Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...
IT teams play a critical role in upholding operational integrity within enterprises amidst rapid technological change. However, they face many obstacles that could prevent...
COMMENTARYRecent headlines around Volt Typhoon, a state-sponsored Chinese threat actor targeting US critical infrastructure, have caused alarm over attacker dwell time and put critical infrastructure security in...
Two critical security vulnerabilities in the Hugging Face AI platform opened the door to attackers looking to access and alter customer data and models.One...
With the US presidential election looming, China is stepping up its disinformation game with increased use of AI, Microsoft's Threat Analysis Center (MTAC) reports.
MTAC...
Attackers can exploit a critical SQL injection vulnerability found in a widely used WordPress plug-in to compromise more than 1 million sites and extract...
Microsoft announced several new capabilities in Azure AI Studio that the company says should help developers build generative AI apps that are more reliable...
K-12 leaders tasked with preparing students for the future workforce are doing so amid ever-increasing cyber threats. The dynamic landscape of in-person, virtual and...
As expected, cyberattackers have pounced on a critical remote code execution (RCE) vulnerability in the Fortinet Enterprise Management Server (EMS) that was patched last...
COMMENTARYHacking is a phenomenon that has been around since at least the 1960s, initially as an exploration into computing more broadly, fueled by the...
An unidentified group of threat actors orchestrated a sophisticated supply chain cyberattack on members of the Top.gg GitHub organization as well as individual developers...
The United Nations (UN) Security Council has released a report showing North Korea earns 50% of its foreign exchange earnings from cyberattacks.
The council is...