Cyber Security
Breaking News
How Not to Become the Target of the Next Microsoft Hack
COMMENTARYThe cybersecurity landscape, particularly within the Microsoft 365 ecosystem, constantly evolves. Recent incidents involving major tech companies and cybersecurity firms highlight a critical reality:...
How Not to Become the Target of the Next Microsoft Hack
COMMENTARYThe cybersecurity landscape, particularly within the Microsoft 365 ecosystem, constantly evolves. Recent incidents involving major tech companies and cybersecurity firms highlight a critical reality:...
Japan Blames North Korea for PyPI Supply Chain Cyberattack
Japanese cybersecurity officials warned that North Korea's infamous Lazarus Group hacking team recently waged a supply chain attack targeting the PyPI software repository for...
Google Engineer Steals AI Trade Secrets for Chinese Companies
The US Justice Department has charged a former Google software engineer with stealing artificial intelligence-related trade secrets from the company, with an eye to...
Broke Cyber Pros Flock to Cybercrime Side Hustles
Cybersecurity professionals are finding it more attractive to take their talents to the Dark Web and earn money working on the offensive side of...
CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Each week, we'll offer articles...
South Korean Police Deploy Deepfake Detection Tool Prior to Elections
Amid a steep rise in politically motivated deepfakes, South Korea's National Police Agency (KNPA) has developed and deployed a tool for detecting AI-generated content...
Russia-Sponsored Cyberattackers Infiltrate Microsoft’s Code Base
The Russian state-sponsored advanced persistent threat (APT) group known as Midnight Blizzard has nabbed Microsoft source code after accessing internal repositories and systems, as...
Stealth Bomber: Atlassian Confluence Exploits Drop Web Shells In-Memory
Fresh proof-of-concept (PoC) exploits are circulating in the wild for a widely targeted Atlassian Confluence Data Center and Confluence Server flaw. The new attack...
Creating Security Through Randomness
When you step inside Cloudflare's San Francisco office, the first thing you notice is a wall of lava lamps. Visitors often stop to take...
The Ongoing Struggle to Protect PLCs
COMMENTARYTen years have passed since the infamous Stuxnet attack highlighted the vulnerabilities of the operational technology (OT) systems that play a crucial role in...
NSA’s Zero-Trust Guidelines Focus on Segmentation
The US National Security Agency (NSA) delivered its guidelines for zero-trust network security this week, offering a more concrete roadmap towards zero-trust adoption. It's...