Moonlighter, which offers red teams a chance at operational disruption, will be up for pwning at in August, timed with DEF CON.
Read moreSocial media data can provide critical clues to help get ahead of the next cyberattack, experts say.
Read moreWith shades of the GoAnywhere attacks, a cyber threat actor linked to FIN11 is leveraging a bug in the widely used managed file transfer product to steal data from...
Read moreTo stem supply chain attacks, forging a new dynamic of shared cybersecurity hygiene accountability is the right thing to do.
Read moreIn this Fast Chat segment, Dark Reading's Terry Sweeney and Varonis co-founder and CEO Yaki Faitelson discuss why we’re still seeing internal data breaches.
Read moreName That Edge Toon: Spring Chickens
June 5 2023Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreThe Python Package Index will require developers to better secure their accounts as cyberattacks ramp up, but protecting the software supply chain will take more than that.
Read moreSMS campaigns targeting members of the public in the United Arab Emirates have been detected.
Read moreA recent campaign tricks victims into visiting credential harvesting sites by hiding malicious URLs behind photos advertising deals from trusted brands.
Read more
Recent Comments