Dark Reading

Jamf Buys Identity Automation, Expands IAM Capabilities

The $215 million acquisition will allow Jamf offer dynamic identity capabilities...

3 VMware Zero-Day Bugs Allow Sandbox Escape

The now-patched bugs are under active exploit and enable attackers to carry out ...

Threat Actor 'JavaGhost' Targets AWS Environments in Ph...

Palo Alto Networks' Unit 42 details how a threat actor is dodging detection with...

Serbian Police Hack Protester's Phone With Cellebrite E...

Amnesty International said Serbian police used an exploit chain in tandem with l...

North Korea's Latest 'IT Worker' Scheme Seeks Nuclear F...

Fraudulent IT workers are looking for engineering and developer positions in the...

Pentagon, CISA Deny Change in US Cyber Policy on Russia

Media reports over the weekend suggested the Trump Administration ordered US Cyb...

Why Cybersecurity Jobs Are Hard to Find Amid a Worker S...

The cybersecurity job market nowadays is facing an unusual paradox: Many roles s...

Name That Edge Toon: On the Precipice

Feeling creative? Submit your caption and our panel of experts will reward the w...

TikTok's Teen Data Use Probed by UK Regulators

Investigators at the ICO are looking into how (or if) TikTok, as well as Reddit ...

Qilin Cybercrime Ring Claims Credit for Lee Newspaper B...

The ransomware-as-a-service (RaaS) cybercrime group intends to leak the stolen i...

Phishers Wreak 'Havoc,' Disguising Attack Inside ShareP...

A complex campaign allows cyberattackers to take over Windows systems by a combi...

EU's New Product Liability Directive & Its Cybersec...

By proactively addressing liabilities tied to software updates, data loss, and A...

Latin American Orgs Face 40% More Attacks Than Global A...

Technological adoption, demographics, politics, and uniquely Latin American law ...

Cisco's SnapAttack Deal Expands Splunk's Capabilities

The addition of SnapAttack, a startup incubated by Booz Allen Hamilton’s Darklab...

Third-Party Risk Top Cybersecurity Claims

Data collected by cyber-insurers show that ransomware accounts for the majority ...

Microsoft Busts Hackers Selling Illegal Azure AI Access

LLMjacking operation leveraged illicit access GenAI services to produce explicit...

US Soldier Intends to Admit Hacking 15 Telecom Carriers

The federal government views the defendant as a flight risk and danger to the co...

Top 10 Most Probable Ways a Company Can Be Hacked

How to win the battle with root cause analysis and a data-driven approach.

Targeted by Ransomware, Middle East Banks Shore Up Secu...

As the UAE financial sector finished up its annual cyberattack exercise, its wor...

Cleveland Municipal Court Remains Closed After Cyber In...

No details yet on what forced the court to shut down affected systems and halt o...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.