Dark Reading

Malaysian Airport's Cyber Disruption a Warning for Asia

Transportation facilities and networks slowly adapt to changes and threats, leav...

Google Brings End-to-End Encryption to Gmail

The new Google Workspace features will make it easier for enterprise customers t...

Surge in Scans on PAN GlobalProtect VPNs Hints at Attacks

Over the past few weeks, bad actors from different regions have been scanning de...

As CISA Downsizes, Where Can Enterprises Get Support?

In this roundtable, cybersecurity experts — including two former CISA executives...

Check Point Disputes Hacker's Breach Claims

The security vendor counters that none of the information came directly from its...

Japan Bolsters Cybersecurity Safeguards With Cyber Defe...

The bill will allow Japan to implement safeguards and strategies that have been ...

Google 'ImageRunner' Bug Enabled Privilege Escalation

Tenable released details of a Google Cloud Run flaw that prior to remediation al...

FDA's Critical Role in Keeping Medical Devices Secure

The FDA's regulations and guidance aim to strike a balance between ensuring rigo...

Top 10 Most-Used RDP Passwords Are Not Complex Enough

New research from Specops Software shows attackers successfully attack and gain ...

Lazarus APT Jumps on ClickFix Bandwagon in Recent Attacks

A continuation of the North Korean nation-state threat's campaign against employ...

Top 10 Most Used RDP Passwords Are Not Complex Enough

New research from Specops Software shows attackers successfully attack and gain ...

Trend Micro Open Sources AI Tool Cybertron

The cybersecurity artificial intelligence (AI) model and agent will help organiz...

CoffeeLoader Malware Is Stacked With Vicious Evasion Tr...

Next-level malware represents a new era of malicious code developed specifically...

Oracle Cloud Users Urged to Take Action

Although Oracle has denied its cloud infrastructure services were breached, secu...

DoJ Seizes Over $8M From Sprawling Pig Butchering Scheme

The department was able to trace the stolen funds to three main cryptocurrency a...

CoffeeLoader Malware Is Stacked With Viscous Evasion Tr...

Next-level malware represents a new era of malicious code developed specifically...

DoJ Seizes Over $8M from Sprawling Pig Butchering Scheme

The department was able to trace the stolen funds to three main cryptocurrency a...

CISA Warns of Resurge Malware Connected to Ivanti Vuln

Threat actors are exploiting a vulnerability in Ivanti Connect Secure first disc...

Bridging the Gap Between the CISO & the Board of Di...

Positioning security leaders as more than risk managers turns them into business...

Qakbot Resurfaces in Fresh Wave of ClickFix Attacks

Attackers post links to fake websites on LinkedIn to ask people to complete mali...

GSA Plans FedRAMP Revamp

The General Services Administration is planning to use automation to speed up th...

Evilginx Tool (Still) Bypasses MFA

Based on the open source NGINX Web server, the malicious tool allows threat acto...

Oracle Still Denies Breach as Researchers Persist

Evidence suggests an attacker gained access to the company's cloud infrastructur...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.