Dark Reading

China-Nexus APT 'Weaver Ant' Caught in Yearslong Web Sh...

The persistent threat actor was caught using sophisticated Web shell techniques ...

US Weakens Disinformation Defenses, as Russia & Chi...

Russia and China spend billions of dollars on state media, propaganda, and disin...

FCC Investigates China-Backed Tech Suppliers for Evadin...

FCC chairman warns these companies may still be operating in the US because they...

Oracle Denies Claim of Oracle Cloud Breach of 6M Records

A threat actor posted data on Breachforums from an alleged supply-chain attack t...

Is the Middle East's Race to Digitize a Threat to Infra...

As the region continues with its ambitious road map, cybersecurity must be woven...

Attackers Pivot to SEMrush Spoof to Steal Google Creden...

The attackers are taking an indirect approach to targeting SEO professionals and...

What CISA's Red Team Disarray Means for US Cyber Defenses

DOGE is making wild moves at CISA, including bringing back fired probationary em...

Nation-State 'Paragon' Spyware Infections Target Civil ...

Law enforcement entities in democratic states have been deploying top-of-the-lin...

Why Cyber Quality Is the Key to Security

The time to secure foundations, empower teams, and make cyber resilience the sta...

University Competition Focuses on Solving Generative AI...

The Amazon Nova AI Challenge puts student research to the test and aims to bring...

VexTrio Using 20,000 Hacked WordPress Sites in Traffic ...

A massive cybercrime network known as "VexTrio" is using thousands of compromise...

Why It's So Hard to Stop Rising Malicious TDS Traffic

Cybersecurity vendors say threat actors' abuse of traffic distribution systems (...

Ukraine Defense Sector Under Attack Via Dark Crystal RAT

The UNC-200 threat group, active since last summer, has been utilizing the Signa...

Cybercriminals Taking Advantage of 'Shadow' Alliances, AI

A Europol report says nation-state actors are increasingly working with organize...

Cybercriminals Taking Advantage Of AI, 'Shadow' Alliances

A Europol report says nation-state actors are increasingly working with organize...

Are We Closing the Gender Gap in Cybersecurity?

Answer: Nope. But let's look at the trends — because they matter for security.

HP Brings Quantum-Safe Encryption to Printers

Starting this fall, HP's 8000 Series enterprise and commercial printers, which i...

Mobile Jailbreaks Exponentially Increase Corporate Risk

Both Android devices and iPhones are 3.5 times more likely to be infected with m...

India Is Top Global Target for Hacktivists, Regional APTs

Global politics and a growing economy draw the wrong kind of attention to India,...

Critical Fortinet Vulnerability Draws Fresh Attention

CISA this week added CVE-2025-24472 to its catalog of known exploited vulnerabil...

Cytex Unveils AICenturion

Nation-State Groups Abuse Microsoft Windows Shortcut Ex...

Trend Micro uncovered a method that nation-state threat actors are using to targ...

Infosys Settles $17.5M Class Action Lawsuit After Spraw...

Several major companies in the finance sector were impacted by the third-party b...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.