Dark Reading

Salt Typhoon Exploits Cisco Devices in Telco Infrastruc...

The China-sponsored state espionage group has exploited known, older bugs in Cis...

Warning: Tunnel of Love Leads to Scams

Romance-baiting losses were up 40% last year, as more and more pig-butchering ef...

CyberArk Makes Identity Security Play With Zilla Acquis...

CyberArk announced the Zilla deal on the same day leading identity and access go...

Roundtable: Is DOGE Flouting Cybersecurity for US Data?

Cybersecurity experts weigh in on the red flags flying around the new Department...

Chinese APT 'Emperor Dragonfly' Moonlights With Ransomware

Pivoting from prior cyber espionage, the threat group deployed its backdoor tool...

How Public & Private Sectors Can Better Align Cyber...

With investment in cybersecurity capabilities and proactive measures to address ...

Content Credentials Technology Verifies Image, Video Au...

The open technology tackles disinformation by verifying whether the image is rea...

Japan Goes on Offense With New 'Active Cyber Defense' Bill

Japan is on a mission to catch up to the US standard of national cyber preparedn...

President Trump to Nominate Former RNC Official as Nati...

Sean Cairncross will be one of the primary advisers to the administration on nat...

Feds Sanction Russian Hosting Provider for Supporting L...

US, UK, and Australian law enforcement have targeted a company called Zservers (...

Microsoft: Russia's Sandworm APT Exploits Edge Bugs Glo...

Sandworm (aka Seashell Blizzard) has an initial access wing called "BadPilot" th...

Is AI a Friend or Foe of Healthcare Security?

When it comes to keeping patient information safe, people empowerment is just as...

Gartner: Most Security Leaders Cannot Balance Data Secu...

The analyst firm recommends defining security and governance processes while red...

Drata Acquires SafeBase to Strengthen GRC Portfolio

The combined companies will create a seamless ecosystem of trust, governance, ri...

India's Cybercrime Problems Grow as Nation Digitizes

More than half of attacks on Indian businesses come from outside the country, wh...

Microsoft's February Patch a Lighter Lift Than January's

But there's plenty in it — including two zero-days — that need immediate attention.

Apple Releases Urgent Patch for USB Vulnerability

The vulnerability could allow a threat actor to disable the security feature on ...

CISA Places Election Security Staffers on Leave

The staffers were tasked with building relationships on the ground across the co...

Salt Typhoon's Impact on the US & Beyond

Salt Typhoon underscores the urgent need for organizations to rapidly adopt mode...

Data Leaks Happen Most Often in These States — Here's Why

State-led data privacy laws and commitment to enforcement play a major factor in...

DeepSeek AI Fails Multiple Security Tests, Raising Red ...

The popular generative AI (GenAI) model allows hallucinations, easily avoidable ...

Ransomware Groups Made Less Money in 2024

Improvements in cyber hygiene and resiliency made it possible for victim organiz...

Proactive Vulnerability Management for Engineering Success

By integrating security into CI/CD, applying automated policies, and supporting ...

DeepSeek Jailbreak Reveals Its Entire System Prompt

Now we know exactly how DeepSeek was designed to work, and we may even have a cl...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.