Dark Reading

Vibe Coding Changed the Development Process

AI tools shook up development. Now, product security must change too.

Tenable to Acquire AI Security Startup Apex

Apex will enhance Tenable's AI Aware tool by mitigating the threats of AI applic...

CISO Stature Rises, but Security Budgets Remain Tight

The rate of compensation gains has slowed from the COVID years, and budgets rema...

ConnectWise Breached, ScreenConnect Customers Targeted

The software company, which specializes in remote IT management, said a "sophist...

From Code Red to Rust: Microsoft's Security Journey

At this year's Build developer conference, Microsoft reflected on what the compa...

NSA, CISA Urge Organizations to Secure Data Used in AI ...

New guidance includes a list of 10 best practices to protect sensitive data thro...

'Everest Group' Extorts Global Orgs via SAP's HR Tool

In addition to Coca-Cola, entities in Abu Dhabi, Jordan, Namibia, South Africa, ...

Victoria's Secret Goes Offline After 'Incident' Claims

The lingerie retailer isn't revealing much about the security incident it's deal...

New Botnet Plants Persistent Backdoors in ASUS Routers

Thousands of ASUS routers have been infected and are believed to be part of a wi...

SentinelOne Reports Services Are Back Online After Glob...

The outage reportedly hit 10 commercial customer consoles for SentinelOne's Sing...

Zscaler's Buyout of Red Canary Shows Telemetry's Value

Red Canary's MDR portfolio complements Zscaler's purchase last year of Israeli s...

APT41 Uses Google Calendar Events for C2

APT41, a Chinese state-sponsored threat actor also known as "Double Dragon," use...

LexisNexis Informs 360K+ Customers of Third-Party Data ...

While the leak affected customer data, LexisNexis said in a notification letter ...

PumaBot Targets Linux Devices in Latest Botnet Campaign

While the botnet may not be completely automated, it uses certain tactics when t...

A Defense-in-Depth Approach for the Modern Era

By integrating intelligent network policies, zero-trust principles, and AI-drive...

'Haozi' Gang Sells Turnkey Phishing Tools to Amateurs

The phishing operation is using Telegram groups to sell a phishing-as-a-service ...

Certified Randomness Uses Quantum Cryptography to Make ...

Researchers are using quantum computers to generate keys that are truly random t...

CISA Issues SOAR, SIEM Implementation Guidance

Among the recommendations, organizations should conduct thorough testing and man...

Hundreds of Web Apps Have Full Access to Microsoft OneD...

Researchers at Oasis Security say the problem has to do with OneDrive File Picke...

Implementing Secure by Design Principles for AI

Harnessing AI's full transformative potential safely and securely requires more ...

Cellcom Restores Regional Mobile Services After Cyberat...

Customers in parts of Wisconsin and Michigan could not make calls or send text m...

Why Take9 Won't Improve Cybersecurity

The latest cybersecurity awareness campaign asks users to pause for nine seconds...

Have Your Say: Dark Reading Seeks Your Input

Dark Reading is offering its readers the opportunity to tell us how we're doing ...

Zscaler Announces Deal to Acquire Red Canary

The August acquisition will bring together Red Canary's extensive integration ec...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.