Dark Reading

How Cyberattacks Affect Your Staff

Businesses have a responsibility to safeguard their workforce, which is best ach...

Intel Maps New vPro Chips to MITRE's ATT&CK Framework

The PC Security Stack Mappings project improves the security posture of corporat...

Armis Acquires OTORIO to Expand OT Exposure Management ...

Armis will integrate OTORIO’s Titan platform with its cloud-based Centrix, bring...

Third-Party Risk Tops Cybersecurity Claims

Data collected by cyber insurers shows that ransomware accounts for the majority...

'EncryptHub' OPSEC Failures Reveal TTPs & Big Plans

Is EncryptHub the most prolific cybercriminal in recent history? Or, as new info...

Under Pressure: US Charges China's APT-for-Hire Hackers

The US Justice Department on Wednesday announced charges against members of the ...

Women Faced the Brunt of Cybersecurity Cutbacks in 2024

Many women are finding that they are unhappy in their cybersecurity roles, large...

Enterprise AI Through a Data Security Lens: Balancing P...

Recently, 57 countries signed an agreement pledging an "open" and "inclusive" ap...

CISA Cuts: A Dangerous Gamble in a Dangerous World

The Cybersecurity and Infrastructure Security Agency's role in risk management n...

Deepfake Videos of YouTube CEO Phish Creators

YouTube creators are being targeted by scammers seeking out their credentials, u...

Cybersecurity's Future Is All About Governance, Not Mor...

As CISOs take a seat at the boardroom table, the focus shifts from stacking secu...

Espionage Actor 'Lotus Blossom' Targets Southeast Asia

The threat actor, of unknown origin, is deploying a proprietary backdoor malware...

Cybersecurity’s Future Is All About Governance, Not Mor...

As CISOs take a seat at the boardroom table, the focus shifts from stacking secu...

Ransomware Attacks Build Against Saudi Construction Firms

Cybercriminals are ramping up their efforts in the Kingdom and targeting more th...

Aryon Security Launches to Tackle Cloud Misconfigurations

The new cloud security startup uses AI to scan cloud applications and systems fo...

Espionage Actor 'Lotus Blossom' Targets South East Asia

The threat actor, of unknown origin, is deploying a proprietary backdoor malware...

China's Silk Typhoon APT Shifts to IT Supply Chain Attacks

The nation-state threat group has been breaching providers of remote management ...

Qualcomm, MediaTek Release Security Fix Bonanza

The chipmakers patched bugs, mostly critical and high severity, that affect ever...

'Crafty Camel' APT Targets Aviation, OT With Polygot Files

The Iran-linked nation-state group made its debut with a stealthy, sophisticated...

Bogus 'BianLian' Gang Sends Snail-Mail Extortion Letters

The letters mimic typical ransom notes and threaten to delete or leak compromise...

Why Security Leaders Are Opting for Consulting Gigs

Many CISOs are weighing the benefits of going virtual as a consultant. Can the p...

'Cocktail of Cyber-Risk' Should Stir Concerns Among CISOs

A global report published by the World Economic Forum points to a new "world ord...

Black Basta Pivots to Cactus Ransomware Group

The future of the formerly fearsome cybercriminal group remains uncertain as key...

Thinking Outside the Box on Cyber-Risk

CISOs should add more to their vision than technology as a global report publish...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.