Dark Reading

Why Rigid Security Programs Keep Failing

Organizations that stay ahead of attacks won't be the most compliant ones — they...

'Operation RoundPress' Targets Ukraine in XSS Webmail A...

A cyber-espionage campaign is targeting Ukrainian government entities with a ser...

S. Dakota CIO Gottumukkala Signs on as CISA Deputy Dire...

The addition is an important hire for the No. 2 position at the cyber agency. Th...

Legal Aid Agency Warns Lawyers, Defendants on Data Breach

The online service has since been shut down as the agency grapples with the cybe...

After Pahalgam Attack, Hacktivists Unite Under #OpIndia

Cybercriminals are flocking to take part in the newly inflamed fight between Ind...

LockBit Ransomware Gang Hacked, Operations Data Leaked

Exposed data from LockBit's affiliate panel includes Bitcoin addresses, private ...

Cyber Then & Now: Inside a 2-Decade Industry Evolution

On Dark Reading's 19-year anniversary, Editor-in-Chief Kelly Jackson Higgins sto...

Coinbase Extorted, Offers $20M for Info on Its Hackers

Coinbase is going Liam Neeson on its attackers, potentially setting a new preced...

CVE Disruption Threatens Foundations of Defensive Security

If the Common Vulnerabilities and Exposures system continues to face uncertainty...

Australian Human Rights Commission Leaks Docs in Data B...

An internal error led to public disclosure of reams of sensitive data that could...

Dynamic DNS Emerges as Go-to Cyberattack Facilitator

Scattered Spider and other phishers and hacking groups are using rentable subdom...

Attacker Specialization Puts Threat Modeling on Defensive

Specialization among threat groups poses challenges for defenders, who now must ...

Commvault: Vulnerability Patch Works as Intended

The security researcher who questioned the effectiveness of a patch for recently...

Insight Partners Data Breach: Bigger Impact Than Antici...

The investigation is ongoing, but the VC giant intends to inform affected custom...

How Security Has Changed the Hacker Marketplace

Your ultimate goal shouldn't be security perfection — it should be making exploi...

SonicWall Issues Patch for Exploit Chain in SMA Devices

Three vulnerabilities in SMA 100 gateways could facilitate root RCE attacks, and...

Email-Based Attacks Top Cyber-Insurance Claims

Cyber-insurance carrier Coalition said business email compromise and funds trans...

Operation PowerOFF Takes Down 9 DDoS-for-Hire Domains

Four different countries, including the United States and Germany, were included...

Life Without CVEs? It's Time to Act

Despite all MITRE has done for cybersecurity, it is clear we should not wait 11 ...

'Lemon Sandstorm' Underscores Risks to Middle East Infr...

The Iranian state-backed group targeted the operational technology of a critical...

'CoGUI' Phishing Kit Helps Chinese Hackers Target Japan

Japan is being peppered with an overwhelming volume of spam, thanks to a new pla...

How to Develop and Communicate Metrics for CSIRPs

A well-documented cybersecurity incident response program (CSIRP) provides the t...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.