Based on collaboration and information sharing with Microsoft, we disrupted five state-affiliated malicious actors: two China-affiliated threat actors known as Charcoal Typhoon and Salmon...
Cyber threat actors linked with Hamas have seemingly ceased activity ever since the terrorist attack in Israel on Oct. 7, confounding experts.Combination warfare is...
Microsoft's scheduled Patch Tuesday security update for February includes fixes for two zero-day security vulnerabilities under active attack, plus 71 other flaws across a...
The Raspberry Robin worm is incorporating one-day exploits almost as soon as they're developed, in order to improve on its privilege escalation capabilities. Researchers from...
Hyundai Motor Europe and a California union separately this week revealed they had suffered cyberattacks last month and lost data to the respective threat...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...
What is encryption?
Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting...
Two critical vulnerabilities in Fortinet's FortiSIEM product have been assigned provisional CVSS scores of 10. However, details about the bugs remain scant.What is known...
COMMENTARYOver the past few years, it has become painfully clear that companies in the defense industrial base (DIB) and those providing critical infrastructure are...