Iran has been hacking IP cameras to plan missile strikes against its enemies, showing how cyber and kinetic warfare are fast ...
Using Anthropic and OpenAI's AI systems — and a detailed playbook prompt — cyberattackers gained access to Mexico's agencies ...
Fig Security's platform traces security data flows end-to-end across SIEMs, pipelines, and response systems to alert teams ...
DPRK worker scams are old hat, but they're still working, thanks to AI tools that help with everything from face swapping to daily emails.
The phishing-as-a-service platform was popular among cyber threat actors because of its ability to bypass multi-factor ...
Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat ...
Events and concepts from the Stranger Things television series illustrate how enterprises can defend their networks and stay ...
Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, ...
Organizations can borrow secure-by-design processes to manage non-technical challenges like governance or the inevitable ...
Pakistan's APT36 threat group has begun using vibe-coding to churn out mediocre malware, but at a scale that could overwhelm ...
India-nexus cyber threat actors are growing more active and sophisticated, using custom tools coded in Rust and cloud-based ...
The European Union is taking new precautions as climate change and cybersecurity threats rise across the automotive industry.