Moonlighter, which offers red teams a chance at operational disruption, will be up for pwning at in August, timed with DEF CON.
Read moreSocial media data can provide critical clues to help get ahead of the next cyberattack, experts say.
Read moreWith shades of the GoAnywhere attacks, a cyber threat actor linked to FIN11 is leveraging a bug in the widely used managed file transfer product to steal data from...
Read moreTo stem supply chain attacks, forging a new dynamic of shared cybersecurity hygiene accountability is the right thing to do.
Read moreIn this Fast Chat segment, Dark Reading's Terry Sweeney and Varonis co-founder and CEO Yaki Faitelson discuss why we’re still seeing internal data breaches.
Read moreThe Software-Defined Car
June 5 2023Developers are starting to talk about the software-defined car.
For decades, features have accumulated like cruft in new vehicles: a box here to control the antilock brakes, a module...
Read more
Name That Edge Toon: Spring Chickens
June 5 2023Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreFriday Squid Blogging: Squid Chromolithographs
June 3 2023Beautiful illustrations. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. EDITED TO...
Read moreThe Python Package Index will require developers to better secure their accounts as cyberattacks ramp up, but protecting the software supply chain will take more than that.
Read moreSMS campaigns targeting members of the public in the United Arab Emirates have been detected.
Read more
Recent Comments