Dark Reading

Name That Toon: Ka-Ching!

Feeling creative? Have something to say about cybersecurity? Submit your caption...

Machine Unlearning: The Lobotomization of LLMs

In the end, the question isn't whether large language models will ever forget — ...

Fortanix Tackles Quantum Computing Threats With New Alg...

Fortanix is implementing post-quantum cryptographic algorithms in its security s...

How to Rein in Identity Session Security Risk With CAEP

Addressing the complexities of session management in multi-IDP environments, CAE...

AI Tricksters Spin Up Fake DeepSeek Sites to Steal Crypto

The fake websites trick users into downloading and running malware that searches...

Max Severity RCE Vuln in All Versions of MITRE Caldera

In the wrong hands, the popular red-teaming tool can be made to access networks,...

Microsoft 365 Accounts Get Sprayed by Mega-Botnet

The threat actors are exploiting non-interactive sign-ins, an authentication fea...

North Korea's Lazarus Pulls Off Biggest Crypto Heist in...

Cyberattackers believed to be affiliated with the state-sponsored threat group p...

Unmanaged Devices: The Overlooked Threat CISOs Must Con...

No matter the strategy, companies must approach securing unmanaged devices with ...

Betting (and Losing) the Farm on Traditional Cybersecurity

Standard SecOps training is no longer enough to tackle modern cybersecurity chal...

25 Years On, Active Directory Is Still a Prime Attack T...

Evolving threats and hybrid identity challenges keep Microsoft's Active Director...

Industrial System Cyberattacks Surge as OT Stays Vulner...

Nearly a third of organizations have an operational system connected to the Inte...

Zero-Day Bug Pops Up in Parallels Desktop for Mac

A patch bypass for a bug in the popular desktop emulator enables root-level priv...

Australia Latest Domino to Fall in Gov't Kaspersky Bans

This move comes less than a year after the United States banned Kaspersky produc...

DeepSeek's ByteDance Data-Sharing Raises Fresh Security...

Confirmation by South Korea's data protection agency that the AI chatbot sent da...

Could the Plot of Netflix's 'Zero Day' Occur IRL?

A new streaming series about a catastrophic, nationwide cyberattack against US c...

How APT Naming Conventions Make Us Less Safe

Only by addressing the inefficiencies of current naming conventions can we creat...

Thailand Targets Cyber Sweatshops to Free 1,000s of Cap...

Thai police said it was expecting to soon welcome 7,000 human trafficking victim...

Black Basta Goes Dark Amid Infighting, Chat Leaks Show

One of 2024's most active ransomware outfits has been asleep through early 2025,...

Cisco Confirms Salt Typhoon Exploitation in Telecom Hits

In addition to using CVE-2018-0171 and other Cisco bugs to break into telecom ne...

Nations Open 'Data Embassies' to Protect Critical Info

Estonia and Monaco back up their citizens' information to a data center in Luxem...

4 Low-Cost Ways to Defend Your Organization Against Dee...

Every organization should be exploring a layered approach in which artificial an...

Data Suggests It's Time to Rethink Cloud Permissions

Excessive privileges and visibility gaps create a breeding ground for cyber thre...

Ghost Ransomware Targets Orgs in 70+ Countries

The China-backed threat group often acts swiftly, going from initial access to c...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.