Dark Reading

Runtime Ventures Launches New Fund for Seed, Pre-Seed S...

Co-founders Michael Sutton and David Endler raised $32 million to invest in earl...

Emerging Risks Require IT/OT Collaboration to Secure Ph...

With an increase in cyber-physical attacks that can cause significant disruption...

Social Engineering Just Got Smarter

Polices that forbid employees from divulging company details are worthless if th...

Google Quick Share Bug Bypasses Allow Zero-Click File T...

Google addresses patch bypasses for CVE-2024-38272 and CVE-2024-38271, part of t...

SolarWinds Adds Incident Management Tool From Squadcast

The IT service management and observability tools company acquired Squadcast las...

New PCI DSS Rules Say Merchants on Hook for Compliance,...

Merchants and retailers will now face penalties for not being compliant with PCI...

Israel Enters 'Stage 3' of Cyber Wars With Iran Proxies

While Israel and Iranian proxies fight it out IRL, their conflict in cyberspace ...

DPRK 'IT Workers' Pivot to Europe for Employment Scams

By using fake references and building connections with recruiters, some North Ko...

In Salt Typhoon's Wake, Congress Mulls Potential Options

While the House Committee on Government Reform was looking for retaliatory optio...

How an Interdiction Mindset Can Help Win War on Cyberat...

The US military and law enforcement learned to outthink insurgents. It's time fo...

Gootloader Malware Resurfaces in Google Ads for Legal Docs

Attackers target a familiar industry, law professionals, by hiding the infosteal...

Visibility, Monitoring Key to Enterprise Endpoint Strategy

A successful enterprise security defense requires a successful endpoint security...

Malaysian Airport's Cyber Disruption a Warning for Asia

Transportation facilities and networks slowly adapt to changes and threats, leav...

Google Brings End-to-End Encryption to Gmail

The new Google Workspace features will make it easier for enterprise customers t...

Surge in Scans on PAN GlobalProtect VPNs Hints at Attacks

Over the past few weeks, bad actors from different regions have been scanning de...

As CISA Downsizes, Where Can Enterprises Get Support?

In this roundtable, cybersecurity experts — including two former CISA executives...

Check Point Disputes Hacker's Breach Claims

The security vendor counters that none of the information came directly from its...

Japan Bolsters Cybersecurity Safeguards With Cyber Defe...

The bill will allow Japan to implement safeguards and strategies that have been ...

Google 'ImageRunner' Bug Enabled Privilege Escalation

Tenable released details of a Google Cloud Run flaw that prior to remediation al...

FDA's Critical Role in Keeping Medical Devices Secure

The FDA's regulations and guidance aim to strike a balance between ensuring rigo...

Top 10 Most-Used RDP Passwords Are Not Complex Enough

New research from Specops Software shows attackers successfully attack and gain ...

Lazarus APT Jumps on ClickFix Bandwagon in Recent Attacks

A continuation of the North Korean nation-state threat's campaign against employ...

Top 10 Most Used RDP Passwords Are Not Complex Enough

New research from Specops Software shows attackers successfully attack and gain ...

Trend Micro Open Sources AI Tool Cybertron

The cybersecurity artificial intelligence (AI) model and agent will help organiz...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.