Dark Reading

Google Adds Quantum-Resistant Digital Signatures to Clo...

The new Cloud Key Management Service is part of Google’s new roadmap for impleme...

When Brand Loyalty Trumps Data Security

Brand loyalty can act as a shield protecting organizations from the immediate im...

Signs Your Organization's Culture Is Hurting Your Cyber...

High turnover, burnout, and blame-heavy environments do more than hurt morale. T...

'Darcula' Phishing Kit Can Now Impersonate Any Brand

With Version 3, would-be phishers can cut and paste a big brand's URL into a tem...

Content Credentials Show Promise, But Ecosystem Still Y...

While AI-generation services and major camera makers are adopting the specificat...

Australian Critical Infrastructure Faces 'Acute' Foreig...

The continent faces "relentless" military espionage, and increased cyber sabotag...

Insight Partners, VC Giant, Falls to Social Engineering

The start-up incubator and PR firm with holdings in more than 70 cybersecurity f...

Russian Groups Target Signal Messenger in Spy Campaign

These sorts of attacks reveal growing adversary interest in secure messaging app...

Deepwatch Acquires Dassana to Boost Cyber-Resilience Wi...

Acquisition strengthens Deepwatch Platform capabilities with actionable insights...

Patch Now: CISA Warns of Palo Alto Flaw Exploited in th...

The authentication bypass vulnerability in the OS for the company's firewall dev...

What Is the Board's Role in Cyber-Risk Management in OT...

By taking several proactive steps, boards can improve their organization's resil...

Deepwatch Acquires Dassana to Boost Cyber Resilience Wi...

Acquisition strengthens Deepwatch Platform capabilities with actionable insights...

North Korea's Kimsuky Taps Trusted Platforms to Attack ...

The campaign heavily uses Dropbox folders and PowerShell scripts to evade detect...

Xerox Printer Vulnerabilities Enable Credential Capture

Attackers are using patched bugs to potentially gain unfettered access to an org...

China-Linked Threat Group Targets Japanese Orgs' Servers

Winnti once used a variety of malware, but is now focused on SQL vulnerabilities...

Microsoft: New Variant of macOS Threat XCSSET Spotted i...

Microsoft is warning the modular and potentially wormable Apple-focused infostea...

This Security Firm's 'Bias' Is Also Its Superpower

Credible Security's founders bring their varied experiences to help growing comp...

How This Security Firm's 'Bias' Is Also Its Superpower

Credible Security's founders bring their varied experiences to help growing comp...

How Banks Can Adapt to the Rising Threat of Financial C...

Banking fraud and financial crimes are growing more sophisticated every day. By ...

Open Source AI Models: Perfect Storm for Malicious Code...

Companies pursing internal AI development using models from Hugging Face and oth...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.