Dark Reading

Turkish APT Exploits Chat App Zero-Day to Spy on Iraqi ...

Even after their zero-day turned into an n-day, attackers known as Marbled Dust ...

Valarian Unveils Data Management Platform Designed for ...

The startup, which previously launched the Acra platform, aims to address data m...

Big Steelmaker Halts Operations After Cyber Incident

Nucor made it clear its investigation is still in the early stages and didn't sp...

International Crime Rings Defraud US Gov't Out of Billions

Fraudsters worldwide apply for money from the US government using stolen and for...

Cyber-Risk Calculator Takes the Guesswork Out of Assess...

Resilience's new tool aims to help organizations better understand their risk pr...

Attackers Target Samsung MagicINFO Server Bug, Patch Now

CVE-2025-4632, a patch bypass for a Samsung MagicInfo 9 Server vulnerability dis...

Critical SAP NetWeaver Vuln Faces Barrage of Cyberattacks

As threat actors continue to hop on the train of exploiting CVE-2025-31324, rese...

RSAC 2025: AI Everywhere, Trust Nowhere

We're at an inflection point. AI is changing the game, but the rules haven't cau...

Using a Calculator to Take Guesswork Out of Measuring C...

Organizations face the complex challenge of accurately measuring their cyber-ris...

Critical Infrastructure Under Siege: OT Security Still ...

With critical infrastructure facing constant cyber threats from the Typhoons and...

Using a Calculator to Take Guesswork Out of Measuring C...

Organizations face the complex challenge of accurately measuring their cyber ris...

Infosec Layoffs Aren't the Bargain That Boards May Think

Salary savings come with hidden costs, including insider threats and depleted cy...

AI Agents May Have a Memory Problem

A new study by researchers at Princeton University and Sentient shows it's surpr...

Ivanti EPMM Zero-Day Flaws Exploited in Chained Attack

The security software maker said the vulnerabilities in Endpoint Manager Mobile ...

Marks & Spencer Confirms Customer Data Stolen in Cy...

The British retailer said no account passwords were compromised in last month's ...

Congress Should Tackle Cyber Threats, Not Competition

Some members of Congress seem more intent on grabbing headlines than actually wo...

Orca Security Gets AI-Powered Remediation From Opus Deal

The acquisition will enhance Orca's CNAPP offering with autonomous vulnerability...

Hacktivists Make Little Impact During India-Pakistan Co...

While hacktivists claimed more than 100 successful attacks against Indian govern...

Windows Zero-Day Bug Exploited for Browser-Led RCE

Microsoft's May 2025 Patch Tuesday update also contains four other actively expl...

Chinese Actor Hit Taiwanese Drone Makers, Supply Chains

Tidrone concentrated on military entities and the satellite sector, using their ...

What Does EU's Bug Database Mean for Vulnerability Trac...

The EU cyber agency ENISA has launched its vulnerability database, the EUVD; sec...

CISA Warns of TeleMessage Vuln Despite Low CVSS Score

Though the app claims to use end-to-end encryption, hackers have reportedly acce...

DeepSeek, Deep Research Mean Deep Changes for AI Security

Why securing the inference chain is now the top priority for AI applications and...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.