Dark Reading

Tenable to Acquire Vulcan Cyber to Boost Exposure Manag...

The deal, expected to close this quarter, will give Tenable One Exposure Managem...

XE Group Shifts From Card Skimming to Supply Chain Attacks

The likely Vietnam-based threat actor has been using two zero-days in VeraCore's...

120K Victims Compromised in Memorial Hospital Ransomwar...

After claiming responsibility for the ransomware attack in 2024, the "Embargo" r...

Newspaper Giant Lee Enterprises Reels From Cyberattack

The newspaper company expects the investigation to take some time, but said in a...

Magecart Attackers Abuse Google Ad Tool to Steal Data

Attackers are smuggling payment card-skimming malicious code into checkout pages...

Analyst Burnout Is an Advanced Persistent Threat

For too long, we've treated our analysts as mere cogs in a machine, expecting th...

LLM Hijackers Quickly Incorporate DeepSeek API Keys

The secret use of other people's generative AI platforms, wherein hijackers gain...

SolarWinds to Go Private for $4.4B

Five years after a Russian APT infiltrated a software update to gain access to t...

Microsoft: Thousands of Public ASP.NET Keys Allow Web S...

Developers are pulling in publicly available ASP.NET keys into their environment...

Google's DMARC Push Pays Off, but Email Security Challe...

A year after Google and Yahoo started requiring DMARC, the adoption rate of the ...

Behavioral Analytics in Cybersecurity: Who Benefits Most?

As the cost of data breaches continues to climb, the role of user and entity beh...

Cybercrime Forces Local Law Enforcement to Shift Focus

Local law enforcements need to steer away from "place-based policing" when inves...

7AI Streamlines Security Operations With Autonomous AI ...

Cybereason co-founders launch their second act with a security startup focused o...

Researcher Outsmarts, Jailbreaks OpenAI's New o3-mini

OpenAI's latest tech can reason better than its previous models could, but not w...

US Cybersecurity Efforts for Spacecraft Are Up in the Air

While President Trump supported federal space efforts during his first administr...

DeepSeek Phishing Sites Pursue User Data, Crypto Wallets

Riding the wave of notoriety from the Chinese company's R1 AT chatbot, attackers...

Agencies Sound Alarm on Patient Monitors With Hardcoded...

CISA and the FDA are warning that Contec CMS8000 and Epsimed MN-120 patient moni...

The Cyber Savanna: A Rigged Race You Can't Win, but Mus...

When it comes to protecting your company from cyberattacks, you don't have to be...

Basket of Bank Trojans Defraud Citizens of East India

Cheap banking scams are often easier to pull off in a country with older devices...

Why Cybersecurity Needs Probability — Not Predictions

While probabilities may be based on subjective information, when used in an obje...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.