COMMENTARYImagine you're standing in a bustling city, surrounded by the symphony of commerce. The exchange of goods and the flow of transportation are all...
Foreign nation-state hackers have used vulnerable Ivanti edge devices to gain three months' worth of "deep" access to one of MITRE Corp.'s unclassified networks.MITRE,...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...
The United Nations Development Programme (UNDP) became the victim of a cyberattack in late March, which also impacted the IT infrastructure of the city...
Texas-based Frontier Communications, which provides local residential and business telecom services in 25 states, has shut down its operations in the wake of a...
A security advisory issued this week by the Cybersecurity and Infrastructure Security Agency (CISA) alerts administrators of vulnerabilities in two industrial control systems devices...
COMMENTARYAs the digital landscape grows more treacherous, companies are finally beginning to treat cybersecurity as a top operational risk. And for enterprises revising their...
COMMENTARYAs the digital landscape grows more treacherous, companies are finally beginning to treat cybersecurity as a top operational risk. And for enterprises revising their...
Two dangerous malware tools targeted at industrial control systems (ICS) and operating technology (OT) environments in Europe are the latest manifestations of the cyber...
COMMENTARYAs the conflict in Ukraine enters its third year, the global community is confronted with the grim reality of modern warfare, where cyber operations...