sumi.news
Search
Following
Sign in
← Back to news
D
Dark Reading
RSS Feed
www.darkreading.com
www.darkreading.com/rss.xml
Follow
Latest
Yesterday
KnowBe4 to Acquire Egress
10h
S
Black Girls Do Engineer Signs Education Partnership Agreement With NSA
10h
S
Attacker Social-Engineered Backdoor Code Into XZ Utils
10h
S
Lights On in Leicester: Streetlights in Disarray After Cyberattack
12h
S
North Korea APT Triumvirate Spied on South Korean Defense Industry For Years
15h
S
Iran Dupes US Military Contractors, Gov't Agencies in Years-Long Cyber Campaign
17h
S
2023: A 'Good' Year for OT Cyberattacks
17h
S
Patch Now: CrushFTP Zero-Day Cloud Exploit Targets US Orgs
18h
S
Fortify AI Training Datasets From Malicious Poisoning
18h
S
CompTIA Supports Department of Defense Efforts to Strengthen Cyber Knowledge and Skills
1d
S
5 Hard Truths About the State of Cloud Security 2024
1d
S
Siemens Working on Fix for Device Affected by Palo Alto Firewall Bug
1d
S
Hackers Create Legit Phishing Links With Ghost GitHub, GitLab Comments
1d
S
Back from the Brink: UnitedHealth Offers Sobering Post-Attack Update
1d
S
Lessons for CISOs From OWASP's LLM Top 10
1d
S
US Gov Slaps Visa Restrictions on Spyware Honchos
1d
S
Russia's Fancy Bear Pummels Windows Print Spooler Bug
1d
S
Teetering on the Edge: VPNs, Firewalls' Nonexistent Telemetry Lures APTs
1d
S
Licensed to Bill? Nations Mandate Certification & Licensure of Cybersecurity Pros
2d
S
ToddyCat APT Is Stealing Data on 'Industrial Scale'
2d
S
Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar
2d
S
MITRE ATT&CKED: InfoSec's Most Trusted Name Falls to Ivanti Bugs
2d
S
Zero Trust Takes Over: 63% of Orgs Implementing Globally
2d
S
Where Hackers Find Your Weak Spots
2d
S
CISO Corner: Breaking Staff Burnout, GPT-4 Exploits, Rebalancing NIST
5d
S
Miggo Launches Application Detection and Response (ADR) Solution
5d
S
FBI Director Wray Issues Dire Warning on China's Cybersecurity Threat
5d
S
UNDP, City of Copenhagen Targeted in Data-Extortion Cyberattack
5d
S
Multiple LastPass Users Lose Master Passwords to Ultra-Convincing Scam
5d
S
Rethinking How You Work With Detection and Response Metrics
5d
S
AI Lowers Barrier for Cyber-Adversary Manipulation in 2024 Election
5d
S
'MagicDot' Windows Weakness Allows Unprivileged Rootkit Activity
5d
S
Cyberattack Takes Frontier Communications Offline
6d
S
Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware
6d
S
Cisco's Complex Road to Deliver on Its Hypershield Promise
6d
S
Cisco Warns of Massive Surge in Password-Spraying Attacks on VPNs
6d
S
Auburn's McCrary Institute and Oak Ridge National Laboratory to Partner on Regional Cybersecurity Center
6d
S
ICS Network Controllers Open to Remote Exploit, No Patches Available
6d
S
GPT-4 Can Exploit Most Vulns Just by Reading Threat Advisories
6d
S
Russian APT Group Thwarted in Attack on US Automotive Manufacturer
6d
S
Rebalancing NIST: Why 'Recovery' Can't Stand Alone
6d
S
Break Security Burnout: Combining Leadership With Neuroscience
6d
S
Sneaky Shellcode: Windows Fibers Offer EDR-Proof Code Execution
6d
S
Nigeria & Romania Ranked Among Top Cybercrime Havens
6d
S
Open Source Tool Looks for Signals in Noisy AWS Cloud Logs
1w
S
Countering Voice Fraud in the Age of AI
1w
S
For Service Accounts, Accountability Is Key to Security
1w
S
Redgate Launches Enterprise Edition of Redgate Monitor
1w
S
Dangerous ICS Malware Targets Orgs in Russia and Ukraine
1w
S
Active Kubernetes RCE Attack Relies on Known OpenMetadata Vulns
1w
S
More →