Dark Reading

DPRK 'IT Workers' Pivot to Europe for Employment Scams

By using fake references and building connections with recruiters, some North Ko...

In Salt Typhoon's Wake, Congress Mulls Potential Options

While the House Committee on Government Reform was looking for retaliatory optio...

How an Interdiction Mindset Can Help Win War on Cyberat...

The US military and law enforcement learned to outthink insurgents. It's time fo...

Gootloader Malware Resurfaces in Google Ads for Legal Docs

Attackers target a familiar industry, law professionals, by hiding the infosteal...

Visibility, Monitoring Key to Enterprise Endpoint Strategy

A successful enterprise security defense requires a successful endpoint security...

Malaysian Airport's Cyber Disruption a Warning for Asia

Transportation facilities and networks slowly adapt to changes and threats, leav...

Google Brings End-to-End Encryption to Gmail

The new Google Workspace features will make it easier for enterprise customers t...

Surge in Scans on PAN GlobalProtect VPNs Hints at Attacks

Over the past few weeks, bad actors from different regions have been scanning de...

As CISA Downsizes, Where Can Enterprises Get Support?

In this roundtable, cybersecurity experts — including two former CISA executives...

Check Point Disputes Hacker's Breach Claims

The security vendor counters that none of the information came directly from its...

Japan Bolsters Cybersecurity Safeguards With Cyber Defe...

The bill will allow Japan to implement safeguards and strategies that have been ...

Google 'ImageRunner' Bug Enabled Privilege Escalation

Tenable released details of a Google Cloud Run flaw that prior to remediation al...

FDA's Critical Role in Keeping Medical Devices Secure

The FDA's regulations and guidance aim to strike a balance between ensuring rigo...

Top 10 Most-Used RDP Passwords Are Not Complex Enough

New research from Specops Software shows attackers successfully attack and gain ...

Lazarus APT Jumps on ClickFix Bandwagon in Recent Attacks

A continuation of the North Korean nation-state threat's campaign against employ...

Top 10 Most Used RDP Passwords Are Not Complex Enough

New research from Specops Software shows attackers successfully attack and gain ...

Trend Micro Open Sources AI Tool Cybertron

The cybersecurity artificial intelligence (AI) model and agent will help organiz...

CoffeeLoader Malware Is Stacked With Vicious Evasion Tr...

Next-level malware represents a new era of malicious code developed specifically...

Oracle Cloud Users Urged to Take Action

Although Oracle has denied its cloud infrastructure services were breached, secu...

DoJ Seizes Over $8M From Sprawling Pig Butchering Scheme

The department was able to trace the stolen funds to three main cryptocurrency a...

CoffeeLoader Malware Is Stacked With Viscous Evasion Tr...

Next-level malware represents a new era of malicious code developed specifically...

DoJ Seizes Over $8M from Sprawling Pig Butchering Scheme

The department was able to trace the stolen funds to three main cryptocurrency a...

CISA Warns of Resurge Malware Connected to Ivanti Vuln

Threat actors are exploiting a vulnerability in Ivanti Connect Secure first disc...

Bridging the Gap Between the CISO & the Board of Di...

Positioning security leaders as more than risk managers turns them into business...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.