Dark Reading

Google Agrees to Settle $1.375B 'Historic' Privacy Case...

For years, Google has faced several legal battles over privacy and lost, though ...

North Korea's TA406 Targets Ukraine for Intel

The threat group's goal is to help Pyongyang assess risk to its troops deployed ...

NSO Group's Legal Loss May Do Little to Curtail Spyware

The $168 million judgment against NSO Group underscores how citizens put little ...

Attackers Lace Fake Generative AI Tools With 'Noodlophi...

Threat actors are scamming users by advertising legitimate-looking generative AI...

4 Hackers Arrested After Millions Made in Global Botnet...

The cybercriminals infected older wireless Internet routers with Anyproxy and 5s...

Can Cybersecurity Keep Up In the AI Arms Race?

New research shows China is quickly catching up with the US in AI innovation. Ex...

Vulnerability Detection Tops Agentic AI at RSAC's Start...

Agentic-native startups threaten to reduce the zero-day problem to just a zero-h...

New UK Security Guidelines Aim to Reshape Software Deve...

The voluntary Software Security Code of Practice is the latest initiative to com...

New UK Security Guidelines Aims to Reshape Software Dev...

The voluntary Software Security Code of Practice is the latest initiative to com...

UK Retailers Reeling From Likely Ransomware Attacks

A series of cyberattacks have struck multiple major British retailers in recent ...

What NY's New Security Rules Mean for Finance Firms

According to the New York Department of Financial Services, finance companies op...

Attackers Ramp Up Efforts Targeting Developer Secrets

Software teams need to follow security best practices to eliminate the leak of s...

Despite Arrests, Scattered Spider Continues High-Profil...

While law enforcement has identified and arrested several alleged members, the n...

Cut CISA and Everyone Pays for It

Gutting CISA won't just lose us a partner. It will lose us momentum. And in this...

SANS Top 5: Cyber Has Busted Out of the SOC

This year's top cyber challenges include cloud authorization sprawl, ICS cyberat...

Enterprises Need to Beware of These 5 Threats

A panelist of SANS Institute leaders detailed current threats and provided actio...

Experts Debate Real ID Security Ahead of May 7 Deadline

Real IDs have been in the works since 2005. Are their security standards still r...

Getting Outlook.com Ready for Bulk Email Compliance

Microsoft has set May 5 as the deadline for bulk email compliance. In this Tech ...

A Cybersecurity Paradox: Even Resilient Organizations A...

Organizations are underestimating the advanced technology's risks to the softwar...

When Threat Actors Behave Like Managed Service Providers

How one unreasonable client got lucky during a cyber incident, despite their unr...

Microsoft Readies Administrator Protection Option for W...

Microsoft's David Weston describes the new feature as the most significant archi...

Putin's Cyberattacks on Ukraine Rise 70%, With Little E...

Russia's cyberattacks on Ukraine have increased dramatically, targeting the coun...

Billbug Expands Cyber-Espionage Campaign in Southeast Asia

The China-linked cyber-operations group, better known as Lotus Panda, uses its o...

Cisco Boosts XDR Platform, Splunk With Agentic AI

Cisco joins the agentic AI wave with the introduction of advanced LLMs to autono...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.