Dark Reading

Hundreds of Web Apps Have Full Access to Microsoft OneD...

Researchers at Oasis Security say the problem has to do with OneDrive File Picke...

Implementing Secure by Design Principles for AI

Harnessing AI's full transformative potential safely and securely requires more ...

Cellcom Restores Regional Mobile Services After Cyberat...

Customers in parts of Wisconsin and Michigan could not make calls or send text m...

Why Take9 Won't Improve Cybersecurity

The latest cybersecurity awareness campaign asks users to pause for nine seconds...

Have Your Say: Dark Reading Seeks Your Input

Dark Reading is offering its readers the opportunity to tell us how we're doing ...

Zscaler Announces Deal to Acquire Red Canary

The August acquisition will bring together Red Canary's extensive integration ec...

Indian Police Arrest Cybercrime Gang Copycats of Myanma...

The region offers attractive conditions: a large pool of tech workers, economic ...

Adidas Falls Victim to Third-Party Data Breach

Though Adidas said that no payment or financial information was affected in the ...

CISA Warns of Attacks Targeting Commvault SaaS Environment

A threat actor has gained access to Microsoft 365 environments of a small number...

DragonForce Ransomware Strikes MSP in Supply Chain Attack

DragonForce, a ransomware "cartel" that has gained significant popularity since ...

MathWorks, Creator of MATLAB, Confirms Ransomware Attack

The attack dirsupted MathWorks' systems and online applications, but it remains ...

FBI: Silent Ransom Group Adopts Vishing Campaign Agains...

The non-ransomware extortion group has switched up tactics and victimology in a ...

How the New Hacker Millionaire Class Was Built

Once dismissed as Internet miscreants in hoodies, ethical hackers have hit the b...

Danabot Takedown Deals Blow to Russian Cybercrime

A multiyear investigation by a public-private partnership has resulted in the se...

CVE Uncertainty Underlines Importance of Cyber Resilience

Organizations need to broaden their strategy to manage vulnerabilities more effe...

3 Critical Pillars of Cyber-Resilience

Encryption, collaboration, and AI can help organizations build up essential prot...

How AI Is Transforming SASE, Zero Trust for Modern Ente...

By automating security policies and threat detection while coaching users on dat...

Rethinking Data Privacy in the Age of Generative AI

The key to navigating this new GenAI landscape is a balanced approach — one that...

3 Severe Bugs Patched in Versa's Concerto Orchestrator

Three zero-days could have allowed an attacker to completely compromise the Conc...

Companies Look to AI to Tame the Chaos of Event Securit...

As the summer event season kicks off, venue managers and security firms aim to m...

Following Data Breach, Multiple Stalkerware Apps Go Off...

The same easily exploitable vulnerability was found in three of the apps that le...

Russian Threat Actor TAG-110 Goes Phishing in Tajikistan

While Ukraine remains Russia's major target for cyberattacks, TAG-110 is part of...

3am Ransomware Adopts Email Bombing, Vishing Combo Attack

The emerging threat group is the latest to adopt the combo attack tactic, which ...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.