Someone used AI to build a Web platform, which then did something predictable and preventable: It exposed all its data ...
Colonel Georgeo Xavier Pulikkathara, CISO at iMerit discusses the importance of fundamentals, continuous learning, and human ...
The forensic tool's driver was signed with a digital certificate that expired years ago, but major security gaps allowed ...
Hacktivist group claims a 2.3-terabyte data breach exposes information of 36 million Mexicans, but no sensitive accounts are ...
Dark Reading has something new hitting newsstands: a content section purpose-built for LatAm readers, featuring news, analysis, features, and multimedia.
By tapping the unusual .scr file type, attackers leverage "executables that don't always receive executable-level controls," ...
Iranian threat actors have been stealing credentials from people of interest across the Middle East, using spear-phishing and social engineering.
A third of the "flipped" CVEs affect edge devices, leading one researcher to conclude, "Ransomware operators are building ...
APT28's attacks use specially crafted Microsoft Rich Text Format (RTF) documents to kick off a multistage infection chain to deliver malicious payloads.
The self-replicating malware has poisoned a fresh set of Open VSX software components, leaving potential downstream victims ...
DragonForce is taking cues from organized crime, emphasizing cooperation and coordination among ransomware gangs.
Security teams need to be thinking about this list of emerging cybersecurity realities, to avoid rolling the dice on ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results