darkreading.com

Gig Worker Platforms at Risk for Data Breaches, Fraud, ...

Fraudsters are targeting high-turnover workforces and compromising accounts that...

'SessionShark' ToolKit Evades Microsoft Office 365 MFA

The creators of the toolkit are advertising it as an educational and ethical res...

Max-Severity Commvault Bug Alarms Researchers

Though already patched, the vulnerability is especially problematic because of t...

NFC-Powered Android Malware Enables Instant Cash-Outs

Researchers at security vendor Cleafy detailed a malware known as "SuperCard X" ...

FBI: Cybercrime Losses Rocket to $16.6B in 2024

The losses are 33% higher than the year before, with phishing leading the way as...

Navigating Regulatory Shifts & AI Risks

By proactively embracing emerging trends around encryption, AI security, and pla...

Attackers Capitalize on Mistakes to Target Schools

Verizon's 2025 Data Breach Investigations Report highlighted dire — but not new ...

'Industrial-Scale' Asian Scam Centers Expand Globally

The convergence of cybercrime, financial fraud, and organized crime poses a sign...

Ransomware Gangs Innovate With New Affiliate Models

Secureworks research shows two ransomware operators offering multiple business m...

Microsoft Claims Steady Progress Revamping Security Cul...

In the latest Secure Future Initiative Progress Report, Microsoft described effo...

North Korean Operatives Use Deepfakes in IT Job Interviews

Use of synthetic identities by malicious employment candidates is yet another wa...

Popular British Retailer Marks & Spencer Addresses ...

M&S has launched an investigation and said some customer operations are impacted.

Japan Warns on Unauthorized Stock Trading via Stolen Cr...

Attackers are using credentials stolen via phishing websites that purport to be ...

Kubernetes Pods Are Inheriting Too Many Permissions

Scalable, effective — and best of all, free — securing Kubernetes workload iden...

The Foundations of a Resilient Cyber Workforce

In a world where insider threats, nation-state adversaries, and technological ev...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.