darkreading
Change Healthcare Breach Impact Doubles to 190M People
5 months 1 week ago
One of the largest data breaches in history was apparently twice as impactful as previously thought, with PII belonging to hundreds of millions of people sitting in the hands of cybercriminals.
Nate Nelson, Contributing Writer
USPS Impersonators Tap Trust in PDFs in Smishing Attack Wave
5 months 1 week ago
Attackers aim to steal people's personal and payment-card data in the campaign, which dangles the threat of an undelivered package and has the potential to reach organizations in more than 50 countries.
Elizabeth Montalbano, Contributing Writer
Crisis Simulations: A Top 2025 Concern for CISOs
5 months 1 week ago
CISOs are planning to adjust their budgets this year to reflect their growing concerns for cybersecurity preparedness in the event of a cyberattack.
Kristina Beek, Associate Editor, Dark Reading
The Case for Proactive, Scalable Data Protection
5 months 1 week ago
Whether you're facing growing data demands and increased cyber threats, or simply looking to future-proof your business, it's time to consider the long-term benefits of transitioning to a cloud-first infrastructure.
Tom Ferrucci
CISOs Are Gaining C-Suite Swagger, but Has It Come With a Cost?
5 months 1 week ago
The number of CISOs who report directly to the CEO is up sharply in recent years, but many still say it's not enough to secure adequate resources.
Becky Bracken, Senior Editor, Dark Reading
DoJ Busts Up Another Multinational DPRK IT Worker Scam
5 months 1 week ago
A departmentwide initiative has now led to five major law enforcement actions, in an attempt to curb the increasingly common trend of North Korean hackers posing as IT job applicants.
Nate Nelson, Contributing Writer
MITRE's Latest ATT&CK Simulations Tackle Cloud Defenses
5 months 1 week ago
The MITRE framework's applied exercise provides defenders with critical feedback about how to detect and defend against common, but sophisticated, attacks.
Robert Lemos, Contributing Writer
Cisco: Critical Meeting Management Bug Requires Urgent Patch
5 months 1 week ago
The bug has been given a 9.9 CVSS score, and could allow authenticated threat actors to escalate their privileges to admin-level if exploited.
Kristina Beek, Associate Editor, Dark Reading
3 Use Cases for Third-Party API Security
5 months 1 week ago
Third-party API security requires a tailored approach for different scenarios. Learn how to adapt your security strategy to outbound data flows, inbound traffic, and SaaS-to-SaaS interconnections.
Dionisio Zumerle
Strengthening Our National Security in the AI Era
5 months 1 week ago
For the first time in a long while, the federal government and the software sector alike finally have the tools and resources needed to do security well — consistently and cost-effectively.
Mike Arrowsmith
War Game Pits China Against Taiwan in All-Out Cyberwar
5 months 1 week ago
At Black Hat and DEF CON, cybersecurity experts were asked to game out how Taiwan could protect its communications and power infrastructure in case of invasion by China.
Nate Nelson, Contributing Writer
Tesla Gear Gets Hacked Multiple Times in Pwn2Own Contests
5 months 1 week ago
The first team to successfully hack the electric vehicle maker's charger won $50,000 for their ingenuity.
Kristina Beek, Associate Editor, Dark Reading
CISA Calls For Action to Close the Software Understanding Gap
5 months 1 week ago
Omdia Finds Phishing Attacks Top Smartphone Security Concern for Consumers
5 months 1 week ago
Automox Releases Endpoint Management With FastAgent
5 months 1 week ago
84% of Healthcare Organizations Spotted a Cyberattack in the Late Year
5 months 1 week ago
Cloudflare CDN Bug Outs User Locations on Signal, Discord
5 months 1 week ago
Attackers can use a zero- or one-click flaw to send a malicious image to targets — an image that can deanonymize a user within seconds, posing a threat to journalists, activists, hackers, and others whose locations are sensitive.
Elizabeth Montalbano, Contributing Writer
CISA: Ivanti Vulns Chained Together in Cyberattack Onslaught
5 months 1 week ago
The threat actors are abusing the vulnerabilities to gain initial access, obtain credentials, and install malicious scripts on user devices.
Kristina Beek, Associate Editor, Dark Reading
The Security Risk of Rampant Shadow AI
5 months 1 week ago
While employees want to take advantage of the increased efficiency of GenAI and LLMs, CISOs and IT teams must be diligent and stay on top of the most up-to-date security regulations.
Anuj Jaiswal
Checked
4 hours 46 minutes ago
Public RSS feed
darkreading feed