Cyber Security
Sophisticated Vishing Campaigns Take World by Storm
Voice phishing, or vishing, is having a moment right now, with numerous active campaigns across the world that are ensnaring even savvy victims who...
Breaking News
Japan Blames North Korea for PyPI Supply Chain Cyberattack
Japanese cybersecurity officials warned that North Korea's infamous Lazarus Group hacking team recently waged a supply chain attack targeting the PyPI software repository for...
Google Engineer Steals AI Trade Secrets for Chinese Companies
The US Justice Department has charged a former Google software engineer with stealing artificial intelligence-related trade secrets from the company, with an eye to...
Broke Cyber Pros Flock to Cybercrime Side Hustles
Cybersecurity professionals are finding it more attractive to take their talents to the Dark Web and earn money working on the offensive side of...
CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Each week, we'll offer articles...
South Korean Police Deploy Deepfake Detection Tool Prior to Elections
Amid a steep rise in politically motivated deepfakes, South Korea's National Police Agency (KNPA) has developed and deployed a tool for detecting AI-generated content...
Russia-Sponsored Cyberattackers Infiltrate Microsoft’s Code Base
The Russian state-sponsored advanced persistent threat (APT) group known as Midnight Blizzard has nabbed Microsoft source code after accessing internal repositories and systems, as...
Stealth Bomber: Atlassian Confluence Exploits Drop Web Shells In-Memory
Fresh proof-of-concept (PoC) exploits are circulating in the wild for a widely targeted Atlassian Confluence Data Center and Confluence Server flaw. The new attack...
Creating Security Through Randomness
When you step inside Cloudflare's San Francisco office, the first thing you notice is a wall of lava lamps. Visitors often stop to take...
The Ongoing Struggle to Protect PLCs
COMMENTARYTen years have passed since the infamous Stuxnet attack highlighted the vulnerabilities of the operational technology (OT) systems that play a crucial role in...
APT attacks taking aim at Tibetans – Week in security with Tony Anscombe
Video
Evasive Panda has been spotted targeting Tibetans in several countries and territories...
NSA’s Zero-Trust Guidelines Focus on Segmentation
The US National Security Agency (NSA) delivered its guidelines for zero-trust network security this week, offering a more concrete roadmap towards zero-trust adoption. It's...
Nigerian National Pleads Guilty of Conspiracy in BEC Operation
Henry Onyedikachi Echefu, one of the three Nigerian men who were involved in an elaborate business email compromise (BEC) scheme, has pleaded guilty to...