Dark Reading

Indian Police Arrest Cybercrime Gang Copycats of Myanma...

The region offers attractive conditions: a large pool of tech workers, economic ...

Adidas Falls Victim to Third-Party Data Breach

Though Adidas said that no payment or financial information was affected in the ...

CISA Warns of Attacks Targeting Commvault SaaS Environment

A threat actor has gained access to Microsoft 365 environments of a small number...

DragonForce Ransomware Strikes MSP in Supply Chain Attack

DragonForce, a ransomware "cartel" that has gained significant popularity since ...

MathWorks, Creator of MATLAB, Confirms Ransomware Attack

The attack dirsupted MathWorks' systems and online applications, but it remains ...

FBI: Silent Ransom Group Adopts Vishing Campaign Agains...

The non-ransomware extortion group has switched up tactics and victimology in a ...

How the New Hacker Millionaire Class Was Built

Once dismissed as Internet miscreants in hoodies, ethical hackers have hit the b...

Danabot Takedown Deals Blow to Russian Cybercrime

A multiyear investigation by a public-private partnership has resulted in the se...

CVE Uncertainty Underlines Importance of Cyber Resilience

Organizations need to broaden their strategy to manage vulnerabilities more effe...

3 Critical Pillars of Cyber-Resilience

Encryption, collaboration, and AI can help organizations build up essential prot...

How AI Is Transforming SASE, Zero Trust for Modern Ente...

By automating security policies and threat detection while coaching users on dat...

Rethinking Data Privacy in the Age of Generative AI

The key to navigating this new GenAI landscape is a balanced approach — one that...

3 Severe Bugs Patched in Versa's Concerto Orchestrator

Three zero-days could have allowed an attacker to completely compromise the Conc...

Companies Look to AI to Tame the Chaos of Event Securit...

As the summer event season kicks off, venue managers and security firms aim to m...

Following Data Breach, Multiple Stalkerware Apps Go Off...

The same easily exploitable vulnerability was found in three of the apps that le...

Russian Threat Actor TAG-110 Goes Phishing in Tajikistan

While Ukraine remains Russia's major target for cyberattacks, TAG-110 is part of...

3am Ransomware Adopts Email Bombing, Vishing Combo Attack

The emerging threat group is the latest to adopt the combo attack tactic, which ...

UK Retail Cyberattacks May Drive Up US Insurance Premiums

Insurance experts weigh in how the recent barrage of attacks against UK retailer...

Blurring Lines Between Scattered Spider & Russian C...

The loosely affiliated hacking group has shifted closer to ransomware gangs, rai...

CISA: Russia's Fancy Bear Targeting Logistics, IT Firms

The mission is to gather information that could help Russia in its war against U...

Security Threats of Open Source AI Exposed by DeepSeek

DeepSeek's risks must be carefully considered, and ultimately mitigated, in orde...

Keeping LLMs on the Rails Poses Design, Engineering Cha...

Despite adding alignment training, guardrails, and filters, large language model...

GitLab's AI Assistant Opened Devs to Code Theft

Prompt injection risks in GitLab's AI assistant could have allowed attackers to ...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.