India's government agencies and energy companies are facing a new threat in the form of an espionage campaign using an open source information stealer."HackBrowersData,"...
With adversaries increasingly relying on legitimate tools to hide their malicious activities, enterprise defenders have to rethink the network architecture in order to detect...
In a daring act of resistance, Helen Mirren shredded an AI-generated speech at the American Cinematheque Awards that received thunderous applause.
The acclaimed British actress,...
Google has open sourced Magika, an in-house machine-learning-powered file identifier, as part of its AI Cyber Defense Initiative, which aims to give IT network...
The portion of China's Volt Typhoon advanced persistent threat (APT) that focuses on infiltrating operational technology (OT) networks in critical infrastructure has already performed...
The European Court of Human Rights has upheld privacy and freedom of expression, rejecting backdoor demands in encrypted messaging services, highlighting potential security risks....
PlayDapp, a South Korean blockchain-based game development platform and non-fungible token (NFT) marketplace, has lost over $290 million in crypto from an exploit lasting...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...
Iran's cyber conflict with Israel has reached global proportions, with cyberattacks against businesses and government agencies on other continents causing arguably as much ruckus...