North Korea's premiere advanced persistent threats (APTs) have been quietly spying on South Korean defense contractors for at least a year and a half,...
Remember that guy in the
trench coat, fedora pulled low, whispering sweet nothings about Nigerian
princes in your inbox? Those days are quaint, relics of a...
Hackers are using unpublished GitHub and GitLab comments to generate phishing links that appear to come from legitimate open source software (OSS) projects.The clever...
For generations, video
games have been playgrounds of pure escapism. We've slain pixelated dragons,
solved fantastical puzzles, and explored sprawling digital worlds, all at the
cost of...
Earlier this year, Mandiant Consulting's incident response team tracked an attack by a China-linked espionage group back to the compromise of an edge device...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...