Dark Reading

Denmark Warns of Increased Cyber Espionage Against Tele...

A new threat assessment from the Danish Civil Protection Authority (SAMSIK) warn...

Apache Tomcat RCE Vulnerability Under Fire With 2-Step ...

The researchers who discovered the initial assault warned that the simple, stage...

RansomHub Taps FakeUpdates to Target US Government Sector

A ransomware activity wave using the SocGholish MaaS framework for initial acces...

Man-in-the-Middle Vulns Threaten Car Security

A pair of researchers plan on digging into the effectiveness of vehicle cybersec...

How 'Open Innovation' Can Help Solve Problems Faster, B...

Cybersecurity is not just a technical challenge but also a very human one. The m...

How Economic Headwinds Influence the Ransomware Ecosystem

Inflation, cryptocurrency market volatility, and the ability to invest in defens...

Intel's Secure Data Tunnel Moves AI Training Models to ...

The chipmaker's Tiber Secure Federated AI service creates a secure tunnel betwee...

8 Tips on Leveraging AI Tools Without Compromising Secu...

AI tools can deliver quick and easy results and offer huge business benefits — b...

Wiz-Securonix Partnership Promises Unified Threat Detec...

The collaboration focuses on helping security teams detect and address cloud thr...

Rundown of Security News From AWS re:Invent 2023

Amazon Web Services announced enhancements to several of its security tools, inc...

Proxy Trojan Targets macOS Users for Traffic Redirection

Apple users who end up with the Trojan on their machines face a number of bad ou...

Krasue RAT Uses Cross-Kernel Linux Rootkit to Attack Te...

A stealthy malware is infecting the systems of telecoms and other verticals in T...

Iran Threatens Israel's Critical Infrastructure With 'P...

Cyber mimics life, as Iran uses Lebanese hackers to attack its bête noire.

Patch Now: Critical Atlassian Bugs Endanger Enterprise ...

Four RCE vulnerabilities in Confluence, Jira, and other platforms, allow instanc...

Microsoft Is Getting a New 'Outsider' CISO

Igor Tsyganskiy inherits the high-profile CISO spot in Redmond, while his predec...

CISA: Threat Actor Breached Federal Systems via Adobe C...

Adobe patched CVE-2023-26360 in March amid active exploit activity targeting the...

Critical Bluetooth Flaw Exposes Android, Apple & Li...

Various devices remain vulnerable to the bug, which has existed without notice f...

Cracking Weak Cryptography Before Quantum Computing Does

Worries over crypto's defenselessness against quantum computing has inspired a p...

UK Cyber CTO: Vendors' Security Failings Are Rampant

The NCSC's Ollie Whitehouse criticizes security vendors for actively working aga...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.