Researchers discovered seven vulnerabilities — including an unauthenticated RCE issue — in widely deployed Telit Cinterion ...
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for its tool ...
Enterprises are increasingly recognizing that the CISO's skills and experience building risk-based cyber programs translate ...
CISA's Secure by Design pledge consists of areas of improvement split into seven primary categories: multi-factor ...
The attack cut off access to electronic healthcare records (EHRs) and ordering systems, plunging the organization and its ...
Our brand-new podcast, Dark Reading Confidential, has officially launched. You don't want to miss our first episode with the ...
So, what do you do when you've been breached? Here are four steps security leaders can take to minimize the damage. First and ...
New regulations require companies to turn over incident data to CISA within 3 days or face enforcement. Here's how the agency ...
RSA CONFERENCE 2024 – San Francisco – Everyone's talking about deepfakes, but the majority of AI-generated synthetic media ...
Researchers recently spotted the Spanish-speaking threat actor —with nearly 400 previous victims under its belt — in a new ...
F5 customers should patch immediately, though even that won't protect them from every problem with their networked devices.
Attacks lasting 90 minutes increased by 22%. This attack duration now makes up 81% of all DDoS attacks, while the most prolonged attacks spanning over 1200+ minutes saw a steep 95% reduction.