12 hours 38 minutes ago
IONIX illuminates exploitable risks across the real attack surface and its digital supply chain providing security teams with critical focus to accelerate risk reduction.
12 hours 43 minutes ago
In a possible first for the NuGet repository, more than a dozen components in the .NET code repository run a malicious script upon installation, with no warning or alert.
Robert Lemos, Contributing Writer, Dark Reading
13 hours 9 minutes ago
The application security expert, who went by "@aloria," is being remembered for her brilliance and generosity, as tributes start to pour in honoring her life.
Dark Reading Staff, Dark Reading
13 hours 19 minutes ago
Global study reveals boards still undervalue cyber's role.
13 hours 29 minutes ago
13 hours 40 minutes ago
13 hours 51 minutes ago
After its second cyberattack in under a year, General Bytes urges customers to up the security on their personal accounts to prevent losses from hackers.
Dark Reading Staff, Dark Reading
13 hours 52 minutes ago
15 hours 3 minutes ago
For companies, training an existing worker is cheaper than hiring, while for employees, training brings job security and more interesting work.
Robert Lemos, Contributing Writer, Dark Reading
17 hours 9 minutes ago
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
John Klossner, Cartoonist
19 hours 38 minutes ago
Threat actors are using legitimate network assets and open source code to fly under the radar in data-stealing attacks using a set of custom malware bent on evasion.
Elizabeth Montalbano, Contributor, Dark Reading
20 hours 9 minutes ago
Third-party breaches have a wide effect that legacy security practices can no longer detect.
Erwan Keraudy, CEO, CybelAngel
Checked
1 hour 50 minutes ago
Dark Reading: Connecting the Information and Security Community
Subscribe to Dark Reading feed