darkreading
When Brand Loyalty Trumps Data Security
9 months 1 week ago
Brand loyalty can act as a shield protecting organizations from the immediate impact of a breach, but that protection has a shelf life.
Paul Underwood
Signs Your Organization's Culture Is Hurting Your Cybersecurity
9 months 1 week ago
High turnover, burnout, and blame-heavy environments do more than hurt morale. They also weaken security and put the organization at risk.
Joan Goodchild
'Darcula' Phishing Kit Can Now Impersonate Any Brand
9 months 1 week ago
With Version 3, would-be phishers can cut and paste a big brand's URL into a template and let automation do the rest.
Nate Nelson, Contributing Writer
Australian Critical Infrastructure Faces 'Acute' Foreign Threats
9 months 2 weeks ago
The continent faces "relentless" military espionage, and increased cyber sabotage at the hands of authoritarian regimes, according to a high-ranking intelligence director.
Nate Nelson, Contributing Writer
Insight Partners, VC Giant, Falls to Social Engineering
9 months 2 weeks ago
The startup incubator and PR firm with holdings in more than 70 cybersecurity firms has announced a data breach with as-yet-unknown effects.
Tara Seals, Managing Editor, News, Dark Reading
Russian Groups Target Signal Messenger in Spy Campaign
9 months 2 weeks ago
These sorts of attacks reveal growing adversary interest in secure messaging apps used by high-value targets for communication, Google says.
Jai Vijayan, Contributing Writer
Content Credentials Show Promise, but Ecosystem Still Young
9 months 2 weeks ago
While AI-generation services and major camera makers are adopting the specification for digitally signed metadata, creating a workflow around the nascent ecosystem is still a challenge.
Robert Lemos, Contributing Writer
Patch Now: CISA Warns of Palo Alto Flaw Exploited in the Wild
9 months 2 weeks ago
The authentication bypass vulnerability in the OS for the company's firewall devices is under increasing attack and being chained with other bugs, making it imperative for organizations to mitigate the issue ASAP.
Elizabeth Montalbano, Contributing Writer
What Is the Board's Role in Cyber-Risk Management in OT Environments?
9 months 2 weeks ago
By taking several proactive steps, boards can improve their organization's resilience against cyberattacks and protect their critical OT assets.
John Cusimano
North Korea's Kimsuky Taps Trusted Platforms to Attack South Korea
9 months 2 weeks ago
The campaign heavily uses Dropbox folders and PowerShell scripts to evade detection and quickly scrapped infrastructure components after researchers began poking around.
Robert Lemos, Contributing Writer
Deepwatch Acquires Dassana to Boost Cyber-Resilience With AI
9 months 2 weeks ago
Acquisition strengthens Deepwatch Platform capabilities with actionable insights and risk-based prioritization.
Dark Reading Staff
Xerox Printer Vulnerabilities Enable Credential Capture
9 months 2 weeks ago
Attackers are using patched bugs to potentially gain unfettered access to an organization's Windows environment under certain conditions.
Jai Vijayan, Contributing Writer
China-Linked Threat Group Targets Japanese Orgs' Servers
9 months 2 weeks ago
Winnti once used a variety of malware but is now focused on SQL vulnerabilities and obfuscation, updated encryption, and new evasion methods to gain access.
Kristina Beek, Associate Editor, Dark Reading
Thrive Acquires Secured Network Services
9 months 2 weeks ago
SANS Institute Launches AI Cybersecurity Hackathon
9 months 2 weeks ago
Microsoft: New Variant of macOS Threat XCSSET Spotted in the Wild
9 months 2 weeks ago
Microsoft is warning the modular and potentially wormable Apple-focused infostealer boasts new capabilities for obfuscation, persistence, and infection, and could lead to a supply chain attack.
Elizabeth Montalbano, Contributing Writer
Introducing enQase for Quantum-Safe Security
9 months 2 weeks ago
This Security Firm's 'Bias' Is Also Its Superpower
9 months 2 weeks ago
Credible Security's founders bring their varied experiences to help growing companies turn trust into a strategic advantage.
Mercedes Cardona
Open Source AI Models: Perfect Storm for Malicious Code, Vulnerabilities
9 months 2 weeks ago
Companies pursing internal AI development using models from Hugging Face and other open source repositories need to focus on supply chain security and checking for vulnerabilities.
Robert Lemos, Contributing Writer
Checked
3 hours 24 minutes ago
Public RSS feed
darkreading feed