Dark Reading

Why Cyber Quality Is the Key to Security

The time to secure foundations, empower teams, and make cyber resilience the sta...

University Competition Focuses on Solving Generative AI...

The Amazon Nova AI Challenge puts student research to the test and aims to bring...

VexTrio Using 20,000 Hacked WordPress Sites in Traffic ...

A massive cybercrime network known as "VexTrio" is using thousands of compromise...

Why It's So Hard to Stop Rising Malicious TDS Traffic

Cybersecurity vendors say threat actors' abuse of traffic distribution systems (...

Ukraine Defense Sector Under Attack Via Dark Crystal RAT

The UNC-200 threat group, active since last summer, has been utilizing the Signa...

Cybercriminals Taking Advantage of 'Shadow' Alliances, AI

A Europol report says nation-state actors are increasingly working with organize...

Cybercriminals Taking Advantage Of AI, 'Shadow' Alliances

A Europol report says nation-state actors are increasingly working with organize...

Are We Closing the Gender Gap in Cybersecurity?

Answer: Nope. But let's look at the trends — because they matter for security.

HP Brings Quantum-Safe Encryption to Printers

Starting this fall, HP's 8000 Series enterprise and commercial printers, which i...

Mobile Jailbreaks Exponentially Increase Corporate Risk

Both Android devices and iPhones are 3.5 times more likely to be infected with m...

India Is Top Global Target for Hacktivists, Regional APTs

Global politics and a growing economy draw the wrong kind of attention to India,...

Critical Fortinet Vulnerability Draws Fresh Attention

CISA this week added CVE-2025-24472 to its catalog of known exploited vulnerabil...

Cytex Unveils AICenturion

Nation-State Groups Abuse Microsoft Windows Shortcut Ex...

Trend Micro uncovered a method that nation-state threat actors are using to targ...

Infosys Settles $17.5M Class Action Lawsuit After Spraw...

Several major companies in the finance sector were impacted by the third-party b...

AI Cloud Adoption Is Rife With Cyber Mistakes

Research finds that organizations are granting root access by default and making...

Why Cybersecurity Needs More Business-Minded Leaders

The question is no longer "Are we compliant?" but "Are we truly resilient?"

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.