darkreading.com

DARPA Highlights Critical Infrastructure Security Chall...

Leaders at federal research organizations DARPA, ARPA-I, and ARPA-H discussed th...

Many Fuel Tank Monitoring Systems Vulnerable to Disruption

Thousands of automatic tank gauge (ATG) devices are accessible over the Internet...

From Mission-Centric to People-Centric: Competitive Lea...

Making a case for empathy in cyber-leadership roles as a strategic business adva...

Hacking in Space: Not as Tough as You Might Think

Barbara Grofe, space asset security architect at Spartan Corp, discussed the rea...

US Critical Infrastructure Still Struggles With OT Secu...

How does a company defend itself from cyberattacks by a foreign adversary? A col...

Windows Backdoor Targets Members of Exiled Uyghur Commu...

A spear-phishing campaign sent Trojanized versions of legitimate word-processing...

Risks of Using AI Models Developed by Competing Nations

The current offline/open source model boom is unstoppable. Its impact depends on...

Vulnerability Exploitation Is Shifting in 2024-25

The number of vulnerabilities exploited by attacks may not be growing these days...

SAP NetWeaver Visual Composer Flaw Under Active Exploit...

CVE-2025-31324 is a maximum severity bug that attackers exploited weeks before S...

AI, Automation, and Dark Web Fuel Evolving Threat Lands...

Attackers are leveraging the benefits of new technology and the availability of ...

DoJ Data Security Program Highlights Data Sharing Chall...

The Department of Justice announced compliance rules for the Data Security Progr...

Forget the Stack; Focus on Control

Security teams are under more pressure than ever — and cybersecurity debt is add...

Mobile Applications: A Cesspool of Security Issues

An analysis of more than a half-million mobile apps find encryption problems, pr...

How Organizations Can Leverage Cyber Insurance Effectively

By focusing on prevention, education, and risk transfer through insurance, organ...

Phishing Kit Darcula Gets Lethal AI Upgrade

Recently added artificial intelligence capabilities on the Chinese-language Darc...

Vehicles Face 45% More Attacks, 4 Times More Hackers

Two kinds of attacks are in high gear: ransomware attacks against OEMs and compr...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.