat Intelligence</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/threat-intelligence/aws-launches-new-incident-response-service">AWS Launches New Incident Response Service</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/threat-intelligence/aws-launches-new-incident-response-service">AWS Launches New Incident Response Service</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 2, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Dark Reading Staff" data-discover="true" href="/author/dark-reading-staff"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Dark Reading Staff" title="Picture of Dark Reading Staff"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading-staff">Dark Reading Staff</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Dark Reading</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: A stethoscope on a computer keyboard" data-discover="true" href="/cyberattacks-data-breaches/two-nhs-hospitals-targeted-in-separate-cyberattacks"><div title="A stethoscope on a computer keyboard"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt663e948581bcd84b/671aae0f17514d4087bdc56d/healthcare_1800_Dennis_Gross_alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt663e948581bcd84b/671aae0f17514d4087bdc56d/healthcare_1800_Dennis_Gross_alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="A stethoscope on a computer keyboard" title="A stethoscope on a computer keyboard"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/two-nhs-hospitals-targeted-in-separate-cyberattacks">2 UK Hospitals Targeted in Separate Cyberattacks</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/two-nhs-hospitals-targeted-in-separate-cyberattacks">2 UK Hospitals Targeted in Separate Cyberattacks</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 2, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Dark Reading Staff" data-discover="true" href="/author/dark-reading-staff"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Dark Reading Staff" title="Picture of Dark Reading Staff"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading-staff">Dark Reading Staff</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Dark Reading</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Form reading &quot;Do you have a cyber incident response plan?&quot; with &quot;yes&quot; box checked" data-discover="true" href="/cyberattacks-data-breaches/incident-response-playbooks-prepared"><div title="Form reading &quot;Do you have a cyber incident response plan?&quot; with &quot;yes&quot; box checked"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltbfdac51603fbabca/674dc75d355926790d387180/Incident_response_(1800)_Yee_Xin_Tan_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltbfdac51603fbabca/674dc75d355926790d387180/Incident_response_(1800)_Yee_Xin_Tan_Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Form reading &quot;Do you have a cyber incident response plan?&quot; with &quot;yes&quot; box checked" title="Form reading &quot;Do you have a cyber incident response plan?&quot; with &quot;yes&quot; box checked"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/incident-response-playbooks-prepared">Incident Response Playbooks: Are You Prepared?</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/incident-response-playbooks-prepared">Incident Response Playbooks: Are You Prepared?</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Dec 2, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="James Bruhl" data-discover="true" href="/author/james-bruhl"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt221ec76a11b4e0ef/67462cc4872d1effdd1b7417/James_Bruhl_2024_(1).jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt221ec76a11b4e0ef/67462cc4872d1effdd1b7417/James_Bruhl_2024_(1).jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of James Bruhl" title="Picture of James Bruhl"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/james-bruhl">James Bruhl</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Director of Cyber Threat Intelligence, DefenseStorm</span></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: A blue credit card on a fish hook being dangled above a computer keyboard" data-discover="true" href="/application-security/sneaky-skimmer-malware-magento-sites-black-friday"><div title="A blue credit card on a fish hook being dangled above a computer keyboard"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3317719ff4b0bbee/6747152ee2b6b17ae587bdee/cardskimming_Kim_Kuperkova_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3317719ff4b0bbee/6747152ee2b6b17ae587bdee/cardskimming_Kim_Kuperkova_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="A blue credit card on a fish hook being dangled above a computer keyboard" title="A blue credit card on a fish hook being dangled above a computer keyboard"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_applicationSecurity ListPreview-Keyword" data-discover="true" href="/application-security">Application Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/application-security/sneaky-skimmer-malware-magento-sites-black-friday">Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/application-security/sneaky-skimmer-malware-magento-sites-black-friday">Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Elizabeth Montalbano, Contributing Writer" data-discover="true" href="/author/elizabeth-montalbano"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Elizabeth Montalbano, Contributing Writer" title="Picture of Elizabeth Montalbano, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/elizabeth-montalbano">Elizabeth Montalbano, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Vector green digital code rain in a Matrix inspired futuristic style" data-discover="true" href="/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet"><div title="Vector green digital code rain in a Matrix inspired futuristic style"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd9544fe544dde688/674635c9fde1977e265db529/matrix_Kundra_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd9544fe544dde688/674635c9fde1977e265db529/matrix_Kundra_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Vector green digital code rain in a Matrix inspired futuristic style" title="Vector green digital code rain in a Matrix inspired futuristic style"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet">Russian Script Kiddie Assembles Massive DDoS Botnet</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet">Russian Script Kiddie Assembles Massive DDoS Botnet</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jai Vijayan, Contributing Writer" data-discover="true" href="/author/jai-vijayan"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Jai Vijayan, Contributing Writer" title="Picture of Jai Vijayan, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jai-vijayan">Jai Vijayan, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: A still from the famous orgasm scene in &quot;When Harry Met Sally&quot;" data-discover="true" href="/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor"><div title="A still from the famous orgasm scene in &quot;When Harry Met Sally&quot;"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3dd452fdf8cf8240/6746324022170842162612ed/When_Harry_Met_Sally-Collection_Christophel-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3dd452fdf8cf8240/6746324022170842162612ed/When_Harry_Met_Sally-Collection_Christophel-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="A still from the famous orgasm scene in &quot;When Harry Met Sally&quot;" title="A still from the famous orgasm scene in &quot;When Harry Met Sally&quot;"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_applicationSecurity ListPreview-Keyword" data-discover="true" href="/application-security">Application Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor">'RomCom' APT Mounts Zero-Day, Zero-Click Browser Escapes in Firefox, Tor</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor">'RomCom' APT Mounts Zero-Day, Zero-Click Browser Escapes</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Nate Nelson, Contributing Writer" data-discover="true" href="/author/nate-nelson"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Nate Nelson, Contributing Writer" title="Picture of Nate Nelson, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/nate-nelson">Nate Nelson, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Images of nonfungible tokens clustered together on a screen with an index finger hovering above as if to press on one" data-discover="true" href="/application-security/opensea-phishers-aim-drain-crypto-wallets-nft-enthusiasts"><div title="Images of nonfungible tokens clustered together on a screen with an index finger hovering above as if to press on one"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt30cb421135bfdcb4/6745a86f46d743f59c9c15b4/NFT-mundissima-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt30cb421135bfdcb4/6745a86f46d743f59c9c15b4/NFT-mundissima-Alamy.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Images of nonfungible tokens clustered together on a screen with an index finger hovering above as if to press on one" title="Images of nonfungible tokens clustered together on a screen with an index finger hovering above as if to press on one"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_applicationSecurity ListPreview-Keyword" data-discover="true" href="/application-security">Application Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/application-security/opensea-phishers-aim-drain-crypto-wallets-nft-enthusiasts">OpenSea Phishers Aim to Drain Crypto Wallets of NFT Enthusiasts</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/application-security/opensea-phishers-aim-drain-crypto-wallets-nft-enthusiasts">OpenSea NFT Phishers Aim to Drain Crypto Wallets</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Elizabeth Montalbano, Contributing Writer" data-discover="true" href="/author/elizabeth-montalbano"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Elizabeth Montalbano, Contributing Writer" title="Picture of Elizabeth Montalbano, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/elizabeth-montalbano">Elizabeth Montalbano, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview ListContent-ContentItem ListContent-ContentItem_borderless" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Starbucks logo on a storefront" data-discover="true" href="/cyberattacks-data-breaches/ransomware-attack-blue-yonder-starbucks-supermarkets"><div title="Starbucks logo on a storefront"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt76867869c89a9332/6744ed21e7497068a64a1637/starbucks_Ned_Snowman_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt76867869c89a9332/6744ed21e7497068a64a1637/starbucks_Ned_Snowman_shutterstock.jpg?width=300&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Starbucks logo on a storefront" title="Starbucks logo on a storefront"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/ransomware-attack-blue-yonder-starbucks-supermarkets">Ransomware Attack on Blue Yonder Hits Starbucks, Supermarkets</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/ransomware-attack-blue-yonder-starbucks-supermarkets">Ransomware Attack on Blue Yonder Hits Starbucks, Supermarkets</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 25, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jai Vijayan, Contributing Writer" data-discover="true" href="/author/jai-vijayan"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Picture of Jai Vijayan, Contributing Writer" title="Picture of Jai Vijayan, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jai-vijayan">Jai Vijayan, Contributing Writer</a></div></div></div></div></div><nav role="navigation" aria-label="Pagination Navigation" data-component="pagination" class="ListContent-Pagination"><ul class="Pagination-Wrapper"><li><a tabindex="-1" aria-label="Cannot go to Previous page" class="Pagination-Link Pagination-Link_disabled" data-discover="true" href="/cyberattacks-data-breaches"><span class="Pagination-PageWrapper"><span class="Pagination-ArrowIconWrapper Pagination-ArrowIconWrapper_disabled"><span data-component="icon" data-name="ArrowLeft" class="Pagination-ArrowIcon Pagination-ArrowIcon_disabled" style="mask-image:url(/build/_assets/ArrowLeft-LJREXKU3.svg);-webkit-mask-image:url(/build/_assets/ArrowLeft-LJREXKU3.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span><span data-testid="labelText" class="Pagination-Move">Previous</span></span></a></li><li><a tabindex="-1" aria-label="Current page, page 1" class="Pagination-PageNumber Pagination-PageNumber_current" data-discover="true" href="/cyberattacks-data-breaches">1</a></li><li><a tabindex="0" aria-label="Go to page 2" class="Pagination-PageNumber" data-discover="true" href="/cyberattacks-data-breaches?page=2">2</a></li><li><a tabindex="0" aria-label="Go to page 3" class="Pagination-PageNumber" data-discover="true" href="/cyberattacks-data-breaches?page=3">3</a></li><li><a tabindex="0" aria-label="Go to page 4" class="Pagination-PageNumber" data-discover="true" href="/cyberattacks-data-breaches?page=4">4</a></li><li><a tabindex="0" aria-label="Go to page 5" class="Pagination-PageNumber" data-discover="true" href="/cyberattacks-data-breaches?page=5">5</a></li><li class="Pagination-Dots">…</li><li><a tabindex="0" aria-label="Go to page 225" class="Pagination-PageNumber Pagination-PageNumber_desktop" data-discover="true" href="/cyberattacks-data-breaches?page=225">225</a></li><li><a tabindex="0" aria-label="Go to Next page 2" class="Pagination-Link" data-discover="true" href="/cyberattacks-data-breaches?page=2"><span class="Pagination-PageWrapper"><span data-testid="labelText" class="Pagination-Move">Next</span><span class="Pagination-ArrowIconWrapper"><span data-component="icon" data-name="ArrowRight" class="Pagination-ArrowIcon" style="mask-image:url(/build/_assets/ArrowRight-KNUWEVNZ.svg);-webkit-mask-image:url(/build/_assets/ArrowRight-KNUWEVNZ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></span></a></li></ul></nav></div></div><div class="TwoColumnLayout-Sidebar"><div class="Sidebar" data-module="sidebar"><div class="Sidebar-SidebarItem" data-testid="sidebar-item"><div data-module="content-cards" class="ContentCards ContentCards_sidebar"><div class="ContentCards-CardsWrapper ContentCards-CardsWrapper_column"><div class="ContentCards-Header ContentCards-Header_column" data-testid="content-cards-header"><h3 class="ContentCards-Title" data-testid="contentCardsTitle">Editor's Choice</h3></div><div class="ContentCards-Content ContentCards-Content_column"><div class="ContentCards-ContentPreview ContentCards-ContentPreview_column" data-testid="content-preview-column"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/cyberattacks-data-breaches/cisa-issue-guidance-telecoms-salt-typhoon-threat"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">American and Chinese flags on computer keyboard keys</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9bf7e6a9826c0aea/6750c624093fa132fa7059fc/chinacyber_Weitwinkel_shutterstock.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9bf7e6a9826c0aea/6750c624093fa132fa7059fc/chinacyber_Weitwinkel_shutterstock.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberattacksDataBreaches ContentPreview-Category" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks &amp; Data Breaches</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/cisa-issue-guidance-telecoms-salt-typhoon-threat">CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/cisa-issue-guidance-telecoms-salt-typhoon-threat">CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jai-vijayan">Jai Vijayan, Contributing Writer</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Dec 4, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>4 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_column" data-testid="content-preview-column"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/cloud-security/russias-bluealpha-apt-cloudflare-tunnels"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Great Siege Tunnels, Gibraltar, featuring a tableau of seven cannons overlooking Spanish positions </span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4a5bfeaa660cbace/675221269156dc2f14d3ffda/tunnels-Classic_Image-Alamy.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4a5bfeaa660cbace/675221269156dc2f14d3ffda/tunnels-Classic_Image-Alamy.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_сloudSecurity ContentPreview-Category" data-discover="true" href="/cloud-security">Сloud Security</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cloud-security/russias-bluealpha-apt-cloudflare-tunnels">Russia's 'BlueAlpha' APT Hides in Cloudflare Tunnels</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cloud-security/russias-bluealpha-apt-cloudflare-tunnels">Russia's 'BlueAlpha' APT Hides in Cloudflare Tunnels</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/tara-seals">Tara Seals, Managing Editor, News, Dark Reading</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Dec 5, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>2 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_column" data-testid="content-preview-column"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/vulnerabilities-threats/bypass-bug-critical-n-day-mitel-micollab"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Mitel&#x27;s corporate logo on an office building</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltdf491a27738b56da/67520b03e914956c1715c180/Mitel-Kristoffer_Tripplaar-Alamy.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltdf491a27738b56da/67520b03e914956c1715c180/Mitel-Kristoffer_Tripplaar-Alamy.jpg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_vulnerabilitiesThreats ContentPreview-Category" data-discover="true" href="/vulnerabilities-threats">Vulnerabilities &amp; Threats</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/vulnerabilities-threats/bypass-bug-critical-n-day-mitel-micollab">Bypass Bug Revives Critical N-Day in Mitel MiCollab</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/vulnerabilities-threats/bypass-bug-critical-n-day-mitel-micollab">Bypass Bug Revives Critical N-Day in Mitel MiCollab</a><div class="Contributors Contributors_variant_slimline VerticalCard-ContributorsWrapper" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/nate-nelson">Nate Nelson, Contributing Writer</a></div></div></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Dec 5, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>4 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div></div></div></div><div class="Sidebar-SidebarItem" data-testid="sidebar-item"><div data-component="content-list" class="ContentList"><div class="ContentList-Header"><span data-component="icon" data-name="Document" class="ContentList-Icon" style="mask-image:url(/build/_assets/Document-NG4YMZFA.svg);-webkit-mask-image:url(/build/_assets/Document-NG4YMZFA.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="ContentList-Title" data-testid="content-list-title">Reports</span></div><ul class="ContentList-List"><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;qf=w_defa7503&amp;ch=SBX&amp;cid=_analytics_7.300006021&amp;_mc=_analytics_7.300006021"><p class="ContentList-ListItemTitle">IDC Analyst Brief: Enhancing Incident Response with Automated Investigation Workflows</p></a><span class="ContentList-ListItemDate" data-testid="content-list-item-date">Dec 6, 2024</span></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;qf=w_cybo171&amp;ch=&amp;cid=_analytics_7.300006016&amp;_mc=_analytics_7.300006016"><p class="ContentList-ListItemTitle">Managing Third-Party Risk Through Situational Awareness</p></a><span class="ContentList-ListItemDate" data-testid="content-list-item-date">Jul 31, 2024</span></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;qf=w_ingg253&amp;ch=sbx&amp;cid=_analytics_7.300006014&amp;_mc=_analytics_7.300006014"><p class="ContentList-ListItemTitle">2024 InformationWeek US IT Salary Report</p></a><span class="ContentList-ListItemDate" data-testid="content-list-item-date">May 29, 2024</span></li></ul><div class="ContentList-CTAButton"><span data-component="button" role="presentation" class="Button Button_size_medium Button_variant_textLink"><span class="Button-ContentWrapper"><a class="ContentList-CTAText" rel="noreferrer" data-discover="true" href="/resources?types=Report" target="_blank">More Reports</a></span><span data-component="icon" data-name="ChevronRight" class="Button-Icon Button-Icon_position_right" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div></div></div><div class="Sidebar-SidebarItem" data-testid="sidebar-item"><div data-component="content-list" class="ContentList"><div class="ContentList-Header"><span data-component="icon" data-name="ChalkBoard" class="ContentList-Icon" style="mask-image:url(/build/_assets/ChalkBoard-7VYJPH3F.svg);-webkit-mask-image:url(/build/_assets/ChalkBoard-7VYJPH3F.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="ContentList-Title" data-testid="content-list-title">Webinars</span></div><ul class="ContentList-List"><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;qf=w_tren85&amp;ch=SBX&amp;cid=_upcoming_webinars_8.500001507&amp;_mc=_upcoming_webinars_8.500001507"><p class="ContentList-ListItemTitle">The Current State of AI Adoption in Cybersecurity, Including its Opportunities</p></a><span class="ContentList-ListItemDate ContentList-ListItemDate_webinar" data-testid="content-list-item-date">Dec 12, 2024</span></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;pc=w_snoa33&amp;ch=SBX&amp;cid=_upcoming_webinars_8.500001504&amp;_mc=_upcoming_webinars_8.500001504"><p class="ContentList-ListItemTitle">Cybersecurity Day: How to Automate Security Analytics with AI and ML</p></a><span class="ContentList-ListItemDate ContentList-ListItemDate_webinar" data-testid="content-list-item-date">Dec 17, 2024</span></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;qf=w_rubr127&amp;ch=SBX&amp;cid=_upcoming_webinars_8.500001508&amp;_mc=_upcoming_webinars_8.500001508"><p class="ContentList-ListItemTitle">The Dirt on ROT Data</p></a><span class="ContentList-ListItemDate ContentList-ListItemDate_webinar" data-testid="content-list-item-date">Dec 18, 2024</span></li></ul><div class="ContentList-CTAButton"><span data-component="button" role="presentation" class="Button Button_size_medium Button_variant_textLink"><span class="Button-ContentWrapper"><a class="ContentList-CTAText" rel="noreferrer" data-discover="true" href="/resources?types=Webinar" target="_blank">More Webinars</a></span><span data-component="icon" data-name="ChevronRight" class="Button-Icon Button-Icon_position_right" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div></div></div><div class="Sidebar-SidebarItem" data-testid="sidebar-item"><div data-component="content-list" class="ContentList"><div class="ContentList-Header"><span data-component="icon" data-name="Document" class="ContentList-Icon" style="mask-image:url(/build/_assets/Document-NG4YMZFA.svg);-webkit-mask-image:url(/build/_assets/Document-NG4YMZFA.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="ContentList-Title" data-testid="content-list-title">White Papers</span></div><ul class="ContentList-List"><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;qf=w_defa7505&amp;ch=SBX&amp;cid=_whitepaper_14.500005852&amp;_mc=_whitepaper_14.500005852"><p class="ContentList-ListItemTitle">From security alert to action: Accelerating incident response with automated investigations</p></a></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;qf=w_defa7530&amp;ch=SBX&amp;cid=_whitepaper_14.500005851&amp;_mc=_whitepaper_14.500005851"><p class="ContentList-ListItemTitle">Enhancing Cybersecurity: The Critical Role Of Software Security Training</p></a></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;qf=w_palo248&amp;ch=SBX&amp;cid=_whitepaper_14.500005835&amp;_mc=_whitepaper_14.500005835"><p class="ContentList-ListItemTitle">Top 10 CI/CD Security Risks: The Technical Guide</p></a></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;qf=w_adaa07&amp;ch=SBX&amp;cid=_whitepaper_14.500005831&amp;_mc=_whitepaper_14.500005831"><p class="ContentList-ListItemTitle">The State of Vulnerability Management in the Enterprise</p></a></li><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;qf=w_cybo172&amp;ch=&amp;cid=_whitepaper_14.500005744&amp;_mc=_whitepaper_14.500005744"><p class="ContentList-ListItemTitle">How to Use Threat Intelligence to Mitigate Third-Party Risk</p></a></li></ul><div class="ContentList-CTAButton"><span data-component="button" role="presentation" class="Button Button_size_medium Button_variant_textLink"><span class="Button-ContentWrapper"><a class="ContentList-CTAText" rel="noreferrer" data-discover="true" href="/resources?types=Whitepaper" target="_blank">More Whitepapers</a></span><span data-component="icon" data-name="ChevronRight" class="Button-Icon Button-Icon_position_right" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div></div></div><div class="Sidebar-SidebarItem" data-testid="sidebar-item"></div></div></div></div></div><div class="ListContent-NewsletterSignupPromo"><div data-module="newsletter-signup-promo"><div class="SubscribeBanner SubscribeBanner_mode_dark SubscribeBanner_variant_vertical TopicList-NewsletterContent"><div class="SubscribeBanner-Wrapper"><div class="SubscribeBanner-Title" data-testid="subscribeBanner_title">Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.</div><div class="SubscribeBanner-Message" data-testid="subscribeBanner_message"></div><div class="SubscribeBanner-Button"><a data-component="button" data-testid="bannerNewsletterbutton" class="Button Button_size_medium Button_variant_secondaryFilled" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi" target="_blank" rel="nofollow" data-name="subscribe-banner" data-action-type="sign-up"><span class="Button-ContentWrapper">Subscribe</span></a></div></div></div></div></div></div></div></section><footer data-module="footer" class="Footer"><div class="Footer-Background"></div><div data-testid="logo" class="Footer-LogoContainer Footer-LogoContainer_length_2"><a data-discover="true" href="/"><img title="Logo" data-component="image" class="Footer-LogoImage Footer-LogoImage_length_2" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6aed714e279eeb34/6542104467527c040a9b2014/Logo_-_Dark_Reading.svg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6aed714e279eeb34/6542104467527c040a9b2014/Logo_-_Dark_Reading.svg?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Logo"/></a></div><div data-testid="LinkSection" class="LinkSection LinkSection_length_2"><h5 class="LinkSection-Title" data-testid="link-section-title">Discover More</h5><div class="LinkSection-LinksWrapper"><a class="LinkSection-Link" rel="noreferrer" data-discover="true" href="/program/black-hat" target="_blank">Black Hat</a><a class="LinkSection-Link" rel="noreferrer" data-discover="true" href="/program/omdia-cybersecurity" target="_blank">Omdia</a></div></div><div data-testid="LinkSection" class="LinkSection LinkSection_length_2"><h5 class="LinkSection-Title" data-testid="link-section-title">Working With Us</h5><div class="LinkSection-LinksWrapper"><a class="LinkSection-Link" data-discover="true" href="/about-us" target="_self">About Us</a><a class="LinkSection-Link" data-discover="true" href="/advertise" target="_self">Advertise</a><a class="LinkSection-Link" target="_blank" rel="noreferrer" href="https://info.wrightsmedia.com/informa-licensing-reprints-request">Reprints</a></div></div><div data-testid="registration" class="Footer-RegistrationWrapper"><div class="RegistrationSection RegistrationSection_linkSectionLength_2"><h5 class="RegistrationSection-Title">Join Us</h5><div class="Layout-Register Layout-Register_variant_footer"></div><div class="Layout-NewsLetter Layout-NewsLetter_variant_footer"><div data-module="newsletter-signup-promo"><a data-component="button" data-testid="footerNewsletterButton" class="Button Button_size_medium Button_variant_primaryFilled" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi" target="_blank" rel="nofollow" data-name="subscribe-footer" data-action-type="sign-up"><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div></div></div></div><div data-testid="social" class="SocialSection SocialSection_linkSectionLength_2"><h5 class="SocialSection-Title">Follow Us</h5><div data-component="social-share" class="SocialShare SocialShare_variant_layout"><a target="_blank" rel="noreferrer" aria-label="Twitter" href="https://twitter.com/DarkReading"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Twitter" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_twitter" style="mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);-webkit-mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Linkedin" href="https://www.linkedin.com/company/dark-reading/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Linkedin" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_linkedin" style="mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);-webkit-mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Facebook" href="https://www.facebook.com/darkreadingcom/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Facebook" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_facebook" style="mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);-webkit-mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Youtube" href="https://www.youtube.com/@DarkReadingOfficialYT"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Youtube" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_youtube" style="mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);-webkit-mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="RSS" href="https://www.darkreading.com/rss.xml"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="RSS" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_rss" style="mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);-webkit-mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="GoogleNews" href="https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&amp;oc=3&amp;hl=en-US&amp;gl=US"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="GoogleNews" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_googleNews" style="mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);-webkit-mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a></div></div><div class="CopyrightsSection"><div class="CopyrightsSection-Background"></div><div data-testid="copyrights" class="CopyrightsSection-Wrapper"><a data-testid="businessUnit" class="CopyrightsSection-BusinessLink" target="_blank" href="https://www.informa.com"><img title="Informa" data-component="image" class="CopyrightsSection-BusinessImage" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb3f56b75133715aa/674ee1ace1b5ac19f79ca74e/Informa_Logo_OneLine_Graduated_White_RGB.png?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb3f56b75133715aa/674ee1ace1b5ac19f79ca74e/Informa_Logo_OneLine_Graduated_White_RGB.png?width=700&amp;auto=webp&amp;quality=80&amp;disable=upscale" loading="lazy" alt="Informa"/></a><div class="CopyrightsSection-TextWrapper"><p data-testid="copyrightText" class="CopyrightsSection-Text"><span class="CopyrightsSection-TextBlock"></span>Copyright © 2024. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466.</p><div data-testid="copyrightLinks" class="CopyrightsSection-LinksWrapper CopyrightsSection-LinksWrapper_hasLinks"><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.informatech.com/">Home<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" data-discover="true" href="/cookie-policy" target="_blank">Cookie Policy<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.techtarget.com/privacy-policy/">Privacy<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.informatech.com/terms-and-conditions/">Terms of Use</a></div></div></div></div></footer></div></div></main><script>((STORAGE_KEY, restoreKey) => { if (!window.history.state || !window.history.state.key) { let key = Math.random().toString(32).slice(2); window.history.replaceState({ key }, ""); } try { let positions = JSON.parse(sessionStorage.getItem(STORAGE_KEY) || "{}"); let storedY = positions[restoreKey || window.history.state.key]; if (typeof storedY === "number") { window.scrollTo(0, storedY); } } catch (error) { console.error(error); sessionStorage.removeItem(STORAGE_KEY); } })("positions", null)</script><link rel="modulepreload" href="/build/manifest-56B63EEE.js"/><link rel="modulepreload" href="/build/entry.client-SFHSSSEN.js"/><link rel="modulepreload" href="/build/_shared/chunk-RVHE4U6B.js"/><link rel="modulepreload" href="/build/_shared/chunk-SJXV5VAW.js"/><link rel="modulepreload" href="/build/_shared/chunk-63EVRDSK.js"/><link rel="modulepreload" href="/build/_shared/chunk-ADMCF34Z.js"/><link rel="modulepreload" href="/build/_shared/chunk-QLNIWV7P.js"/><link rel="modulepreload" href="/build/_shared/chunk-VAILQJN5.js"/><link rel="modulepreload" href="/build/_shared/chunk-RZRUW7QG.js"/><link rel="modulepreload" href="/build/_shared/chunk-ENWGEOQ7.js"/><link rel="modulepreload" href="/build/_shared/chunk-B7M2L5OV.js"/><link rel="modulepreload" href="/build/_shared/chunk-V56AZ7JS.js"/><link rel="modulepreload" href="/build/_shared/chunk-4V3RXUC3.js"/><link rel="modulepreload" href="/build/_shared/chunk-FXAZYHGQ.js"/><link rel="modulepreload" href="/build/_shared/chunk-VZQVWFLO.js"/><link rel="modulepreload" href="/build/_shared/chunk-YBPFZZVB.js"/><link rel="modulepreload" href="/build/_shared/chunk-SRUMBKGO.js"/><link rel="modulepreload" href="/build/_shared/chunk-UVPCWI2W.js"/><link rel="modulepreload" href="/build/_shared/chunk-TJGG65A2.js"/><link rel="modulepreload" href="/build/_shared/chunk-6SLT44WO.js"/><link rel="modulepreload" href="/build/_shared/chunk-QVUW3IXO.js"/><link rel="modulepreload" href="/build/_shared/chunk-6CJ46C3I.js"/><link rel="modulepreload" href="/build/_shared/chunk-KID4GLZA.js"/><link rel="modulepreload" href="/build/_shared/chunk-IW54JVOH.js"/><link rel="modulepreload" href="/build/root-PUQZGJFA.js"/><link rel="modulepreload" href="/build/_shared/chunk-UFZJJVHL.js"/><link rel="modulepreload" href="/build/_shared/chunk-KQ4HX2KA.js"/><link rel="modulepreload" href="/build/_shared/chunk-ED7QE4BI.js"/><link rel="modulepreload" href="/build/_shared/chunk-CTMBUJW2.js"/><link rel="modulepreload" href="/build/_shared/chunk-6ZQEW6QV.js"/><link rel="modulepreload" href="/build/_shared/chunk-YOQGAE7D.js"/><link rel="modulepreload" href="/build/_shared/chunk-PKX65DMJ.js"/><link rel="modulepreload" href="/build/_shared/chunk-2A7GCISR.js"/><link rel="modulepreload" href="/build/_shared/chunk-UQWQDPQL.js"/><link rel="modulepreload" href="/build/_shared/chunk-K3EG3F2D.js"/><link rel="modulepreload" href="/build/_shared/chunk-6OEHQCHL.js"/><link rel="modulepreload" href="/build/_shared/chunk-MB4F4P5H.js"/><link rel="modulepreload" href="/build/_shared/chunk-QXRZRYND.js"/><link rel="modulepreload" href="/build/_shared/chunk-QPB57ZCF.js"/><link rel="modulepreload" href="/build/_shared/chunk-PBMO5Q5Q.js"/><link rel="modulepreload" href="/build/_shared/chunk-YP4O22HH.js"/><link rel="modulepreload" href="/build/_shared/chunk-KNOG3XIM.js"/><link rel="modulepreload" href="/build/_shared/chunk-KIDG4VST.js"/><link rel="modulepreload" href="/build/_shared/chunk-7WX3BG7O.js"/><link rel="modulepreload" href="/build/_shared/chunk-LHFD2AZM.js"/><link rel="modulepreload" href="/build/_shared/chunk-GNK7QBLO.js"/><link rel="modulepreload" href="/build/_shared/chunk-JU2VSZDI.js"/><link rel="modulepreload" href="/build/_shared/chunk-LWE7ZKCZ.js"/><link rel="modulepreload" href="/build/_shared/chunk-GDXQNCEJ.js"/><link rel="modulepreload" href="/build/_shared/chunk-PHSYQFSR.js"/><link rel="modulepreload" href="/build/_shared/chunk-GGO4FWBQ.js"/><link rel="modulepreload" href="/build/_shared/chunk-RX4QIZYC.js"/><link rel="modulepreload" href="/build/_shared/chunk-IJ353W5V.js"/><link rel="modulepreload" href="/build/_shared/chunk-TCBDOXWO.js"/><link rel="modulepreload" href="/build/_shared/chunk-NEIVIDQA.js"/><link rel="modulepreload" href="/build/_shared/chunk-TDM4RAGW.js"/><link rel="modulepreload" href="/build/routes/$topic._index-6ZBF6GMY.js"/><script>window.__remixContext = {"future":{"v3_fetcherPersist":false,"v3_relativeSplatPath":false,"v3_throwAbortReason":false},"state":{"loaderData":{"root":{"brand":"darkreading","authenticationStatus":"anonymous","siteName":"Dark Reading","ads":{"networkId":3834,"parentAdUnit":"darkreading.home","enabledAds":"all","checkClientIP":false,"disableSponsorBar":true},"authConfig":{"enabled":false,"disableCaptcha":false},"isDctsTurnOn":false,"oneTrust":{"siteId":"4b083961-e2ac-4755-8801-f7c83a5fb187"},"gtmIds":{"primary":"GTM-5523ZCM","secondary":"GTM-WB8Q7XR"},"pageContent":{"registrationText":"Learn about New Cybersecurity Threats, Vulnerabilities and Technology Trends."},"ui":{"brand":"darkreading","theme":"theme1","font":{"primary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"},"secondary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"}}},"environment":"prod","featureToggles":{"elnNewsletter":false,"elnWithoutNewsletter":false,"iirisAuthentication":false,"subBrand":false,"useSettingsRedirectAPIVersion1":false,"gatingEnabled":false,"iirisRecommendationDisabled":false,"iasPetEnabled":true,"bridgedMediaEnabled":true,"ecommerceEnabled":false,"iirisRecommendationVer":"version4","weather3MonthForecastEnabled":false,"legacyHomepage":false,"oneTrustEnabled":true,"transcendEnabled":true},"layout":{"socialLinks":[{"type":"Twitter","url":"https://twitter.com/DarkReading"},{"type":"Linkedin","url":"https://www.linkedin.com/company/dark-reading/"},{"type":"Facebook","url":"https://www.facebook.com/darkreadingcom/"},{"type":"Youtube","url":"https://www.youtube.com/@DarkReadingOfficialYT"},{"type":"RSS","url":"https://www.darkreading.com/rss.xml"},{"type":"GoogleNews","url":"https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en\u0026oc=3\u0026hl=en-US\u0026gl=US"}],"informaBar":{"enabled":true,"leftSection":{"description":"Dark Reading is part of the Informa TechTarget Division of Informa PLC","subMenu":[{"title":"Informa PLC","url":"https://www.informa.com/"},{"title":"ABOUT US","url":"https://www.informa.com/about-us/"},{"title":"INVESTOR RELATIONS","url":"https://www.informa.com/investors/"},{"title":"TALENT","url":"https://www.informa.com/talent/"}]},"rightSection":{"description":"This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726."}},"nav":{"mainMenuItems":[{"title":"Cybersecurity Topics","url":"","seeAllLink":"","seeAllLinkUrl":"","hasSubMenu":true,"subMenu":[{"title":"Application Security","url":"/application-security"},{"title":"Cybersecurity Careers","url":"/cybersecurity-operations/cybersecurity-careers"},{"title":"Cloud Security","url":"/cloud-security"},{"title":"Cyber Risk","url":"/cyber-risk"},{"title":"Cyberattacks \u0026 Data Breaches","url":"/cyberattacks-data-breaches"},{"title":"Cybersecurity Analytics","url":"/cybersecurity-analytics"},{"title":"Cybersecurity Operations","url":"/cybersecurity-operations"},{"title":"Data Privacy","url":"/cyber-risk/data-privacy"},{"title":"Endpoint Security","url":"/endpoint-security"},{"title":"ICS/OT Security","url":"/ics-ot-security"},{"title":"Identity \u0026 Access Mgmt Security","url":"/cybersecurity-operations/identity-access-management-security"},{"title":"Insider Threats","url":"/vulnerabilities-threats/insider-threats"},{"title":"IoT","url":"/ics-ot-security/iot"},{"title":"Mobile Security","url":"/endpoint-security/mobile-security"},{"title":"Perimeter","url":"/cybersecurity-operations/perimeter"},{"title":"Physical Security","url":"/cybersecurity-operations/physical-security"},{"title":"Remote Workforce","url":"/endpoint-security/remote-workforce"},{"title":"Threat Intelligence","url":"/threat-intelligence"},{"title":"Vulnerabilities \u0026 Threats","url":"/vulnerabilities-threats"}],"recentContents":[]},{"title":"World ","url":"/program/dr-global","seeAllLink":"See All","seeAllLinkUrl":"/program/dr-global","hasSubMenu":true,"subMenu":[{"title":"DR Global","url":"/program/dr-global"},{"title":"Middle East \u0026 Africa","url":"/keyword/middle-east-africa"},{"title":"Asia Pacific","url":"/keyword/asia-pacific"}],"recentContents":[]},{"title":"The Edge","url":"/program/the-edge","seeAllLink":"","seeAllLinkUrl":"/program/the-edge","hasSubMenu":false,"subMenu":[],"recentContents":[]},{"title":"DR Technology","url":"/program/dr-technology","seeAllLink":"","seeAllLinkUrl":"/program/dr-technology","hasSubMenu":false,"subMenu":[],"recentContents":[]},{"title":"Events","url":"/events","seeAllLink":"SEE ALL","seeAllLinkUrl":"/events","hasSubMenu":true,"subMenu":[{"title":"Upcoming Events","url":"/events"},{"title":"Podcasts","url":"/podcasts"},{"title":"Webinars","url":"/resources?types=Webinar"}],"recentContents":[]},{"title":"Resources","url":"/resources","seeAllLink":"SEE ALL","seeAllLinkUrl":"/resources","hasSubMenu":true,"subMenu":[{"title":"Library","url":"/resources"},{"title":"Newsletters","url":"https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi"},{"title":"Podcasts","url":"/podcasts"},{"title":"Reports","url":"/resources?types=Report"},{"title":"Videos","url":"/videos"},{"title":"Webinars","url":"/resources?types=Webinar"},{"title":"Whitepapers","url":"/resources?types=Whitepaper"},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":"Partner Perspectives","url":"/keyword/partner-perspectives"}],"recentContents":[]}],"secondaryMenu":[{"title":"Black Hat News","url":"/program/black-hat"},{"title":"Omdia Cybersecurity","url":"/program/omdia-cybersecurity"},{"title":"Advertise","url":"https://reg.darkreading.com/media-kit?kcode=drsitehd"}]},"megaMenu":{"largeMenu":[{"title":"Cybersecurity Topics","url":"","subMenu":[{"title":"Application Security","url":"/application-security"},{"title":"Cybersecurity Careers","url":"/cybersecurity-operations/cybersecurity-careers"},{"title":"Cloud Security","url":"/cloud-security"},{"title":"Cyber Risk","url":"/cyber-risk"},{"title":"Cyberattacks \u0026 Data Breaches","url":"/cyberattacks-data-breaches"},{"title":"Cybersecurity Analytics","url":"/cybersecurity-analytics"},{"title":"Cybersecurity Operations","url":"/cybersecurity-operations"},{"title":"Data Privacy","url":"/cyber-risk/data-privacy"},{"title":"Endpoint Security","url":"/endpoint-security"},{"title":"ICS/OT Security","url":"/ics-ot-security"},{"title":"Identity \u0026 Access Mgmt Security","url":"/cybersecurity-operations/identity-access-management-security"},{"title":"Insider Threats","url":"/vulnerabilities-threats/insider-threats"},{"title":"IoT","url":"/ics-ot-security/iot"},{"title":"Mobile Security","url":"/endpoint-security/mobile-security"},{"title":"Perimeter","url":"/cybersecurity-operations/perimeter"},{"title":"Physical Security","url":"/cybersecurity-operations/physical-security"},{"title":"Remote Workforce","url":"/endpoint-security/remote-workforce"},{"title":"Threat Intelligence","url":"/threat-intelligence"},{"title":"Vulnerabilities \u0026 Threats","url":"/vulnerabilities-threats"}],"seeAllLink":"","seeAllLinkUrl":""},{"title":"World ","url":"/program/dr-global","subMenu":[{"title":"DR Global","url":"/program/dr-global"},{"title":"Middle East \u0026 Africa","url":"/keyword/middle-east-africa"},{"title":"Asia Pacific","url":"/keyword/asia-pacific"}],"seeAllLink":"See All","seeAllLinkUrl":"/program/dr-global"},{"title":"The Edge","url":"/program/the-edge","subMenu":[],"seeAllLink":"","seeAllLinkUrl":"/program/the-edge"},{"title":"DR Technology","url":"/program/dr-technology","subMenu":[],"seeAllLink":"","seeAllLinkUrl":"/program/dr-technology"},{"title":"Events","url":"/events","subMenu":[{"title":"Upcoming Events","url":"/events"},{"title":"Podcasts","url":"/podcasts"},{"title":"Webinars","url":"/resources?types=Webinar"}],"seeAllLink":"SEE ALL","seeAllLinkUrl":"/events"},{"title":"Resources","url":"/resources","subMenu":[{"title":"Library","url":"/resources"},{"title":"Newsletters","url":"https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi"},{"title":"Podcasts","url":"/podcasts"},{"title":"Reports","url":"/resources?types=Report"},{"title":"Videos","url":"/videos"},{"title":"Webinars","url":"/resources?types=Webinar"},{"title":"Whitepapers","url":"/resources?types=Whitepaper"},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":"Partner Perspectives","url":"/keyword/partner-perspectives"}],"seeAllLink":"SEE ALL","seeAllLinkUrl":"/resources"}],"smallMenu":[{"title":"Resources","url":"","subMenu":[]},{"title":"More","url":"","subMenu":[{"title":"About Us","url":"/about-us"},{"title":"Advertise With Us","url":"/advertise"},{"title":"Submissions","url":"/cyberattacks-data-breaches/how-to-submit-a-column-to-dark-reading"}]}],"sideNavSections":[]},"navBase":{"logo":{"url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg","altText":"Dark Reading Logo"}},"footer":{"logo":{"url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6aed714e279eeb34/6542104467527c040a9b2014/Logo_-_Dark_Reading.svg","altText":"Logo"},"linkSections":[{"links":[{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt39752b9f502ed723/65004ef460832757db397d3a/Dark_Reading_Logo_Stacked_K.png"},"openInNewTab":true,"title":"Black Hat","url":"/program/black-hat"},{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt39752b9f502ed723/65004ef460832757db397d3a/Dark_Reading_Logo_Stacked_K.png"},"openInNewTab":true,"title":"Omdia","url":"/program/omdia-cybersecurity"}],"title":"Discover More","type":"1"},{"links":[{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64bc80c1cc860f0e/64ff3af37434dc8f904db946/Dark_Reading_Logo_0_200px.png"},"openInNewTab":false,"title":"About Us","url":"/about-us"},{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9a23e12b46e10b76/64ff3b08f7b4013e16a3d26a/Dark_Reading_Logo_0_200px.png"},"openInNewTab":false,"title":"Advertise","url":"/advertise"},{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7b65ada713568986/64ff3bd1abb8d8128a7762bd/Dark_Reading_Logo_0_200px.png"},"openInNewTab":true,"title":"Reprints","url":"https://info.wrightsmedia.com/informa-licensing-reprints-request"}],"title":"Working With Us","type":"1"}],"brandLinks":[],"copyright":{"businessUnit":{"url":"https://www.informa.com","name":"Informa","logoUrl":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb3f56b75133715aa/674ee1ace1b5ac19f79ca74e/Informa_Logo_OneLine_Graduated_White_RGB.png"},"links":[{"image":{"altText":"Home","url":"https://www.informatech.com/"},"openInNewTab":true,"title":"Home","url":"https://www.informatech.com/"},{"image":{"altText":"Cookie Policy","url":"/cookie-policy"},"openInNewTab":true,"title":"Cookie Policy","url":"/cookie-policy"},{"image":{"altText":"Privacy","url":"https://www.techtarget.com/privacy-policy/"},"openInNewTab":true,"title":"Privacy","url":"https://www.techtarget.com/privacy-policy/"},{"image":{"altText":"Terms of Use","url":"https://www.informatech.com/terms-and-conditions/"},"openInNewTab":true,"title":"Terms of Use","url":"https://www.informatech.com/terms-and-conditions/"}],"title":". This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466."}},"isSponsorBarEnabled":true,"isPaidContent":false},"newRelicJs":"window.NREUM||(NREUM={});NREUM.init={distributed_tracing:{enabled:true},privacy:{cookies_enabled:true},ajax:{deny_list:[\"bam.eu01.nr-data.net\"]}};\n\n;NREUM.loader_config={accountID:\"3936348\",trustKey:\"3288925\",agentID:\"538600199\",licenseKey:\"NRJS-26ae6a3b09493bbcc87\",applicationID:\"538600199\"};\n;NREUM.info={beacon:\"bam.eu01.nr-data.net\",errorBeacon:\"bam.eu01.nr-data.net\",licenseKey:\"NRJS-26ae6a3b09493bbcc87\",applicationID:\"538600199\",sa:1};\n;/*! For license information please see nr-loader-spa-1.275.0.min.js.LICENSE.txt */\n(()=\u003e{var e,t,r={8122:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ei});var n=r(944);function i(e,t){try{if(!e||\"object\"!=typeof e)return(0,n.R)(3);if(!t||\"object\"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])\u0026\u0026Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):\"object\"==typeof e[a]\u0026\u0026\"object\"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=\u003e{\"use strict\";r.d(t,{Vp:()=\u003ec,fn:()=\u003es,x1:()=\u003eu});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey\u0026\u0026!!t.errorBeacon\u0026\u0026!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error(\"All info objects require an agent identifier!\");if(!a[e])throw new Error(\"Info for \".concat(e,\" was never set\"));return a[e]}function u(e,t){if(!e)throw new Error(\"All info objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.info=a[e])}},9417:(e,t,r)=\u003e{\"use strict\";r.d(t,{D0:()=\u003eh,gD:()=\u003eg,xN:()=\u003ep});var n=r(993);const i=e=\u003e{if(!e||\"string\"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u=\"[data-nr-mask]\",d=()=\u003e{const e={mask_selector:\"*\",block_selector:\"[data-nr-block]\",mask_input_options:{color:!1,date:!1,\"datetime-local\":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,harvestTimeSeconds:10,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},feature_flags:[],generic_events:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},harvest:{tooManyRequestsDelay:60},jserrors:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},logging:{enabled:!0,harvestTimeSeconds:10,autoStart:!0,level:n.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},performance:{capture_marks:!1,capture_measures:!1},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,harvestTimeSeconds:60,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector=\"\".concat(t,\",\").concat(u):\"\"===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return\"nr-block\"},get ignore_class(){return\"nr-ignore\"},get mask_text_class(){return\"nr-mask\"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=\",\".concat(t):\"\"!==t\u0026\u0026(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t\u0026\u0026\"object\"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},soft_navigations:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},spa:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},ssl:void 0,user_actions:{enabled:!0}}},l={},f=\"All configuration objects require an agent identifier!\";function h(e){if(!e)throw new Error(f);if(!l[e])throw new Error(\"Configuration for \".concat(e,\" was never set\"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r\u0026\u0026(r.init=l[e])}function g(e,t){if(!e)throw new Error(f);var r=h(e);if(r){for(var n=t.split(\".\"),i=0;i\u003cn.length-1;i++)if(\"object\"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ec,o:()=\u003es});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");if(!a[e])throw new Error(\"LoaderConfig for \".concat(e,\" was never set\"));return a[e]}function c(e,t){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.loader_config=a[e])}},3371:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003ef,f:()=\u003el});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0},d={};function l(e){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");if(!d[e])throw new Error(\"Runtime for \".concat(e,\" was never set\"));return d[e]}function f(e,t){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],\"harvestCount\")||Object.defineProperty(d[e],\"harvestCount\",{get:()=\u003e++s});const r=(0,i.nY)(e);r\u0026\u0026(r.runtime=d[e])}},9324:(e,t,r)=\u003e{\"use strict\";r.d(t,{F3:()=\u003ei,Xs:()=\u003eo,Yq:()=\u003ea,xv:()=\u003en});const n=\"1.275.0\",i=\"PROD\",o=\"CDN\",a=\"^2.0.0-alpha.17\"},6154:(e,t,r)=\u003e{\"use strict\";r.d(t,{A4:()=\u003es,OF:()=\u003ed,RI:()=\u003ei,WN:()=\u003eh,bv:()=\u003eo,gm:()=\u003ea,lR:()=\u003ef,m:()=\u003eu,mw:()=\u003ec,sb:()=\u003el});var n=r(1863);const i=\"undefined\"!=typeof window\u0026\u0026!!window.document,o=\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self.navigator instanceof WorkerNavigator||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis.navigator instanceof WorkerNavigator),a=i?window:\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis),s=\"complete\"===a?.document?.readyState,c=Boolean(\"hidden\"===a?.document?.visibilityState),u=\"\"+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d\u0026\u0026\"undefined\"==typeof SharedWorker,f=(()=\u003e{const e=a.navigator?.userAgent?.match(/Firefox[/\\s](\\d+\\.\\d+)/);return Array.isArray(e)\u0026\u0026e.length\u003e=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=\u003e{\"use strict\";r.d(t,{Xv:()=\u003ea,gX:()=\u003ei,iW:()=\u003eo});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t\u003cn.length;t++){var r=n[t];if(\"*\"===r.hostname)return!1;if(s(r.hostname,e.hostname)\u0026\u0026c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e\u0026\u0026e.length)for(var t=0;t\u003ce.length;t++){let r=e[t];if(!r)continue;0===r.indexOf(\"http://\")?r=r.substring(7):0===r.indexOf(\"https://\")\u0026\u0026(r=r.substring(8));const i=r.indexOf(\"/\");let o,a;i\u003e0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a=\"\");let[s]=o.split(\":\");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length\u003et.length)\u0026\u0026t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf(\"/\")\u0026\u0026(e=e.substring(1)),0===t.indexOf(\"/\")\u0026\u0026(t=t.substring(1)),\"\"===e||e===t}},1687:(e,t,r)=\u003e{\"use strict\";r.d(t,{Ak:()=\u003ec,Ze:()=\u003el,x3:()=\u003eu});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e\u0026\u0026s[e]\u0026\u0026(s[e].get(t)\u0026\u0026s[e].delete(t),h(e,t,!1),s[e].size\u0026\u0026f(e))}function d(e){if(!e)throw new Error(\"agentIdentifier required\");s[e]||(s[e]=new Map)}function l(e=\"\",t=\"feature\",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=\u003et.staged))\u0026\u0026(t.sort(((e,t)=\u003ee[1].priority-t[1].priority)),t.forEach((([t])=\u003e{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted\u0026\u0026o.backlog\u0026\u0026s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e\u0026\u0026t\u003ce.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=\u003e{Object.values(t||{}).forEach((t=\u003e{t[0]?.on\u0026\u0026t[0]?.context()instanceof a.y\u0026\u0026t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit(\"drain-\"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=\u003e{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=\u003e{\"use strict\";r.d(t,{P:()=\u003ec,ee:()=\u003eu});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c=\"nr@context:\".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length\u0026\u0026(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i\u003cr.length;i++)r[i]===t\u0026\u0026r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o\u0026\u0026(o=!0);if(u.aborted\u0026\u0026!i)return;t\u0026\u0026o\u0026\u0026t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l\u003cd;l++)c[l].apply(a,r);var p=v()[s[e]];p\u0026\u0026p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||\"feature\",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=\u003e{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=\u003e{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t\u0026\u0026\"object\"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,\"aborted\",{get:()=\u003e{let e=f._aborted||!1;return e||(t\u0026\u0026(e=t.aborted),e)}}),f;function h(e){return e\u0026\u0026e instanceof a.y?e:e?(0,i.I)(e,c,(()=\u003enew a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,\"globalEE\"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=\u003e{\"use strict\";r.d(t,{y:()=\u003en});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=\u003e{\"use strict\";r.d(t,{d:()=\u003en,p:()=\u003ei});var n=r(7836).ee.get(\"handle\");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=\u003e{\"use strict\";r.d(t,{i:()=\u003eo});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o=\"feature\"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=\u003e{\"use strict\";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=\u003eo,jT:()=\u003en,sp:()=\u003ei})},5607:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003en});const n=(0,r(9566).bz)()},9566:(e,t,r)=\u003e{\"use strict\";r.d(t,{LA:()=\u003es,ZF:()=\u003ec,bz:()=\u003ea,el:()=\u003eu});var n=r(6154);const i=\"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\";function o(e,t){return e?15\u0026e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e\u0026\u0026e.getRandomValues\u0026\u0026(t=e.getRandomValues(new Uint8Array(30))),i.split(\"\").map((e=\u003e\"x\"===e?o(t,r++).toString(16):\"y\"===e?(3\u0026o()|8).toString(16):e)).join(\"\")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t\u0026\u0026t.getRandomValues\u0026\u0026(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s\u003ce;s++)a.push(o(r,i++).toString(16));return a.join(\"\")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ea,H3:()=\u003en,g:()=\u003eu,iL:()=\u003ec,tS:()=\u003es,uh:()=\u003ei,wk:()=\u003eo});const n=\"NRBA\",i=\"SESSION\",o=144e5,a=18e5,s={STARTED:\"session-started\",PAUSE:\"session-pause\",RESET:\"session-reset\",RESUME:\"session-resume\",UPDATE:\"session-update\"},c={SAME_TAB:\"same-tab\",CROSS_TAB:\"cross-tab\"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=\u003e{\"use strict\";function n(){return Math.floor(performance.now())}r.d(t,{t:()=\u003en})},7485:(e,t,r)=\u003e{\"use strict\";r.d(t,{D:()=\u003ei});var n=r(6154);function i(e){if(0===(e||\"\").indexOf(\"data:\"))return{protocol:\"data\"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(\":\")),sameOrigin:t.protocol===n.gm?.location?.protocol\u0026\u0026t.host===n.gm?.location?.host};return r.port\u0026\u0026\"\"!==r.port||(\"http:\"===t.protocol\u0026\u0026(r.port=\"80\"),\"https:\"===t.protocol\u0026\u0026(r.port=\"443\")),r.pathname\u0026\u0026\"\"!==r.pathname?r.pathname.startsWith(\"/\")||(r.pathname=\"/\".concat(r.pathname)):r.pathname=\"/\",r}catch(e){return{}}}},944:(e,t,r)=\u003e{\"use strict\";function n(e,t){\"function\"==typeof console.debug\u0026\u0026console.debug(\"New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#\".concat(e),t)}r.d(t,{R:()=\u003en})},5284:(e,t,r)=\u003e{\"use strict\";r.d(t,{t:()=\u003ec,B:()=\u003es});var n=r(7836),i=r(6154);const o=\"newrelic\";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e\u0026\u0026\"object\"==typeof e\u0026\u0026(a.has(t)||(r.emit(\"rumresp\",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=\u003e{\"use strict\";r.d(t,{I:()=\u003ei});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=\u003e{\"use strict\";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=\u003e{n\u0026\u0026void 0===i\u0026\u0026(e.apply(this,r),i=setTimeout((()=\u003e{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=\u003e{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=\u003e{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=\u003ei,s:()=\u003en})},3304:(e,t,r)=\u003e{\"use strict\";r.d(t,{A:()=\u003eo});var n=r(7836);const i=()=\u003e{const e=new WeakSet;return(t,r)=\u003e{if(\"object\"==typeof r\u0026\u0026null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??\"\"}catch(e){try{n.ee.emit(\"internal-error\",[e])}catch(e){}return\"\"}}},5289:(e,t,r)=\u003e{\"use strict\";r.d(t,{GG:()=\u003eo,sB:()=\u003ea});var n=r(3878);function i(){return\"undefined\"==typeof document||\"complete\"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)(\"load\",e,t)}function a(e){if(i())return e();(0,n.DD)(\"DOMContentLoaded\",e)}},384:(e,t,r)=\u003e{\"use strict\";r.d(t,{NT:()=\u003eo,US:()=\u003ed,Zm:()=\u003ea,bQ:()=\u003ec,dV:()=\u003es,nY:()=\u003eu,pV:()=\u003el});var n=r(6154),i=r(1863);const o={beacon:\"bam.nr-data.net\",errorBeacon:\"bam.nr-data.net\"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic\u0026\u0026(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ei});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)(\"visibilitychange\",(function(){if(t)return void(\"hidden\"===document.visibilityState\u0026\u0026e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ef});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u=\"addEventListener\",d=\"removeEventListener\",l=\"nr@wrapped:\".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get(\"events\")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],\"-\",p)}function p(e,t){return e[1]}return\"getPrototypeOf\"in Object\u0026\u0026(a.RI\u0026\u0026h(document,f),c\u0026\u0026h(c.prototype,f),h(a.gm,f)),t.on(u+\"-start\",(function(e,t){var n=e[1];if(null!==n\u0026\u0026(\"function\"==typeof n||\"object\"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if(\"function\"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,\"fn-\",null,e.name||\"anonymous\"):n}));this.wrapped=e[1]=i}})),t.on(d+\"-start\",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;\"object\"==typeof n\u0026\u0026!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n\u0026\u0026t(n,...r)}},3434:(e,t,r)=\u003e{\"use strict\";r.d(t,{Jt:()=\u003eo,YM:()=\u003ec});var n=r(7836),i=r(5607);const o=\"nr@original:\".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n=\"\");const a=\"-\"===n.charAt(0);for(let s=0;s\u003ct.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=\"\"),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)\u0026\u0026(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d=\"function\"==typeof n?n(o,a):n||{}}catch(t){u([t,\"\",[o,a,s],d],e)}i(r+\"start\",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+\"err\",[o,a,e],d,c),e}finally{i(r+\"end\",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit(\"internal-error\",e)}catch(e){}}function d(e){return!(e\u0026\u0026\"function\"==typeof e\u0026\u0026e.apply\u0026\u0026!e[o])}},9300:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.ajax},3333:(e,t,r)=\u003e{\"use strict\";r.d(t,{TZ:()=\u003en,Zp:()=\u003ei,mq:()=\u003es,nf:()=\u003ea,qN:()=\u003eo});const n=r(860).K7.genericEvents,i=[\"auxclick\",\"click\",\"copy\",\"keydown\",\"paste\",\"scrollend\"],o=[\"focus\",\"blur\"],a=4,s=1e3},6774:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.jserrors},993:(e,t,r)=\u003e{\"use strict\";r.d(t,{ET:()=\u003eo,TZ:()=\u003ea,p_:()=\u003ei});var n=r(860);const i={ERROR:\"ERROR\",WARN:\"WARN\",INFO:\"INFO\",DEBUG:\"DEBUG\",TRACE:\"TRACE\"},o=\"log\",a=n.K7.logging},3785:(e,t,r)=\u003e{\"use strict\";r.d(t,{R:()=\u003ec,b:()=\u003eu});var n=r(9908),i=r(1863),o=r(860),a=r(3969),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,[\"API/logging/\".concat(c.toLowerCase(),\"/called\")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return\"string\"==typeof e\u0026\u0026Object.values(s.p_).some((t=\u003et===e.toUpperCase().trim()))}},3969:(e,t,r)=\u003e{\"use strict\";r.d(t,{TZ:()=\u003en,XG:()=\u003es,rs:()=\u003ei,xV:()=\u003ea,z_:()=\u003eo});const n=r(860).K7.metrics,i=\"sm\",o=\"cm\",a=\"storeSupportabilityMetrics\",s=\"storeEventMetrics\"},6630:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewEvent},782:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ed,G4:()=\u003eo,Qb:()=\u003el,TZ:()=\u003ei,Ug:()=\u003ea,_s:()=\u003es,bc:()=\u003eu,yP:()=\u003ec});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:\"recordReplay\",PAUSE:\"pauseReplay\",REPLAY_RUNNING:\"replayRunning\",ERROR_DURING_REPLAY:\"errorDuringReplay\"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:\"Session was reset\",sm:\"Reset\"},IMPORT:{message:\"Recorder failed to import\",sm:\"Import\"},TOO_MANY:{message:\"429: Too Many Requests\",sm:\"Too-Many\"},TOO_BIG:{message:\"Payload was too large\",sm:\"Too-Big\"},CROSS_TAB:{message:\"Session Entity was set to OFF on another tab\",sm:\"Cross-Tab\"},ENTITLEMENTS:{message:\"Session Replay is not allowed and will not be started\",sm:\"Entitlement\"}},d=5e3,l={API:\"api\"}},5270:(e,t,r)=\u003e{\"use strict\";r.d(t,{Aw:()=\u003ec,CT:()=\u003eu,SR:()=\u003es});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO\u0026\u0026(0,o.V)(e)\u0026\u0026!0===(0,i.gD)(e,\"session_trace.enabled\")}function c(e){return!0===(0,i.gD)(e,\"session_replay.preload\")\u0026\u0026s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}},3738:(e,t,r)=\u003e{\"use strict\";r.d(t,{He:()=\u003ei,Kp:()=\u003es,Lc:()=\u003eu,Rz:()=\u003ed,TZ:()=\u003en,bD:()=\u003eo,d3:()=\u003ea,jx:()=\u003el,uP:()=\u003ec});const n=r(860).K7.sessionTrace,i=\"bstResource\",o=\"resource\",a=\"-start\",s=\"-end\",c=\"fn\"+a,u=\"fn\"+s,d=\"pushState\",l=1e3},3962:(e,t,r)=\u003e{\"use strict\";r.d(t,{AM:()=\u003eo,O2:()=\u003es,Qu:()=\u003ec,TZ:()=\u003ea,ih:()=\u003eu,tC:()=\u003ei});var n=r(860);const i=[\"click\",\"keydown\",\"submit\"],o=\"api\",a=n.K7.softNav,s={INITIAL_PAGE_LOAD:\"\",ROUTE_CHANGE:1,UNSPECIFIED:2},c={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},u={IP:\"in progress\",FIN:\"finished\",CAN:\"cancelled\"}},7378:(e,t,r)=\u003e{\"use strict\";r.d(t,{$p:()=\u003ex,BR:()=\u003eb,Kp:()=\u003eR,L3:()=\u003ey,Lc:()=\u003ec,NC:()=\u003eo,SG:()=\u003ed,TZ:()=\u003ei,U6:()=\u003ep,UT:()=\u003em,d3:()=\u003ew,dT:()=\u003ef,e5:()=\u003eA,gx:()=\u003ev,l9:()=\u003el,oW:()=\u003eh,op:()=\u003eg,rw:()=\u003eu,tH:()=\u003eE,uP:()=\u003es,wW:()=\u003eT,xq:()=\u003ea});var n=r(384);const i=r(860).K7.spa,o=[\"click\",\"submit\",\"keypress\",\"keydown\",\"keyup\",\"change\"],a=999,s=\"fn-start\",c=\"fn-end\",u=\"cb-start\",d=\"api-ixn-\",l=\"remaining\",f=\"interaction\",h=\"spaNode\",p=\"jsonpNode\",g=\"fetch-start\",m=\"fetch-done\",v=\"fetch-body-\",b=\"jsonp-end\",y=(0,n.dV)().o.ST,w=\"-start\",R=\"-end\",x=\"-body\",T=\"cb\"+R,A=\"jsTime\",E=\"fetch\"},4234:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003eo});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003eo});var n=r(9417),i=r(6154);const o=e=\u003ei.RI\u0026\u0026!0===(0,n.gD)(e,\"privacy.cookies_enabled\")},425:(e,t,r)=\u003e{\"use strict\";r.d(t,{j:()=\u003eP});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),h=r(384),p=r(6344);const g=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\",\"addPageAction\",\"setCurrentRouteName\",\"setPageViewName\",\"setCustomAttribute\",\"interaction\",\"noticeError\",\"setUserId\",\"setApplicationVersion\",\"start\",p.G4.RECORD,p.G4.PAUSE,\"log\",\"wrapLogger\"],m=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\"];var v=r(1863),b=r(2614),y=r(993),w=r(3785),R=r(2646),x=r(3434);const T=new Map;function A(e,t,r,n){if(\"object\"!=typeof t||!t||\"string\"!=typeof r||!r||\"function\"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get(\"logger\")}(e),o=(0,x.YM)(i),a=new R.y(s.P);a.level=n.level,a.customAttributes=n.customAttributes;const c=t[r]?.[x.Jt]||t[r];return T.set(c,a),o.inPlace(t,[r],\"wrap-logger-\",(()=\u003eT.get(c))),i}function E(){const e=(0,h.pV)();g.forEach((t=\u003e{e[t]=(...r)=\u003efunction(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=\u003e{e\u0026\u0026e.api?e.exposed\u0026\u0026e.api[t]\u0026\u0026n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length\u003e1?n:n[0]}(t,...r)}))}const S={};var N=r(9417),O=r(5603),_=r(5284);const I=e=\u003e{const t=e.startsWith(\"http\");e+=\"/\",r.p=t?e:\"https://\"+e};let j=!1;function P(e,t={},g,R){let{init:x,info:T,loader_config:P,runtime:C={},exposed:k=!0}=t;C.loaderType=g;const L=(0,h.pV)();T||(x=L.init,T=L.info,P=L.loader_config),(0,N.xN)(e.agentIdentifier,x||{}),(0,O.a)(e.agentIdentifier,P||{}),T.jsAttributes??={},d.bv\u0026\u0026(T.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,T);const H=(0,N.D0)(e.agentIdentifier),D=[T.beacon,T.errorBeacon];j||(H.proxy.assets\u0026\u0026(I(H.proxy.assets),D.push(H.proxy.assets)),H.proxy.beacon\u0026\u0026D.push(H.proxy.beacon),E(),(0,h.US)(\"activatedFeatures\",_.B),e.runSoftNavOverSpa\u0026\u0026=!0===H.soft_navigations.enabled\u0026\u0026H.feature_flags.includes(\"soft_nav\")),C.denyList=[...H.ajax.deny_list||[],...H.ajax.block_internal?D:[]],C.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,C),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api\u0026\u0026(e.api=function(e,t,h=!1){t||(0,c.Ak)(e,\"api\");const g={};var R=s.ee.get(e),x=R.get(\"tracer\");S[e]=b.g.OFF,R.on(p.G4.REPLAY_RUNNING,(t=\u003e{S[e]=t}));var T=\"api-\",E=T+\"ixn-\";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),I(T,n,!0,o||null===r?\"session\":void 0)(t,r)}function O(){}g.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,[\"API/log/called\"],void 0,n.K7.metrics,R),(0,w.R)(R,e,t,r)},g.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=\u003e{(0,a.p)(f.xV,[\"API/wrapLogger/called\"],void 0,n.K7.metrics,R),A(R,e,t,{customAttributes:r,level:i})},m.forEach((e=\u003e{g[e]=I(T,e,!0,\"api\")})),g.addPageAction=I(T,\"addPageAction\",!0,n.K7.genericEvents),g.setPageViewName=function(t,r){if(\"string\"==typeof t)return\"/\"!==t.charAt(0)\u0026\u0026(t=\"/\"+t),(0,o.f)(e).customTransaction=(r||\"http://custom.transaction\")+t,I(T,\"setPageViewName\",!0)()},g.setCustomAttribute=function(e,t,r=!1){if(\"string\"==typeof e){if([\"string\",\"number\",\"boolean\"].includes(typeof t)||null===t)return N(e,t,\"setCustomAttribute\",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},g.setUserId=function(e){if(\"string\"==typeof e||null===e)return N(\"enduser.id\",e,\"setUserId\",!0);(0,l.R)(41,typeof e)},g.setApplicationVersion=function(e){if(\"string\"==typeof e||null===e)return N(\"application.version\",e,\"setApplicationVersion\",!1);(0,l.R)(42,typeof e)},g.start=()=\u003e{try{(0,a.p)(f.xV,[\"API/start/called\"],void 0,n.K7.metrics,R),R.emit(\"manual-start-all\")}catch(e){(0,l.R)(23,e)}},g[p.G4.RECORD]=function(){(0,a.p)(f.xV,[\"API/recordReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,R)},g[p.G4.PAUSE]=function(){(0,a.p)(f.xV,[\"API/pauseReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,R)},g.interaction=function(e){return(new O).get(\"object\"==typeof e?e:{})};const _=O.prototype={createTracer:function(e,t){var r={},i=this,o=\"function\"==typeof t;return(0,a.p)(f.xV,[\"API/createTracer/called\"],void 0,n.K7.metrics,R),h||(0,a.p)(E+\"tracer\",[(0,v.t)(),e,r],i,n.K7.spa,R),function(){if(x.emit((o?\"\":\"no-\")+\"fn-start\",[(0,v.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t=\"string\"==typeof e?new Error(e):e;throw x.emit(\"fn-err\",[arguments,this,t],r),t}finally{x.emit(\"fn-end\",[(0,v.t)()],r)}}}};function I(e,t,r,i){return function(){return(0,a.p)(f.xV,[\"API/\"+t+\"/called\"],void 0,n.K7.metrics,R),i\u0026\u0026(0,a.p)(e+t,[(0,v.t)(),...arguments],r?null:this,i,R),r?void 0:this}}function j(){r.e(478).then(r.bind(r,8778)).then((({setAPI:t})=\u003e{t(e),(0,c.Ze)(e,\"api\")})).catch((e=\u003e{(0,l.R)(27,e),R.abort()}))}return[\"actionText\",\"setName\",\"setAttribute\",\"save\",\"ignore\",\"onEnd\",\"getContext\",\"end\",\"get\"].forEach((e=\u003e{_[e]=I(E,e,void 0,h?n.K7.softNav:n.K7.spa)})),g.setCurrentRouteName=h?I(E,\"routeName\",void 0,n.K7.softNav):I(T,\"routeName\",!0,n.K7.spa),g.noticeError=function(t,r){\"string\"==typeof t\u0026\u0026(t=new Error(t)),(0,a.p)(f.xV,[\"API/noticeError/called\"],void 0,n.K7.metrics,R),(0,a.p)(\"err\",[t,(0,v.t)(),!1,r,!!S[e]],void 0,n.K7.jserrors,R)},d.RI?(0,u.GG)((()=\u003ej()),!0):j(),g}(e.agentIdentifier,R,e.runSoftNavOverSpa)),void 0===e.exposed\u0026\u0026(e.exposed=k),j=!0}},8374:(e,t,r)=\u003e{r.nc=(()=\u003e{try{return document?.currentScript?.nonce}catch(e){}return\"\"})()},860:(e,t,r)=\u003e{\"use strict\";r.d(t,{$J:()=\u003eo,K7:()=\u003en,P3:()=\u003ei});const n={ajax:\"ajax\",genericEvents:\"generic_events\",jserrors:\"jserrors\",logging:\"logging\",metrics:\"metrics\",pageAction:\"page_action\",pageViewEvent:\"page_view_event\",pageViewTiming:\"page_view_timing\",sessionReplay:\"session_replay\",sessionTrace:\"session_trace\",softNav:\"soft_navigations\",spa:\"spa\"},i={[n.pageViewEvent]:1,[n.pageViewTiming]:2,[n.metrics]:3,[n.jserrors]:4,[n.spa]:5,[n.ajax]:6,[n.sessionTrace]:7,[n.softNav]:8,[n.sessionReplay]:9,[n.logging]:10,[n.genericEvents]:11},o={[n.pageViewTiming]:\"events\",[n.ajax]:\"events\",[n.spa]:\"events\",[n.softNav]:\"events\",[n.metrics]:\"jserrors\",[n.jserrors]:\"jserrors\",[n.sessionTrace]:\"browser/blobs\",[n.sessionReplay]:\"browser/blobs\",[n.logging]:\"browser/logs\",[n.genericEvents]:\"ins\"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=\u003e{for(var r in t)i.o(t,r)\u0026\u0026!i.o(e,r)\u0026\u0026Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=\u003ePromise.all(Object.keys(i.f).reduce(((t,r)=\u003e(i.f[r](e,t),t)),[])),i.u=e=\u003e({212:\"nr-spa-compressor\",249:\"nr-spa-recorder\",478:\"nr-spa\"}[e]+\"-1.275.0.min.js\"),i.o=(e,t)=\u003eObject.prototype.hasOwnProperty.call(e,t),e={},t=\"NRBA-1.275.0.PROD:\",i.l=(r,n,o,a)=\u003e{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName(\"script\"),d=0;d\u003cu.length;d++){var l=u[d];if(l.getAttribute(\"src\")==r||l.getAttribute(\"data-webpack\")==t+o){s=l;break}}if(!s){c=!0;var f={478:\"sha512-NvU3eQ7o5326npq3PdmyQFPyLLZ8dzJ2BG6+iqztQtUJe3LUirTbILWdA3lulN387X5fmO+nMjQ+LJRbkEPLVA==\",249:\"sha512-R/f355fvvfTK6aJgvL0I8Qhud5dLX6qQ7Zp5T6jXvMAyn8gP34jRy3hYQLS8EORUfSog20ecrDt9jLqfiNHbMQ==\",212:\"sha512-TFSNY6YbI0MLCIwHL77tq3s4Lpj2qr0N+8089sEUUOEdvqMeEJAchudmqpGRb5sfw6nx9uHsypk2HT16ipv7kg==\"};(s=document.createElement(\"script\")).charset=\"utf-8\",s.timeout=120,i.nc\u0026\u0026s.setAttribute(\"nonce\",i.nc),s.setAttribute(\"data-webpack\",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+\"/\")\u0026\u0026(s.crossOrigin=\"anonymous\"),f[a]\u0026\u0026(s.integrity=f[a])}e[r]=[n];var h=(t,n)=\u003e{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode\u0026\u0026s.parentNode.removeChild(s),i\u0026\u0026i.forEach((e=\u003ee(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:\"timeout\",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c\u0026\u0026document.head.appendChild(s)}},i.r=e=\u003e{\"undefined\"!=typeof Symbol\u0026\u0026Symbol.toStringTag\u0026\u0026Object.defineProperty(e,Symbol.toStringTag,{value:\"Module\"}),Object.defineProperty(e,\"__esModule\",{value:!0})},i.p=\"https://js-agent.newrelic.com/\",(()=\u003e{var e={38:0,788:0};i.f.j=(t,r)=\u003e{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=\u003en=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=\u003e{if(i.o(e,t)\u0026\u0026(0!==(n=e[t])\u0026\u0026(e[t]=void 0),n)){var o=r\u0026\u0026(\"load\"===r.type?\"missing\":r.type),a=r\u0026\u0026r.target\u0026\u0026r.target.src;s.message=\"Loading chunk \"+t+\" failed.\\n(\"+o+\": \"+a+\")\",s.name=\"ChunkLoadError\",s.type=o,s.request=a,n[1](s)}}),\"chunk-\"+t,t)}};var t=(t,r)=\u003e{var n,o,[a,s,c]=r,u=0;if(a.some((t=\u003e0!==e[t]))){for(n in s)i.o(s,n)\u0026\u0026(i.m[n]=s[n]);if(c)c(i)}for(t\u0026\u0026t(r);u\u003ca.length;u++)o=a[u],i.o(e,o)\u0026\u0026e[o]\u0026\u0026e[o][0](),e[o]=0},r=self[\"webpackChunk:NRBA-1.275.0.PROD\"]=self[\"webpackChunk:NRBA-1.275.0.PROD\"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=\u003e{\"use strict\";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(e=(0,r.LA)(16)){this.agentIdentifier=e}#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e(\"addPageAction\",e,t)}setPageViewName(e,t){return this.#e(\"setPageViewName\",e,t)}setCustomAttribute(e,t,r){return this.#e(\"setCustomAttribute\",e,t,r)}noticeError(e,t){return this.#e(\"noticeError\",e,t)}setUserId(e){return this.#e(\"setUserId\",e)}setApplicationVersion(e){return this.#e(\"setApplicationVersion\",e)}setErrorHandler(e){return this.#e(\"setErrorHandler\",e)}addRelease(e,t){return this.#e(\"addRelease\",e,t)}log(e,t){return this.#e(\"log\",e,t)}}class o extends n{#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e(\"start\")}finished(e){return this.#e(\"finished\",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e(\"addToTrace\",e)}setCurrentRouteName(e){return this.#e(\"setCurrentRouteName\",e)}interaction(){return this.#e(\"interaction\")}wrapLogger(e,t,r){return this.#e(\"wrapLogger\",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=\u003e{t[r]=function(e,t){return!0===(0,s.gD)(t,\"\".concat(e,\".enabled\"))}(r,e)})),t}var d=i(425);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart\u0026\u0026(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on(\"manual-start-all\",(0,v.J)((()=\u003e{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=\u003e{n=e}));const o=async()=\u003e{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit(\"internal-error\",[t]),this.featureName===a.K7.sessionReplay\u0026\u0026this.abortHandler?.()}try{if(t.sharedAggregator)await t.sharedAggregator;else{t.sharedAggregator=i.e(478).then(i.bind(i,9337));const{EventAggregator:e}=await t.sharedAggregator;t.sharedAggregator=new e}if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,\"aggregate\");this.featAggregate=new a(t,r),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee\u0026\u0026this.ee.abort()}};p.RI?(0,h.GG)((()=\u003eo()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)\u0026\u0026!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),T=i(2843),A=i(3878),E=i(782),S=i(1863);class N extends b{static featureName=E.T;constructor(e,t=!0){super(e,E.T,t),p.RI\u0026\u0026((0,T.u)((()=\u003e(0,x.p)(\"docHidden\",[(0,S.t)()],void 0,E.T,this.ee)),!0),(0,A.sp)(\"pagehide\",(()=\u003e(0,x.p)(\"winPagehide\",[(0,S.t)()],void 0,E.T,this.ee))),this.importAggregator(e))}}var O=i(3969);class _ extends b{static featureName=O.TZ;constructor(e,t=!0){super(e,O.TZ,t),this.importAggregator(e)}}var I=i(6774),j=i(3304);class P{constructor(e,t,r,n,i){this.name=\"UncaughtError\",this.message=\"string\"==typeof e?e:(0,j.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new P(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t=\"Unhandled Promise Rejection\";if(!e?.reason)return;if(H(e.reason))try{return e.reason.message=t+\": \"+e.reason.message,C(e.reason)}catch(t){return C(e.reason)}const r=C(e.reason);return r.message=t+\": \"+r?.message,r}function L(e){if(e.error instanceof SyntaxError\u0026\u0026!/:\\d+$/.test(e.error.stack?.trim())){const t=new P(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error\u0026\u0026!!e.stack}class D extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on(\"internal-error\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"ierr\",[C(e),(0,S.t)(),!0,{},this.#r],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.#r=e})),p.gm.addEventListener(\"unhandledrejection\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener(\"error\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var M=i(8990);let K=1;const U=\"nr@id\";function V(e){const t=typeof e;return!e||\"object\"!==t\u0026\u0026\"function\"!==t?-1:e===p.gm?0:(0,M.I)(e,U,(function(){return K++}))}function G(e){if(\"string\"==typeof e\u0026\u0026e.length)return e.length;if(\"object\"==typeof e){if(\"undefined\"!=typeof ArrayBuffer\u0026\u0026e instanceof ArrayBuffer\u0026\u0026e.byteLength)return e.byteLength;if(\"undefined\"!=typeof Blob\u0026\u0026e instanceof Blob\u0026\u0026e.size)return e.size;if(!(\"undefined\"!=typeof FormData\u0026\u0026e instanceof FormData))try{return(0,j.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=[\"open\",\"send\"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get(\"xhr\")}(r);if(void 0===p.gm.XMLHttpRequest)return n;if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u=\"readystatechange\",d=[\"onload\",\"onerror\",\"onabort\",\"onloadstart\",\"onloadend\",\"onprogress\",\"ontimeout\"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit(\"new-xhr\",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState\u003e3\u0026\u0026!s.resolved\u0026\u0026(s.resolved=!0,n.emit(\"xhr-resolved\",[],e)),i.inPlace(e,d,\"fn-\",y)}),(0,A.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit(\"internal-error\",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,[\"onreadystatechange\"],\"fn-\",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,\"-xhr-\",y),n.on(\"send-xhr-start\",(function(e,t){h(e,t),function(e){l.push(e),a\u0026\u0026(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on(\"open-xhr-start\",h),a){var g=s\u0026\u0026s.resolve();if(!c\u0026\u0026!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on(\"fn-end\",(function(e){e[0]\u0026\u0026e[0].type===u||b()}));function b(){for(var e=0;e\u003cl.length;e++)h(0,l[e]);l.length\u0026\u0026(l=[])}function y(e,t){return t}return n}var Y=\"fetch-\",X=Y+\"body-\",J=[\"arrayBuffer\",\"blob\",\"json\",\"text\",\"formData\"],Q=p.gm.Request,ee=p.gm.Response,te=\"prototype\";const re={};function ne(e){const t=function(e){return(e||B.ee).get(\"fetch\")}(e);if(!(Q\u0026\u0026ee\u0026\u0026p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];\"function\"==typeof i\u0026\u0026(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+\"before-start\",[r],o),o[B.P]\u0026\u0026o[B.P].dt\u0026\u0026(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+\"start\",[r,e],a),a.then((function(e){return t.emit(n+\"end\",[null,e],a),e}),(function(e){throw t.emit(n+\"end\",[e],a),e}))})}return re[t.debugId]=1,J.forEach((e=\u003e{r(Q[te],e,X),r(ee[te],e,X)})),r(p.gm,\"fetch\",Y),t.on(Y+\"end\",(function(e,r){var n=this;if(r){var i=r.headers.get(\"content-length\");null!==i\u0026\u0026(n.rxSize=i),t.emit(Y+\"done\",[null,r],n)}else t.emit(Y+\"done\",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||\"\").toString()||null,i=(t.agentID||\"\").toString()||null,o=(t.trustKey||\"\").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)\u0026\u0026this.useTraceContextHeadersForCors())\u0026\u0026(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin\u0026\u0026!this.excludeNewrelicHeader()||!e.sameOrigin\u0026\u0026this.isAllowedOrigin(e)\u0026\u0026this.useNewrelicHeaderForCors())\u0026\u0026(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return\"00-\"+t+\"-\"+e+\"-01\"}generateTraceContextStateHeader(e,t,r,n,i){return i+\"@nr=0-1-\"+r+\"-\"+n+\"-\"+e+\"----\"+t}generateTraceHeader(e,t,r,n,i,o){if(!(\"function\"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:\"Browser\",ac:n,ap:i,id:e,tr:t,ti:r}};return o\u0026\u0026n!==o\u0026\u0026(a.d.tk=o),btoa((0,j.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()\u0026\u0026this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,\"distributed_tracing\")\u0026\u0026(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n\u003cr.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname\u0026\u0026e.protocol===i.protocol\u0026\u0026e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=[\"load\",\"error\",\"abort\",\"timeout\"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;class he extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=\u003e(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:\"xhr\",fetch:\"fetch\",beacon:\"beacon\"};p.gm?.performance?.getEntriesByType(\"resource\").forEach((t=\u003e{if(t.initiatorType in e\u0026\u00260!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};pe(r,t.name),this.handler(\"xhr\",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener(\"load\",(function(r){T(t,e)}),(0,A.jT)(!1)),p.lR||e.addEventListener(\"progress\",(function(e){t.lastSize=e.loaded}),(0,A.jT)(!1))}function o(e){this.params={method:e[0]},pe(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid\u0026\u0026this.sameOrigin\u0026\u0026r.setRequestHeader(\"X-NewRelic-ID\",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader\u0026\u0026(r.setRequestHeader(\"newrelic\",i.newrelicHeader),o=!0),i.traceContextParentHeader\u0026\u0026(r.setRequestHeader(\"traceparent\",i.traceContextParentHeader),i.traceContextStateHeader\u0026\u0026r.setRequestHeader(\"tracestate\",i.traceContextStateHeader),o=!0),o\u0026\u0026(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n\u0026\u0026i){var a=G(i);a\u0026\u0026(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{\"abort\"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),(\"load\"!==e.type||o.called===o.totalCbs\u0026\u0026(o.onloadCalled||\"function\"!=typeof r.onload)\u0026\u0026\"function\"==typeof o.end)\u0026\u0026o.end(r)}catch(e){try{t.emit(\"internal-error\",[e])}catch(e){}}};for(var s=0;s\u003cde;s++)r.addEventListener(ue[s],this.listener,(0,A.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled\u0026\u0026\"function\"==typeof r.onload||\"function\"!=typeof this.end||this.end(r)}function d(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026!this.xhrGuids[r]\u0026\u0026(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026this.xhrGuids[r]\u0026\u0026(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-added\",[e[1],e[2]],r)}function g(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-removed\",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe\u0026\u0026(\"onload\"===r\u0026\u0026(this.onload=!0),(\"load\"===(e[0]\u0026\u0026e[0].type)||this.onload)\u0026\u0026(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart\u0026\u0026t.emit(\"xhr-cb-time\",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if(\"string\"==typeof e[0]?0===(t=e[0]).length\u0026\u0026p.RI\u0026\u0026(t=\"\"+p.gm.location.href):e[0]\u0026\u0026e[0].url?t=e[0].url:p.gm?.URL\u0026\u0026e[0]\u0026\u0026e[0]instanceof URL?t=e[0].href:\"function\"==typeof e[0].toString\u0026\u0026(t=e[0].toString()),\"string\"==typeof t\u0026\u00260!==t.length){t\u0026\u0026(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i\u0026\u0026(i.newrelicHeader||i.traceContextParentHeader))if(e[0]\u0026\u0026e[0].headers)s(e[0].headers,i)\u0026\u0026(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)\u0026\u0026(this.dt=i),e.length\u003e1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader\u0026\u0026(e.set(\"newrelic\",t.newrelicHeader),r=!0),t.traceContextParentHeader\u0026\u0026(e.set(\"traceparent\",t.traceContextParentHeader),t.traceContextStateHeader\u0026\u0026e.set(\"tracestate\",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length\u003e=1\u0026\u0026(this.target=e[0]),e.length\u003e=2\u0026\u0026(this.opts=e[1]);var r,n=this.opts||{},i=this.target;\"string\"==typeof i?r=i:\"object\"==typeof i\u0026\u0026i instanceof le?r=i.url:p.gm?.URL\u0026\u0026\"object\"==typeof i\u0026\u0026i instanceof URL\u0026\u0026(r=i.href),pe(this,r);var o=(\"\"+(i\u0026\u0026i instanceof le\u0026\u0026i.method||n.method||\"GET\")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,\"string\"==typeof this.rxSize\u0026\u0026this.rxSize.length\u003e0\u0026\u0026(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r(\"xhr\",[this.params,i,this.startTime,this.endTime,\"fetch\"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t\u003cde;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCazptureCalled||4!==e.readyState?null==t.status\u0026\u0026(t.status=0):T(this,e),n.cbTime=this.cbTime,r(\"xhr\",[t,n,this.startTime,this.endTime,\"xhr\"],this,a.K7.ajax))}}function T(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return\"json\"===r\u0026\u0026null!==t?t:\"arraybuffer\"===r||\"blob\"===r||\"json\"===r?G(e.response):\"text\"===r||\"\"===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n\u0026\u0026(e.metrics.rxSize=n),e.sameOrigin){var i=r.getResponseHeader(\"X-NewRelic-App-Data\");i\u0026\u0026((0,x.p)(O.rs,[\"Ajax/CrossApplicationTracing/Header/Seen\"],void 0,a.K7.metrics,t),e.params.cat=i.split(\", \").pop())}e.loadCaptureCalled=!0}t.on(\"new-xhr\",i),t.on(\"open-xhr-start\",o),t.on(\"open-xhr-end\",s),t.on(\"send-xhr-start\",c),t.on(\"xhr-cb-time\",u),t.on(\"xhr-load-added\",d),t.on(\"xhr-load-removed\",l),t.on(\"xhr-resolved\",f),t.on(\"addEventListener-end\",h),t.on(\"removeEventListener-end\",g),t.on(\"fn-end\",v),t.on(\"fetch-before-start\",b),t.on(\"fetch-start\",y),t.on(\"fn-start\",m),t.on(\"fetch-done\",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function pe(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+\":\"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const ge={},me=[\"pushState\",\"replaceState\"];function ve(e){const t=function(e){return(e||B.ee).get(\"history\")}(e);return!p.RI||ge[t.debugId]++||(ge[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,me,\"-\")),t}var be=i(3738);const{He:ye,bD:we,d3:Re,Kp:xe,TZ:Te,Lc:Ae,uP:Ee,Rz:Se}=be;class Ne extends b{static featureName=Te;constructor(e,t=!0){super(e,Te,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;ve(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Ee,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Ae,(function(e,t){(0,x.p)(\"bst\",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Se+Re,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Se+xe,(function(e){(0,x.p)(\"bstHist\",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=\u003e{const t=e.getEntries();(0,x.p)(ye,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:we,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var Oe=i(2614);class _e extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem(\"\".concat(Oe.H3,\"_\").concat(Oe.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)\u0026\u0026this.ee.on(t.G4.RECORD,(()=\u003ethis.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on(\"err\",(e=\u003e{this.replayRunning\u0026\u0026(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.replayRunning=e}))}#s(e){return e\u0026\u0026(e.sessionReplayMode===Oe.g.FULL||e.sessionReplayMode===Oe.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==Oe.g.FULL\u0026\u0026this.featAggregate.initializeRecording(Oe.g.FULL,!0):(this.#i=Oe.g.FULL,this.#c(t.Qb.API),this.recorder\u0026\u0026this.recorder.parent.mode!==Oe.g.FULL\u0026\u0026(this.recorder.parent.mode=Oe.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Ie=i(3962);class je extends b{static featureName=Ie.TZ;constructor(e,t=!0){if(super(e,Ie.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=ve(this.ee);Ie.tC.forEach((e=\u003e{(0,A.sp)(e,(e=\u003e{a(e)}),!0)}));const n=()=\u003e(0,x.p)(\"newURL\",[(0,S.t)(),\"\"+window.location],void 0,this.featureName,this.ee);r.on(\"pushState-end\",n),r.on(\"replaceState-end\",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,A.sp)(\"popstate\",(e=\u003e(0,x.p)(\"newURL\",[e.timeStamp,\"\"+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=\u003e{i||(i=!0,requestAnimationFrame((()=\u003e{(0,x.p)(\"newDom\",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=\u003e{(0,x.p)(\"newUIEvent\",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var Pe=i(7378);const Ce={},ke=[\"appendChild\",\"insertBefore\",\"replaceChild\"];function Le(e){const t=function(e){return(e||B.ee).get(\"jsonp\")}(e);if(!p.RI||Ce[t.debugId])return t;Ce[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?\u0026](?:callback|cb)=([^\u0026#]+)/,i=/(.*)\\.([^.]+)/,o=/^(\\w+)(\\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,ke,\"dom-\"),t.on(\"dom-start\",(function(e){!function(e){if(!e||\"string\"!=typeof e.nodeName||\"script\"!==e.nodeName.toLowerCase())return;if(\"function\"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t\u0026\u0026t.length\u003e=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if(\"function\"!=typeof u.parent[u.key])return;var d={};function l(){t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}function f(){t.emit(\"jsonp-error\",[],d),t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}r.inPlace(u.parent,[u.key],\"cb-\",d),e.addEventListener(\"load\",l,(0,A.jT)(!1)),e.addEventListener(\"error\",f,(0,A.jT)(!1)),t.emit(\"new-jsonp\",[e.src],d)}(e[0])})),t}const He={};function De(e){const t=function(e){return(e||B.ee).get(\"promise\")}(e);if(He[t.debugId])return t;He[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i\u0026\u0026function(){function e(r){var o=t.context(),a=n(r,\"executor-\",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,\"name\",{value:\"Promise\"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),[\"all\",\"race\"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=\u003e{this.resolve(e).then(a(\"all\"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit(\"propagate\",[null,!i],o,!1,!1),i=i||!e}}}})),[\"resolve\",\"reject\"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r\u0026\u0026t.emit(\"propagate\",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],\"cb-\",a,null,!1),e[1]=n(e[1],\"cb-\",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit(\"propagate\",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on(\"executor-start\",(function(e){e[0]=n(e[0],\"resolve-\",this,null,!1),e[1]=n(e[1],\"resolve-\",this,null,!1)})),t.on(\"executor-err\",(function(e,t,r){e[1](r)})),t.on(\"cb-end\",(function(e,r,n){t.emit(\"propagate\",[n,!0],this.nextPromise,!1,!1)})),t.on(\"propagate\",(function(e,r,n){this.getCtx\u0026\u0026!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r\u0026\u0026r.getCtx?r.getCtx():this})}))}(),t}const Me={},Ke=\"setTimeout\",Ue=\"setInterval\",Ve=\"clearTimeout\",Ge=\"-start\",Fe=[Ke,\"setImmediate\",Ue,Ve,\"clearImmediate\"];function Be(e){const t=function(e){return(e||B.ee).get(\"timer\")}(e);if(Me[t.debugId]++)return t;Me[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Fe.slice(0,2),Ke+\"-\"),r.inPlace(p.gm,Fe.slice(2,3),Ue+\"-\"),r.inPlace(p.gm,Fe.slice(3),Ve+\"-\"),t.on(Ue+Ge,(function(e,t,n){e[0]=r(e[0],\"fn-\",null,n)})),t.on(Ke+Ge,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],\"fn-\",this,n)})),t}const We={};function ze(e){const t=function(e){return(e||B.ee).get(\"mutation\")}(e);if(!p.RI||We[t.debugId])return t;We[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n\u0026\u0026(window.MutationObserver=function(e){return this instanceof n?new n(r(e,\"fn-\")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:qe,d3:Ze,Kp:Ye,$p:Xe,wW:Je,e5:Qe,tH:$e,uP:et,rw:tt,Lc:rt}=Pe;class nt extends b{static featureName=qe;constructor(e,t=!0){if(super(e,qe,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get(\"tracer\"),o=Le(this.ee),a=De(this.ee),s=Be(this.ee),c=Z(this.ee),u=this.ee.get(\"events\"),d=ne(this.ee),l=ve(this.ee),f=ze(this.ee);function h(e,t){l.emit(\"newURL\",[\"\"+window.location,t])}function g(){n++,r=window.location.hash,this[et]=(0,S.t)()}function m(){n--,window.location.hash!==r\u0026\u0026h(0,!0);var e=(0,S.t)();this[Qe]=~~this[Qe]+e-this[et],this[rt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(et,g),a.on(tt,g),o.on(tt,g),this.ee.on(rt,m),a.on(Je,m),o.on(Je,m),this.ee.on(\"fn-err\",((...t)=\u003e{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)(\"function-err\",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([et,rt,\"xhr-resolved\"],this.featureName),u.buffer([et],this.featureName),s.buffer([\"setTimeout\"+Ye,\"clearTimeout\"+Ze,et],this.featureName),c.buffer([et,\"new-xhr\",\"send-xhr\"+Ze],this.featureName),d.buffer([$e+Ze,$e+\"-done\",$e+Xe+Ze,$e+Xe+Ye],this.featureName),l.buffer([\"newURL\"],this.featureName),f.buffer([et],this.featureName),a.buffer([\"propagate\",tt,Je,\"executor-err\",\"resolve\"+Ze],this.featureName),i.buffer([et,\"no-\"+et],this.featureName),o.buffer([\"new-jsonp\",\"cb-start\",\"jsonp-error\",\"jsonp-end\"],this.featureName),v(d,$e+Ze),v(d,$e+\"-done\"),v(o,\"new-jsonp\"),v(o,\"jsonp-end\"),v(o,\"cb-start\"),l.on(\"pushState-end\",h),l.on(\"replaceState-end\",h),window.addEventListener(\"hashchange\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"load\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"popstate\",(function(){h(0,n\u003e1)}),(0,A.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var it=i(3333);class ot extends b{static featureName=it.TZ;constructor(e,t=!0){super(e,it.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled];p.RI\u0026\u0026e.init.user_actions.enabled\u0026\u0026(it.Zp.forEach((e=\u003e(0,A.sp)(e,(e=\u003e(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)),!0))),it.qN.forEach((e=\u003e(0,A.sp)(e,(e=\u003e(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)))))),r.some((e=\u003ee))?this.importAggregator(e):this.deregisterDrain()}}var at=i(993),st=i(3785);class ct extends b{static featureName=at.TZ;constructor(e,t=!0){super(e,at.TZ,t);const r=this.ee;this.ee.on(\"wrap-logger-end\",(function([e]){const{level:t,customAttributes:n}=this;(0,st.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t,r){super(r),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=\u003ee.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||\"agent\"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=\u003ea.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=\u003e{if(!t[r.featureName]\u0026\u0026r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=\u003e!(e in this.features)));n.length\u003e0\u0026\u0026(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[he,w,N,Ne,_e,_,D,ot,ct,je,nt],loaderType:\"spa\"})})()})();\n","testAutomationFlags":{"disableAds":false,"disableIirisAuth":false,"disableWelcomeAd":false,"disableBigskyAd":false,"disableIirisRecommend":false,"disableDcts":false,"disableWeatherWidget":false,"disableCashGrainWidget":false,"disableCommoditiesWidget":false,"disableCaptcha":false,"disableCookieBanner":false,"overrideBrandStyling":"","overrideThemeStyling":""},"configState":{"font":{"primary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"},"secondary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"}},"theme":"theme1","uiBrand":"darkreading","isMarketsDivision":false,"image":{"brand":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png","contributor":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt171e20ac163e523a/65004ec08c754b16dd16303c/Contributor_Avatar.png"},"media":{"brightcoveAccountId":"1568176135"},"newsletterSignupPromo":{"unbounceURL":"https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi"},"proxyConfigs":{"proxyEnabled":false,"proxyRootPath":""}}},"routes/$topic._index":{"template":{"title":"Cyberattacks \u0026 Data Breaches","categories":[],"categoryDesc":"","variant":"primary","breadcrumbs":[{"url":"/","title":"Home"},{"title":"Cyberattacks \u0026 Data Breaches","url":"/cyberattacks-data-breaches"}],"newsletterSignUpPromo":{"title":"Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.","message":"","newsletterId":"bltdcb90f81b445a744","buttonText":"Subscribe","variant":"vertical","mode":"dark"},"pagination":{"totalCount":225,"currentPage":1},"contents":[{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltac510e8eb99b81bb/66049de32485e72d8ed53763/Department_of_State_B_Christopher_Alamy.jpg","alt":"Department of State sign in front of a building "},"contributors":[{"name":"Kristina Beek, Associate Editor, Dark Reading","link":"/author/kristinabeek","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2248772495e9caeb/64f17d73018a7c55e8822fc1/KristinaB.jpg","role":""}],"articleName":"Chinese Hacker Pwns 81K Sophos Devices With Zero-Day Bug","mobileHeadline":"Chinese Hacker Pwns 81K Sophos Devices With Zero-Day","articleUrl":"/cyberattacks-data-breaches/chinese-hacker-pwns-81k-sophos-devices-with-zero-day-bug","linkAttrs":{},"listPageUrl":"","date":"Dec 11, 2024","webinarStartTime":"","articleSummary":"The US State Department has offered a $10 million reward for Guan Tianfeng, who has been accused of developing and testing a critical SQL injection flaw with a CVSS score of 9.8 used in Sophos attacks.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt14c3ba617c41541b/675a08d8e1616ceb1427164f/krispy_kreme_Matthew_Horwood_Alamy_Stock_Photo.jpg","alt":"Krispy Kreme doughnut assortment on plate"},"contributors":[{"name":"Becky Bracken, Senior Editor, Dark Reading","link":"/author/becky-bracken","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07f8ecb5868dd4fd/6750aa66113e14656849e053/becky_mug_2024.jpg","role":""}],"articleName":"Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack","mobileHeadline":"Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack","articleUrl":"/cyberattacks-data-breaches/krispy-kreme-doughnut-delivery-cooked-cyberattack","linkAttrs":{},"listPageUrl":"","date":"Dec 11, 2024","webinarStartTime":"","articleSummary":"Threat actors punch holes in the company's online ordering systems, tripping up doughnut deliveries across the US after a late November breach.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt798f3186eb2cd32e/675968862190e33bc7f9319a/MFA-Fabio_Principe-AdobeStock.jpeg","alt":"A woman sitting at a laptop and holding a mobile device, the screens of both displaying a green check mark in a circle"},"contributors":[{"name":"Elizabeth Montalbano, Contributing Writer","link":"/author/elizabeth-montalbano","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg","role":""}],"articleName":"Researchers Crack Microsoft Azure MFA in an Hour","mobileHeadline":"Researchers Crack Microsoft Azure MFA in an Hour","articleUrl":"/cyberattacks-data-breaches/researchers-crack-microsoft-azure-mfa-hour","linkAttrs":{},"listPageUrl":"","date":"Dec 11, 2024","webinarStartTime":"","articleSummary":"A critical flaw in the company's rate limit for failed sign-in attempts allowed unauthorized access to a user account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt0b5bdae5ee8f5433/6758b8c00203db1c6aca40ec/sotp-Alfonso_Fabio_Iozzino-alamy.jpg","alt":"A stop sign that misspells it SOTP. To err is human."},"contributors":[{"name":"Dmytro Tereshchenko","link":"/author/dmytro-tereshchenko","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt16b789521f24abac/6758ab47fc79a86e4532957b/TereshchenkoD_photo.jpeg","role":"CISO, Sigma Software Group"}],"articleName":"Cybersecurity Lessons From 3 Public Breaches","mobileHeadline":"Cybersecurity Lessons From 3 Public Breaches","articleUrl":"/cyberattacks-data-breaches/cybersecurity-lessons-from-3-public-breaches","linkAttrs":{},"listPageUrl":"","date":"Dec 11, 2024","webinarStartTime":"","articleSummary":"High-profile security incidents provide examples of how common vulnerabilities can be exploited. If you pay attention, you can learn from others' mistakes.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt15c2853fa69a58ba/673f45b5df958859a25544ab/Breach_(1800)_Brain_light_Alamy.jpg","alt":"Hand reaching into a screen of 1s and 0s"},"contributors":[{"name":"Pukar C. Hamal","link":"/author/pukar-c-hamal","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6d4b49be39e0df55/67589b0d7d17dc5ba32d697f/Headshot.png","role":"Founder \u0026 CEO, SecurityPal"}],"articleName":"Tips for Preventing Breaches in 2025","mobileHeadline":"Tips for Preventing Breaches in 2025","articleUrl":"/cyberattacks-data-breaches/tips-preventing-breaches-2025","linkAttrs":{},"listPageUrl":"","date":"Dec 11, 2024","webinarStartTime":"","articleSummary":"Hackers are constantly evolving, and so too should our security protocols.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt79352623e0f7eee0/67576a4fc70f33855a14205a/Ar_TH-cybersecurity-globe-shutterstock.jpg","alt":"A globe overlaid with code"},"contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","role":""}],"articleName":"Governments, Telcos Ward Off China's Hacking Typhoons","mobileHeadline":"Governments, Telcos Ward Off China's Hacking Typhoons","articleUrl":"/cyberattacks-data-breaches/governments-telcos-chinas-hacking-typhoons","linkAttrs":{},"listPageUrl":"","date":"Dec 11, 2024","webinarStartTime":"","articleSummary":"Infiltrating other nations' telecom networks is a cornerstone of China's geopolitical strategy, and it's having the unintended consequence of driving the uptake of encrypted communications.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte17bc7f9dced30f8/67598def098d3995d4241885/network-attack-HernanSchmidt-alamy.jpg","alt":"Cables plugged into a network switch"},"contributors":[{"name":"Jennifer Lawinski","link":"/author/jennifer-lawinski","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg","role":"Contributing Writer"}],"articleName":"FCC Proposes New Cybersecurity Rules for Telecoms","mobileHeadline":"FCC Proposes New Cybersecurity Rules for Telecoms","articleUrl":"/cyberattacks-data-breaches/fcc-new-cybersecurity-rules-telecoms","linkAttrs":{},"listPageUrl":"","date":"Dec 10, 2024","webinarStartTime":"","articleSummary":"FCC Chairwoman Jessica Rosenworcel recommended \"urgent action\" to safeguard the nation's communications systems from real and present cybersecurity threats. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt639e15f3db4adfc3/6758b7d51032ca38e01f0c90/patch-Zoonar_GmbH-Alamy.jpg","alt":"A patchwork quilt"},"contributors":[{"name":"Tara Seals, Managing Editor, News, Dark Reading","link":"/author/tara-seals","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt74c35947c6a4996b/64f1714aa5678002330c4412/Tara-Seals-Headshot2.jpg","role":""}],"articleName":"Actively Exploited Zero-Day, Critical RCEs Lead Microsoft Patch Tuesday","mobileHeadline":"Microsoft Fixes Active Zero-Day, Critical RCEs on Patch Tuesday","articleUrl":"/application-security/microsoft-zero-day-critical-rces-patch-tuesday","linkAttrs":{},"listPageUrl":"","date":"Dec 10, 2024","webinarStartTime":"","articleSummary":"The zero-day (CVE-2024-49138), plus a worryingly critical unauthenticated RCE security vulnerability (CVE-2024-49112), are unwanted gifts for security admins this season.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Application Security","categoryUrl":"/application-security","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltca94707d9eb540ff/67589aeeae823361d7d14794/0day_znakki_shutterstock.jpg","alt":" The words \"Zero-day exploit\" on a computer keyboard."},"contributors":[{"name":"Jai Vijayan, Contributing Writer","link":"/author/jai-vijayan","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg","role":""}],"articleName":"'Termite' Ransomware Likely Behind Cleo Zero-Day Attacks","mobileHeadline":"'Termite' Ransomware Likely Behind Cleo Zero-Day Attacks","articleUrl":"/cyberattacks-data-breaches/termite-ransomware-behind-cleo-zero-day-attacks","linkAttrs":{},"listPageUrl":"","date":"Dec 10, 2024","webinarStartTime":"","articleSummary":"The threat actor group recently took credit for a similar attack on Blue Yonder that affected multiple organizations, including Starbucks.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt5db2efbed288c5d5/675883000203db7e28ca401d/scottishparliment1800_Norman_Pogson_alamy.jpg","alt":"The Debating Chamber of the Scottish Parliament in Holyrood, Edinburgh, Scotland"},"contributors":[{"name":"Kristina Beek, Associate Editor, Dark Reading","link":"/author/kristinabeek","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2248772495e9caeb/64f17d73018a7c55e8822fc1/KristinaB.jpg","role":""}],"articleName":"Scottish Parliament TV at Risk From Deepfakes","mobileHeadline":"Scottish Parliament TV at Risk From Deepfakes ","articleUrl":"/cyberattacks-data-breaches/scottish-parliament-tv-risk-deepfakes","linkAttrs":{},"listPageUrl":"","date":"Dec 10, 2024","webinarStartTime":"","articleSummary":"Because the streaming service website offers no content restrictions, attackers are able to hijack and manipulate live streams.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf2d32eda0b327f90/6758361719771e7dfba856f5/AWS-GK_Images-Alamy.png","alt":"Letters AWS in white with a yellow arrow pointing to the right underneath against a black backdrop"},"contributors":[{"name":"Elizabeth Montalbano, Contributing Writer","link":"/author/elizabeth-montalbano","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg","role":""}],"articleName":"Cybercrime Gangs Abscond With Thousands of Orgs' AWS Credentials","mobileHeadline":"Cybercrime Gangs Abscond With 1000s of AWS Credentials","articleUrl":"/endpoint-security/cybercrime-gangs-steal-thousands-aws-credentials","linkAttrs":{},"listPageUrl":"","date":"Dec 10, 2024","webinarStartTime":"","articleSummary":"The Nemesis and ShinyHunters attackers scanned millions of IP addresses to find exploitable cloud-based flaws, though their operation ironically was discovered due to a cloud misconfiguration of their own doing.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Endpoint Security","categoryUrl":"/endpoint-security","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltaff16487233e037f/66d5c1d6eb420ceb806ee6ee/Chain(1800)_Zoonar_GmbH_Alamy.jpg","alt":"Metal chain with a broken link"},"contributors":[{"name":"Eldan Ben-Haim","link":"/author/eldan-ben-haim","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt54db24db2bdce760/67584b6ee1616c4955270b3a/eldan.jpg","role":"Chief Architect Officer, Apiiro"}],"articleName":"Lessons From the Largest Software Supply Chain Incidents","mobileHeadline":"Lessons From the Largest Software Supply Chain Incidents","articleUrl":"/vulnerabilities-threats/lessons-largest-software-supply-chain-incidents","linkAttrs":{},"listPageUrl":"","date":"Dec 10, 2024","webinarStartTime":"","articleSummary":"The software supply chain is a growing target, and organizations need to take special care to safeguard it.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf107a8b2df047202/67573f4aa643a9191dd33405/VS_Code-Araki_Illustrations-Alamy.jpg","alt":"The Visual Studio Code logo"},"contributors":[{"name":"Nate Nelson, Contributing Writer","link":"/author/nate-nelson","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg","role":""}],"articleName":"Sprawling 'Operation Digital Eye' Attack Targets European IT Orgs","mobileHeadline":"'Operation Digital Eye' Attack Targets European IT Orgs","articleUrl":"/cyberattacks-data-breaches/operation-digital-eye-attack-targets-european-it-orgs","linkAttrs":{},"listPageUrl":"","date":"Dec 10, 2024","webinarStartTime":"","articleSummary":"A Chinese threat actor infiltrated several IT and security companies in a bring-your-own VS code, with an eye to carrying out a supply-chain-based espionage attack. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt79f0121dcc99ca87/67575396098d3937b5240d57/thief_stealing_money_Hajrudin_Hodzic_Alamy.jpg","alt":"Gloved hand stealing money out of man's shirt pocket"},"contributors":[{"name":"Becky Bracken, Senior Editor, Dark Reading","link":"/author/becky-bracken","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07f8ecb5868dd4fd/6750aa66113e14656849e053/becky_mug_2024.jpg","role":""}],"articleName":"Millionaire Airbnb Phishing Ring Busted Up by Police","mobileHeadline":"Millionaire Airbnb Phishing Ring Busted Up by Police","articleUrl":"/cyberattacks-data-breaches/millionaire-airbnb-phishing-ring-busted-police","linkAttrs":{},"listPageUrl":"","date":"Dec 9, 2024","webinarStartTime":"","articleSummary":"Scammers set up call centers in luxury rentals to run bank help-desk fraud, as well as large-scale phishing campaigns, across at least 10 European countries, according to law enforcement. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7daf9e4993e26979/6756da557f520448ae775fc7/sasin_paraksa-qr-code-security-shutterstock.jpg","alt":"QR code displayed on a mobile device next to lines of code with the outline of a shield with a padlock in the middle on top"},"contributors":[{"name":"Elizabeth Montalbano, Contributing Writer","link":"/author/elizabeth-montalbano","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg","role":""}],"articleName":"Attackers Can Use QR Codes to Bypass Browser Isolation","mobileHeadline":"Attackers Can Use QR Codes to Bypass Browser Isolation ","articleUrl":"/endpoint-security/attackers-qr-codes-bypass-browser-isolation","linkAttrs":{},"listPageUrl":"","date":"Dec 9, 2024","webinarStartTime":"","articleSummary":"Researchers demonstrate a proof-of-concept cyberattack vector that gets around remote, on-premises, and local versions of browser isolation security technology to send malicious communications from an attacker-controlled server.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Endpoint Security","categoryUrl":"/endpoint-security","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt554adda1d371f224/673df913f449ce5a206c9e6a/Cyersecurity_globe_1800_Skorzewiak_Alamy.jpg","alt":"Globe with cybersecurity symbols circling it"},"contributors":[{"name":"Audra Streetman","link":"/author/audra-streetman","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd435b0d3c70140df/675209b3d09ea20440d8f0a7/Audra_Streetman_(4)_(1).jpeg","role":"Senior Threat Intelligence Analyst, Splunk"}],"articleName":"Large-Scale Incidents \u0026 the Art of Vulnerability Prioritization","mobileHeadline":"Large-Scale Incidents \u0026 the Art of Vulnerability Prioritization","articleUrl":"/vulnerabilities-threats/large-scale-incidents-art-vulnerability-prioritization","linkAttrs":{},"listPageUrl":"","date":"Dec 9, 2024","webinarStartTime":"","articleSummary":"We can anticipate a growing number of emerging vulnerabilities in the near future, emphasizing the need for an effective prioritization strategy. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99e01e84782cb505/6753602922e63f8a96c7958a/arrest_steven_frame_alamy.jpg","alt":"Person with hands cuffed behind back"},"contributors":[{"name":"Becky Bracken, Senior Editor, Dark Reading","link":"/author/becky-bracken","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07f8ecb5868dd4fd/6750aa66113e14656849e053/becky_mug_2024.jpg","role":""}],"articleName":"Texas Teen Arrested for Scattered Spider Telecom Hacks","mobileHeadline":"Texas Teen Arrested for Scattered Spider Telecom Hacks","articleUrl":"/cyberattacks-data-breaches/texas-teen-arrested-scattered-spider-telecom-hacks","linkAttrs":{},"listPageUrl":"","date":"Dec 6, 2024","webinarStartTime":"","articleSummary":"An FBI operation nabbed a member of the infamous cybercrime group, who is spilling the tea on \"key Scattered Spider members\" and their tactics. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt49bc5cf8b0ba0080/6752181394ad217545d4229c/Vitalii-Vodolazskyi-DMCA-keyboard-shutterstock.jpg","alt":"DMCA logo and gavel sitting on a computer keyboard"},"contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","role":""}],"articleName":"Library of Congress Offers AI Legal Guidance to Researchers","mobileHeadline":"Library of Congress Offers AI Legal Guidance to Researchers","articleUrl":"/cyber-risk/library-congress-ai-legal-guidance-researchers","linkAttrs":{},"listPageUrl":"","date":"Dec 5, 2024","webinarStartTime":"","articleSummary":"Researchers testing generative AI systems can use prompt injection, re-register after being banned, and bypass rate limits without running afoul of copyright law.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyber Risk","categoryUrl":"/cyber-risk","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4a5bfeaa660cbace/675221269156dc2f14d3ffda/tunnels-Classic_Image-Alamy.jpg","alt":"Great Siege Tunnels, Gibraltar, featuring a tableau of seven cannons overlooking Spanish positions "},"contributors":[{"name":"Tara Seals, Managing Editor, News, Dark Reading","link":"/author/tara-seals","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt74c35947c6a4996b/64f1714aa5678002330c4412/Tara-Seals-Headshot2.jpg","role":""}],"articleName":"Russia's 'BlueAlpha' APT Hides in Cloudflare Tunnels","mobileHeadline":"Russia's 'BlueAlpha' APT Hides in Cloudflare Tunnels","articleUrl":"/cloud-security/russias-bluealpha-apt-cloudflare-tunnels","linkAttrs":{},"listPageUrl":"","date":"Dec 5, 2024","webinarStartTime":"","articleSummary":"Cloudflare Tunnels is just the latest legitimate cloud service that cybercriminals and state-sponsored threat actors are abusing to hide their tracks. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Сloud Security","categoryUrl":"/cloud-security","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9e879ab956bceb5b/6752065cfb1d680143b52372/abstract_crime_op_image_baosheng_feng_Alamy.jpg","alt":"Abstract image of red human figure surrounded by black human figures"},"contributors":[{"name":"Becky Bracken, Senior Editor, Dark Reading","link":"/author/becky-bracken","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07f8ecb5868dd4fd/6750aa66113e14656849e053/becky_mug_2024.jpg","role":""}],"articleName":"Trojan-as-a-Service Hits Euro Banks, Crypto Exchanges","mobileHeadline":"Trojan-as-a-Service Hits Euro Banks, Crypto Exchanges","articleUrl":"/threat-intelligence/trojan-service-hits-euro-banks-crypto-exchanges","linkAttrs":{},"listPageUrl":"","date":"Dec 5, 2024","webinarStartTime":"","articleSummary":"At least 17 affiliate groups have used the \"DroidBot\" Android banking Trojan against 77 financial services companies across Europe, with more to come, researchers warn.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Threat Intelligence","categoryUrl":"/threat-intelligence","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blteee85674853bdcb9/6751936e9156dc0d82d3fd65/chinaspying_BeeBright_shutterstock.jpg","alt":"Red hooded figures with blacked-out faces with three yellow stars in the upper left of the frame"},"contributors":[{"name":"Elizabeth Montalbano, Contributing Writer","link":"/author/elizabeth-montalbano","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg","role":""}],"articleName":"'Earth Minotaur' Exploits WeChat Bugs, Sends Spyware to Uyghurs","mobileHeadline":"'Earth Minotaur' Exploits WeChat Bugs, Sends Spyware to Uyghurs","articleUrl":"/cyberattacks-data-breaches/earth-minotaur-exploits-wechat-bugs-spyware-uyghurs","linkAttrs":{},"listPageUrl":"","date":"Dec 5, 2024","webinarStartTime":"","articleSummary":"The emerging threat actor, potentially a Chinese state-sponsored APT, is using the known exploit kit Moonshine in cross-platform attacks that deliver a previously undisclosed backdoor called \"DarkNimbus\" to ethnic minorities, including Tibetans.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltaa0c5215b7706817/65ef244e617a0b040a5e0628/golden_dayz-africa-digital-security-shutterstock.jpg","alt":"A digital map of Africa, overlaid with padlocks"},"contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","role":""}],"articleName":"African Law Enforcement Nabs 1,000+ Cybercrime Suspects","mobileHeadline":"African Law Enforcement Nabs 1,000+ Cybercrime Suspects","articleUrl":"/cyberattacks-data-breaches/african-law-enforcement-cybercrime-suspects","linkAttrs":{},"listPageUrl":"","date":"Dec 5, 2024","webinarStartTime":"","articleSummary":"Authorities across 19 African countries also dismantled their infrastructure and networks, thanks to cooperation between global law enforcement and private firms.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9bf7e6a9826c0aea/6750c624093fa132fa7059fc/chinacyber_Weitwinkel_shutterstock.jpg","alt":"American and Chinese flags on computer keyboard keys"},"contributors":[{"name":"Jai Vijayan, Contributing Writer","link":"/author/jai-vijayan","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg","role":""}],"articleName":"CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat","mobileHeadline":"CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat","articleUrl":"/cyberattacks-data-breaches/cisa-issue-guidance-telecoms-salt-typhoon-threat","linkAttrs":{},"listPageUrl":"","date":"Dec 4, 2024","webinarStartTime":"","articleSummary":"Individuals concerned about the privacy of their communications should consider using encrypted messaging apps and encrypted voice communications, CISA and FBI officials say.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt31277ae12047e355/6750c009baafbed865706548/Spy_vs_Spy-ArcadeImages-Alamy.jpg","alt":"The title screen for 1988's \"Spy vs. Spy\" arcade game"},"contributors":[{"name":"Nate Nelson, Contributing Writer","link":"/author/nate-nelson","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg","role":""}],"articleName":"Russian FSB Hackers Breach Pakistani APT Storm-0156","mobileHeadline":"Russian FSB Hackers Breach Pakistani APT Storm-0156","articleUrl":"/threat-intelligence/russian-fsb-hackers-breach-pakistan-storm-0156","linkAttrs":{},"listPageUrl":"","date":"Dec 4, 2024","webinarStartTime":"","articleSummary":"Parasitic advanced persistent threat (APT) Secret Blizzard accessed another APT's infrastructure, and stole the same kinds of info it targets in South Asian government and military victims.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Threat Intelligence","categoryUrl":"/threat-intelligence","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf018e64048346377/674f1e6b33b8f81de8b8aa90/iTT_accelerating-growth_2000_cropped.png","alt":"Words \"accelerating growth\" appear in white text on blue background of wave-like designs, accompanied by the Informa TechTarget logo and company name."},"contributors":[{"name":"Kelly Jackson Higgins, Editor-in-Chief, Dark Reading","link":"/author/kelly-jackson-higgins","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9c6bc824e889565c/64f151b922fa7521c6d8d020/KJH.PNG","role":""}],"articleName":"Note From the Editor-in-Chief","mobileHeadline":"Note From the Editor-in-Chief","articleUrl":"/cybersecurity-operations/note-from-editor-in-chief","linkAttrs":{},"listPageUrl":"","date":"Dec 3, 2024","webinarStartTime":"","articleSummary":"A change in ownership and what it means for our readers.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt50fc56d7793043ee/674edcb7ffe3c26cf1e5859a/spider_Photo_Spirit_shutterstock.png","alt":"Gold and black spider sitting on a web"},"contributors":[{"name":"Elizabeth Montalbano, Contributing Writer","link":"/author/elizabeth-montalbano","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg","role":""}],"articleName":"Venom Spider Spins Web of New Malware for MaaS Platform","mobileHeadline":"Venom Spider Spins Web of Malware for MaaS Platform","articleUrl":"/cyberattacks-data-breaches/venom-spider-malware-maas-platform","linkAttrs":{},"listPageUrl":"","date":"Dec 3, 2024","webinarStartTime":"","articleSummary":"A novel backdoor malware and a loader that customizes payload names for each victim have been added to the threat group's cybercriminal tool set.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltddc9deadc402008d/66a942c728f25e14063d1142/Ransomware(1800)_Olekcii_Mach_Alamy.jpg","alt":"Padlock on a keyboard, with the word \"Ransomware\" on a large red key"},"contributors":[{"name":"Claudio Gallo","link":"/author/claudio-gallo","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt8422a82193ba68b7/674e13fbab84626cb4c5e82e/Outlook-iwwatou3.jpg","role":"Lead Security Engineer, C4HCO"}],"articleName":"Ransomware's Grip on Healthcare","mobileHeadline":"Ransomware's Grip on Healthcare","articleUrl":"/cyberattacks-data-breaches/ransomware-grip-healthcare","linkAttrs":{},"listPageUrl":"","date":"Dec 3, 2024","webinarStartTime":"","articleSummary":"Until C-level executives fully understand potential threats and implement effective mitigation strategies, healthcare organizations will remain vulnerable and at risk of disruption.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt67fdf013f7c9ef96/674e26a1a2308aa0156c5b50/incidentresponse-leowolfert-AdobeStock.jpg","alt":"a person in a suit looking at a screen of indicators and icons showing threats and networks"},"contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","role":"Dark Reading"}],"articleName":"AWS Launches New Incident Response Service","mobileHeadline":"AWS Launches New Incident Response Service","articleUrl":"/threat-intelligence/aws-launches-new-incident-response-service","linkAttrs":{},"listPageUrl":"","date":"Dec 2, 2024","webinarStartTime":"","articleSummary":"AWS Security Incident Response will help security teams defend their organizations from account takeovers, breaches, ransomware attacks, and other types of security threats. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Threat Intelligence","categoryUrl":"/threat-intelligence","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt663e948581bcd84b/671aae0f17514d4087bdc56d/healthcare_1800_Dennis_Gross_alamy.jpg","alt":"A stethoscope on a computer keyboard"},"contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","role":"Dark Reading"}],"articleName":"2 UK Hospitals Targeted in Separate Cyberattacks","mobileHeadline":"2 UK Hospitals Targeted in Separate Cyberattacks","articleUrl":"/cyberattacks-data-breaches/two-nhs-hospitals-targeted-in-separate-cyberattacks","linkAttrs":{},"listPageUrl":"","date":"Dec 2, 2024","webinarStartTime":"","articleSummary":"Alder Hey Children's Hospital got hit with a ransomware attack, while the nature of an incident at Wirral University Teaching Hospital remains undisclosed.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltbfdac51603fbabca/674dc75d355926790d387180/Incident_response_(1800)_Yee_Xin_Tan_Alamy.jpg","alt":"Form reading \"Do you have a cyber incident response plan?\" with \"yes\" box checked"},"contributors":[{"name":"James Bruhl","link":"/author/james-bruhl","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt221ec76a11b4e0ef/67462cc4872d1effdd1b7417/James_Bruhl_2024_(1).jpg","role":"Director of Cyber Threat Intelligence, DefenseStorm"}],"articleName":"Incident Response Playbooks: Are You Prepared?","mobileHeadline":"Incident Response Playbooks: Are You Prepared? ","articleUrl":"/cyberattacks-data-breaches/incident-response-playbooks-prepared","linkAttrs":{},"listPageUrl":"","date":"Dec 2, 2024","webinarStartTime":"","articleSummary":"The playbooks that accompany your incident response plan provide efficiency and consistency in responses, help reduce downtime and dwell time, and can be a cost-saving and reputational-saving measure for your organization. ","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3317719ff4b0bbee/6747152ee2b6b17ae587bdee/cardskimming_Kim_Kuperkova_shutterstock.jpg","alt":"A blue credit card on a fish hook being dangled above a computer keyboard"},"contributors":[{"name":"Elizabeth Montalbano, Contributing Writer","link":"/author/elizabeth-montalbano","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg","role":""}],"articleName":"Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday","mobileHeadline":"Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday","articleUrl":"/application-security/sneaky-skimmer-malware-magento-sites-black-friday","linkAttrs":{},"listPageUrl":"","date":"Nov 27, 2024","webinarStartTime":"","articleSummary":"A stealthy JavaScript injection attack steals data from the checkout page of sites, either by creating a fake credit card form or extracting data directly from payment fields.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Application Security","categoryUrl":"/application-security","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd9544fe544dde688/674635c9fde1977e265db529/matrix_Kundra_shutterstock.jpg","alt":"Vector green digital code rain in a Matrix inspired futuristic style"},"contributors":[{"name":"Jai Vijayan, Contributing Writer","link":"/author/jai-vijayan","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg","role":""}],"articleName":"Russian Script Kiddie Assembles Massive DDoS Botnet","mobileHeadline":"Russian Script Kiddie Assembles Massive DDoS Botnet","articleUrl":"/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet","linkAttrs":{},"listPageUrl":"","date":"Nov 27, 2024","webinarStartTime":"","articleSummary":"Over the past year, \"Matrix\" has used publicly available malware tools and exploit scripts to target weakly secured IoT devices — and enterprise servers.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3dd452fdf8cf8240/6746324022170842162612ed/When_Harry_Met_Sally-Collection_Christophel-Alamy.jpg","alt":"A still from the famous orgasm scene in \"When Harry Met Sally\""},"contributors":[{"name":"Nate Nelson, Contributing Writer","link":"/author/nate-nelson","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg","role":""}],"articleName":"'RomCom' APT Mounts Zero-Day, Zero-Click Browser Escapes in Firefox, Tor","mobileHeadline":"'RomCom' APT Mounts Zero-Day, Zero-Click Browser Escapes","articleUrl":"/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor","linkAttrs":{},"listPageUrl":"","date":"Nov 26, 2024","webinarStartTime":"","articleSummary":"The innocuously named Russian-sponsored cyber threat actor has combined critical and serious vulnerabilities in Windows and Firefox products in a zero-click code execution exploit.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Application Security","categoryUrl":"/application-security","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt30cb421135bfdcb4/6745a86f46d743f59c9c15b4/NFT-mundissima-Alamy.jpg","alt":"Images of nonfungible tokens clustered together on a screen with an index finger hovering above as if to press on one"},"contributors":[{"name":"Elizabeth Montalbano, Contributing Writer","link":"/author/elizabeth-montalbano","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg","role":""}],"articleName":"OpenSea Phishers Aim to Drain Crypto Wallets of NFT Enthusiasts","mobileHeadline":"OpenSea NFT Phishers Aim to Drain Crypto Wallets","articleUrl":"/application-security/opensea-phishers-aim-drain-crypto-wallets-nft-enthusiasts","linkAttrs":{},"listPageUrl":"","date":"Nov 26, 2024","webinarStartTime":"","articleSummary":"Cyberattackers have been targeting the online NFT marketplace with emails claiming to make an offer to a targeted user; in reality, clicking on a malicious link takes victims to a crypto-draining site.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Application Security","categoryUrl":"/application-security","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"},{"contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt76867869c89a9332/6744ed21e7497068a64a1637/starbucks_Ned_Snowman_shutterstock.jpg","alt":"Starbucks logo on a storefront"},"contributors":[{"name":"Jai Vijayan, Contributing Writer","link":"/author/jai-vijayan","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg","role":""}],"articleName":"Ransomware Attack on Blue Yonder Hits Starbucks, Supermarkets","mobileHeadline":"Ransomware Attack on Blue Yonder Hits Starbucks, Supermarkets","articleUrl":"/cyberattacks-data-breaches/ransomware-attack-blue-yonder-starbucks-supermarkets","linkAttrs":{},"listPageUrl":"","date":"Nov 25, 2024","webinarStartTime":"","articleSummary":"The incident is typical of the heightened threats organizations face during the holidays, when most companies reduce their security operations staff by around 50%.","articleBodyJsonSummary":"","variant":"normal","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]},"articleSize":"big"}],"sidebarModules":[{"type":"module_content_cards","data":{"title":"Editor's Choice","moduleLabel":"","variant":"column","contents":[{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9bf7e6a9826c0aea/6750c624093fa132fa7059fc/chinacyber_Weitwinkel_shutterstock.jpg","alt":"American and Chinese flags on computer keyboard keys"},"articleName":"CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat","mobileHeadline":"CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat","articleUrl":"/cyberattacks-data-breaches/cisa-issue-guidance-telecoms-salt-typhoon-threat","listPageUrl":"/cyberattacks-data-breaches/cisa-issue-guidance-telecoms-salt-typhoon-threat","linkAttrs":{},"date":"Dec 4, 2024","webinarStartTime":"","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","contributors":[{"name":"Jai Vijayan, Contributing Writer","link":"/author/jai-vijayan","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg"}],"timeRead":4,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"ad","data":{"pos":"native_vertical_1v"}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4a5bfeaa660cbace/675221269156dc2f14d3ffda/tunnels-Classic_Image-Alamy.jpg","alt":"Great Siege Tunnels, Gibraltar, featuring a tableau of seven cannons overlooking Spanish positions "},"articleName":"Russia's 'BlueAlpha' APT Hides in Cloudflare Tunnels","mobileHeadline":"Russia's 'BlueAlpha' APT Hides in Cloudflare Tunnels","articleUrl":"/cloud-security/russias-bluealpha-apt-cloudflare-tunnels","listPageUrl":"/cloud-security/russias-bluealpha-apt-cloudflare-tunnels","linkAttrs":{},"date":"Dec 5, 2024","webinarStartTime":"","categoryName":"Сloud Security","categoryUrl":"/cloud-security","contributors":[{"name":"Tara Seals, Managing Editor, News, Dark Reading","link":"/author/tara-seals","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt74c35947c6a4996b/64f1714aa5678002330c4412/Tara-Seals-Headshot2.jpg"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltdf491a27738b56da/67520b03e914956c1715c180/Mitel-Kristoffer_Tripplaar-Alamy.jpg","alt":"Mitel's corporate logo on an office building"},"articleName":"Bypass Bug Revives Critical N-Day in Mitel MiCollab","mobileHeadline":"Bypass Bug Revives Critical N-Day in Mitel MiCollab","articleUrl":"/vulnerabilities-threats/bypass-bug-critical-n-day-mitel-micollab","listPageUrl":"/vulnerabilities-threats/bypass-bug-critical-n-day-mitel-micollab","linkAttrs":{},"date":"Dec 5, 2024","webinarStartTime":"","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","contributors":[{"name":"Nate Nelson, Contributing Writer","link":"/author/nate-nelson","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg"}],"timeRead":4,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"ad","data":{"pos":"native_vertical_2v"}}],"dateDisplay":"show","contributorDisplay":"show"},"adConfig":{"nativeAdOption":true}},{"type":"module_link_list","data":{"listOption":"External Feed","listTitle":"Reports","icon":"Document","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=analytics","ctaButton":{"ctaButtonLink":"/resources?types=Report","ctaButtonText":"More Reports"},"openInNewTab":true,"articles":[{"title":"IDC Analyst Brief: Enhancing Incident Response with Automated Investigation Workflows","publishedDate":"Dec 06, 2024","url":"https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa7503\u0026ch=SBX\u0026cid=_analytics_7.300006021\u0026_mc=_analytics_7.300006021","eventDate":""},{"title":"Managing Third-Party Risk Through Situational Awareness","publishedDate":"Jul 31, 2024","url":"https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_cybo171\u0026ch=\u0026cid=_analytics_7.300006016\u0026_mc=_analytics_7.300006016","eventDate":""},{"title":"2024 InformationWeek US IT Salary Report","publishedDate":"May 29, 2024","url":"https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_ingg253\u0026ch=sbx\u0026cid=_analytics_7.300006014\u0026_mc=_analytics_7.300006014","eventDate":""}]}},{"type":"module_link_list","data":{"listOption":"External Feed","listTitle":"Webinars","icon":"ChalkBoard","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=upcoming_webinars","ctaButton":{"ctaButtonLink":"/resources?types=Webinar","ctaButtonText":"More Webinars"},"openInNewTab":true,"articles":[{"title":"The Current State of AI Adoption in Cybersecurity, Including its Opportunities","publishedDate":"Dec 06, 2024","url":"https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_tren85\u0026ch=SBX\u0026cid=_upcoming_webinars_8.500001507\u0026_mc=_upcoming_webinars_8.500001507","eventDate":"Dec 12, 2024"},{"title":"Cybersecurity Day: How to Automate Security Analytics with AI and ML","publishedDate":"Dec 06, 2024","url":"https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_snoa33\u0026ch=SBX\u0026cid=_upcoming_webinars_8.500001504\u0026_mc=_upcoming_webinars_8.500001504","eventDate":"Dec 17, 2024"},{"title":"The Dirt on ROT Data","publishedDate":"Dec 06, 2024","url":"https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_rubr127\u0026ch=SBX\u0026cid=_upcoming_webinars_8.500001508\u0026_mc=_upcoming_webinars_8.500001508","eventDate":"Dec 18, 2024"}]}},{"type":"module_link_list","data":{"listOption":"External Feed","listTitle":"White Papers","icon":"Document","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper","ctaButton":{"ctaButtonLink":"/resources?types=Whitepaper","ctaButtonText":"More Whitepapers"},"openInNewTab":true,"articles":[{"title":"From security alert to action: Accelerating incident response with automated investigations","publishedDate":"","url":"https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa7505\u0026ch=SBX\u0026cid=_whitepaper_14.500005852\u0026_mc=_whitepaper_14.500005852","eventDate":""},{"title":"Enhancing Cybersecurity: The Critical Role Of Software Security Training","publishedDate":"","url":"https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa7530\u0026ch=SBX\u0026cid=_whitepaper_14.500005851\u0026_mc=_whitepaper_14.500005851","eventDate":""},{"title":"Top 10 CI/CD Security Risks: The Technical Guide","publishedDate":"","url":"https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_palo248\u0026ch=SBX\u0026cid=_whitepaper_14.500005835\u0026_mc=_whitepaper_14.500005835","eventDate":""},{"title":"The State of Vulnerability Management in the Enterprise","publishedDate":"","url":"https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_adaa07\u0026ch=SBX\u0026cid=_whitepaper_14.500005831\u0026_mc=_whitepaper_14.500005831","eventDate":""},{"title":"How to Use Threat Intelligence to Mitigate Third-Party Risk","publishedDate":"","url":"https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_cybo172\u0026ch=\u0026cid=_whitepaper_14.500005744\u0026_mc=_whitepaper_14.500005744","eventDate":""}]}},{"type":"module_link_list","data":{"listOption":"External Feed","listTitle":"Events","icon":"Date","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=4\u0026article_type=session","ctaButton":{"ctaButtonLink":"/events","ctaButtonText":"More Events"},"openInNewTab":true,"articles":[]}}]},"metadata":{"uid":"blt9fc8c111da7ecd02","aid":"201317"},"schema":[{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.darkreading.com"},{"@type":"ListItem","position":2,"name":"Cyberattacks \u0026 Data Breaches","item":"https://www.darkreading.com/cyberattacks-data-breaches"}]}],"seo":{"canonicalUrl":"https://www.darkreading.com/cyberattacks-data-breaches","metaDescription":"Explore the latest news and expert commentary on Cyberattacks \u0026 Data Breaches, brought to you by the editors of Dark Reading","metaTitle":"Cyberattacks \u0026 Data Breaches recent news | Dark Reading","noIndex":false,"imageUrl":"https://www.darkreading.com/build/_assets/darkreading-DSJITCUD.ico","siteName":"Dark Reading"},"type":"topic","pageName":"topic"}},"actionData":null,"errors":null}};</script><script type="module" async="">import "/build/manifest-56B63EEE.js"; import * as route0 from "/build/root-PUQZGJFA.js"; import * as route1 from "/build/routes/$topic._index-6ZBF6GMY.js"; window.__remixRouteModules = {"root":route0,"routes/$topic._index":route1}; import("/build/entry.client-SFHSSSEN.js");</script><script async="" defer="" src="https://connect.facebook.net/en_US/sdk.js#xfbml=1&amp;version=v3.2"></script><script async="" defer="" src="https://www.instagram.com/embed.js"></script><script>(function(){function c(){var b=a.contentDocument||a.contentWindow.document;if(b){var d=b.createElement('script');d.innerHTML="window.__CF$cv$params={r:'8f0a3b25dc62fe8f',t:'MTczMzk2OTk4Mi4wMDAwMDA='};var a=document.createElement('script');a.nonce='';a.src='/cdn-cgi/challenge-platform/scripts/jsd/main.js';document.getElementsByTagName('head')[0].appendChild(a);";b.getElementsByTagName('head')[0].appendChild(d)}}if(document.body){var a=document.createElement('iframe');a.height=1;a.width=1;a.style.position='absolute';a.style.top=0;a.style.left=0;a.style.border='none';a.style.visibility='hidden';document.body.appendChild(a);if('loading'!==document.readyState)c();else if(window.addEventListener)document.addEventListener('DOMContentLoaded',c);else{var e=document.onreadystatechange||function(){};document.onreadystatechange=function(b){e(b);'loading'!==document.readyState&&(document.onreadystatechange=e,c())}}}})();</script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10