https://darkreading.com
Dark Reading | Security | Protect The Business
Dark Reading: Connecting The Cybersecurity Community.
Dark Reading | Security | Protect The BusinessTechTarget and Informa Tech’s Digital Business Combine.TechTarget and InformaTechTarget and Informa Tech’s Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.Black Hat NewsOmdia CybersecurityAdvertiseNewsletter Sign-UpNewsletter Sign-UpCybersecurity TopicsRelated TopicsApplication SecurityCybersecurity CareersCloud SecurityCyber RiskCyberattacks & Data BreachesCybersecurity AnalyticsCybersecurity OperationsData PrivacyEndpoint SecurityICS/OT SecurityIdentity & Access Mgmt SecurityInsider ThreatsIoTMobile SecurityPerimeterPhysical SecurityRemote WorkforceThreat IntelligenceVulnerabilities & ThreatsRecent in Cybersecurity TopicsTwo cats playing, or perhaps fightingThreat IntelligenceBlack Basta Goes Dark Amid Infighting, Chat Leaks ShowBlack Basta Goes Dark Amid Infighting, Chat Leaks ShowbyNate Nelson, Contributing WriterFeb 21, 20254 Min ReadA photo of a super typhoon taken from spaceCyber RiskCisco Confirms Salt Typhoon Exploitation in Telecom HitsCisco Confirms Salt Typhoon Exploitation in Telecom HitsbyKristina Beek, Associate Editor, Dark ReadingFeb 21, 20251 Min ReadWorld Related TopicsDR GlobalMiddle East & AfricaAsia PacificSee AllThe EdgeDR TechnologyEventsRelated TopicsUpcoming EventsPodcastsWebinarsSEE ALLResourcesRelated TopicsLibraryNewslettersPodcastsReportsVideosWebinarsWhitepapers Partner PerspectivesSEE ALLCISO CornerSigns Your Organization's Culture Is Hurting Your CybersecurityFeb 20, 2025What Is the Board's Role in Cyber-Risk Management in OT Environments?Feb 19, 2025This Security Firm's 'Bias' Is Also Its SuperpowerFeb 14, 2025Roundtable: Is DOGE Flouting Cybersecurity for US Data?Feb 13, 2025More Articles for CISOsEmbassies on embassy row in washington DCCyber RiskNations Open 'Data Embassies' to Protect Critical InfoNations Open 'Data Embassies' to Protect Critical InfoEstonia and Monaco back up their citizens' information to a data center in Luxembourg, while Singapore looks to India as its safe haven for data. But geopolitical challenges remain.Feb 21, 2025|5 Min ReadGhost floating on ornate stairsCyberattacks & Data BreachesGhost Ransomware Targets Orgs in 70+ CountriesGhost Ransomware Targets Orgs in 70+ CountriesFeb 20, 2025A still from the film "Dracula" (1931), with Bela Lugosi biting the neck of a victimThreat Intelligence'Darcula' Phishing Kit Can Now Impersonate Any Brand'Darcula' Phishing Kit Can Now Impersonate Any BrandFeb 20, 2025Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.SubscribeCyber RiskPODCASTDark Reading Confidential: Quantum Has Landed, So Now What?Episode #4: NIST's new post-quantum cryptography standards are here, so what comes next? This episode of Dark Reading Confidential digs into the world of quantum computing from a cybersecurity practitioner's point of view — with guests Matthew McFadden, vice president, Cyber, General Dynamics Information Technology (GDIT) and Thomas Scanlon, professor, Heinz College, Carnegie Mellon University.LISTEN TO THE EPISODELatest NewsThreat IntelligenceBlack Basta Goes Dark Amid Infighting, Chat Leaks ShowBlack Basta Goes Dark Amid Infighting, Chat Leaks ShowFeb 21, 2025|4 Min ReadbyNate Nelson, Contributing WriterCyber RiskCisco Confirms Salt Typhoon Exploitation in Telecom HitsCisco Confirms Salt Typhoon Exploitation in Telecom HitsFeb 21, 2025|1 Min ReadbyKristina Beek, Associate Editor, Dark ReadingCyber RiskNations Open 'Data Embassies' to Protect Critical InfoNations Open 'Data Embassies' to Protect Critical InfoFeb 21, 2025|5 Min ReadbyRobert Lemos, Contributing WriterCyberattacks & Data BreachesGhost Ransomware Targets Orgs in 70+ CountriesGhost Ransomware Targets Orgs in 70+ CountriesFeb 20, 2025|4 Min ReadbyElizabeth Montalbano, Contributing WriterСloud SecurityGoogle Adds Quantum-Resistant Digital Signatures to Cloud KMSGoogle Adds Quantum-Resistant Digital Signatures to Cloud KMSFeb 20, 2025|4 Min ReadbyJeffrey Schwartz, Contributing WriterThreat Intelligence'Darcula' Phishing Kit Can Now Impersonate Any Brand'Darcula' Phishing Kit Can Now Impersonate Any BrandFeb 20, 2025|4 Min ReadbyNate Nelson, Contributing WriterICS/OT SecurityAustralian Critical Infrastructure Faces 'Acute' Foreign ThreatsAustralian Critical Infrastructure Faces 'Acute' Foreign ThreatsFeb 20, 2025|4 Min ReadbyNate Nelson, Contributing WriterCyber RiskInsight Partners, VC Giant, Falls to Social EngineeringInsight Partners, VC Giant, Falls to Social EngineeringFeb 19, 2025|2 Min ReadbyTara Seals, Managing Editor, News, Dark ReadingMobile SecurityRussian Groups Target Signal Messenger in Spy CampaignRussian Groups Target Signal Messenger in Spy CampaignFeb 19, 2025|4 Min ReadbyJai Vijayan, Contributing WriterRemote WorkforcePatch Now: CISA Warns of Palo Alto Flaw Exploited in the WildPatch Now: CISA Warns of Palo Alto Flaw Exploited in the WildFeb 19, 2025|4 Min ReadbyElizabeth Montalbano, Contributing WriterMore NewsLatest CommentaryPicture of Eyal BenishtiEyal BenishtiCEO & Founder, IRONSCALESVulnerabilities & Threats4 Low-Cost Ways to Defend Your Organization Against DeepfakesFeb 21, 2025|5 Min ReadPicture of Paul UnderwoodPaul UnderwoodVice President of Security, NeoveraCyberattacks & Data BreachesWhen Brand Loyalty Trumps Data SecurityFeb 20, 2025|5 Min ReadPicture of John CusimanoJohn CusimanoVice President, OT Security, ArmexaCyber RiskWhat Is the Board's Role in Cyber-Risk Management in OT Environments?Feb 19, 2025|4 Min ReadPicture of Alena RobertsonAlena RobertsonBSA Manager, Grasshopper BankCyber RiskHow Banks Can Adapt to the Rising Threat of Financial CrimeFeb 14, 2025|4 Min ReadPicture of Chris HendersonChris HendersonSenior Director of Threat Operations, HuntressCyber RiskHow Public & Private Sectors Can Better Align Cyber DefenseFeb 13, 2025|5 Min ReadPicture of Claudio GalloClaudio GalloLead Security Engineer, C4HCOVulnerabilities & ThreatsIs AI a Friend or Foe of Healthcare Security?Feb 12, 2025|5 Min ReadMore CommentaryStartup AlleyRead More Startup LaunchesPR LogoEndpoint SecurityIntroducing enQase for Quantum-Safe SecurityIntroducing enQase for Quantum-Safe SecurityFeb 18, 2025Several rows of toy red robots standing under a cloudy sky.Cybersecurity Operations7AI Streamlines Security Operations With Autonomous AI Agents7AI Streamlines Security Operations With Autonomous AI AgentsFeb 6, 2025A screen full of code with a magnifying glass over it.Vulnerabilities & ThreatsBackline Tackles Enterprise Security Backlogs With AIBackline Tackles Enterprise Security Backlogs With AIFeb 4, 2025Data Suggests It's Time to Rethink Cloud PermissionsExcessive privileges and visibility gaps create a breeding ground for cyber threats.Signs Your Organization's Culture Is Hurting Your CybersecurityHigh turnover, burnout, and blame-heavy environments do more than hurt morale. They also weaken security and put the organization at risk.This Security Firm's 'Bias' Is Also Its SuperpowerCredible Security's founders bring their varied experiences to help growing companies turn trust into a strategic advantage.Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.Go to The EdgeSecurity Technology: Featuring news, news analysis, and commentary on the latest technology trends. Go to DR TechnologyGoogle Adds Quantum-Resistant Digital Signatures to Cloud KMSThe Cloud Key Management Service is part of Google's new road map for implementing the new NIST-based post-quantum cryptography (PQC) standards.Content Credentials Show Promise, but Ecosystem Still YoungWhile AI-generation services and major camera makers are adopting the specification for digitally signed metadata, creating a workflow around the nascent ecosystem is still a challenge.Deepwatch Acquires Dassana to Boost Cyber-Resilience With AIAcquisition strengthens Deepwatch Platform capabilities with actionable insights and risk-based prioritization.Australian Critical Infrastructure Faces 'Acute' Foreign ThreatsThe continent faces "relentless" military espionage, and increased cyber sabotage at the hands of authoritarian regimes, according to a high-ranking intelligence director.North Korea's Kimsuky Taps Trusted Platforms to Attack South KoreaThe campaign heavily uses Dropbox folders and PowerShell scripts to evade detection and quickly scrapped infrastructure components after researchers began poking around.Japan Goes on Offense With New 'Active Cyber Defense' BillJapan is on a mission to catch up to the US standard of national cyber preparedness, and its new legislation is a measure intended to stop escalating Chinese cyber-espionage efforts, experts say.Breaking cybersecurity news, news analysis, commentary, and other content from around the world.Go to DR GlobalPress ReleasesSee allPR LogoСloud SecurityZEST Security's Cloud Risk Exposure Impact Report Reveals 62% of Incidents are Related to Risks Known to the OrganizationZEST Security's Cloud Risk Exposure Impact Report Reveals 62% of Incidents are Related to Risks Known to the OrganizationFeb 20, 20254 Min ReadPR LogoСloud SecurityThrive Acquires Secured Network ServicesThrive Acquires Secured Network ServicesFeb 18, 20252 Min ReadPR LogoCybersecurity OperationsSANS Institute Launches AI Cybersecurity HackathonSANS Institute Launches AI Cybersecurity HackathonFeb 18, 20252 Min ReadPR LogoEndpoint SecurityIntroducing enQase for Quantum-Safe SecurityIntroducing enQase for Quantum-Safe SecurityFeb 18, 20253 Min ReadResourcesWhite PapersFrost Radar: Cloud Security Posture Management, 2024The State of Cloud Native Security Report 2024Secure remote access. Simplified.4 Best Practices for Hybrid Security Policy ManagementUnderstanding Social Engineering Attacks and What To Do About ThemMore WhitepapersEvents[Conference] Black Hat USA - August 2-7 - Learn MoreAug 2, 2025[Conference] Black Hat Asia - April 1-4 - Learn MoreApr 1, 2025[Dark Reading Virtual Event] Cybersecurity's Most Promising New and Emerging TechnologiesMar 20, 2025More EventsWebinarsEmerging Technologies and Their Impact on CISO StrategiesFeb 25, 2025How CISOs Navigate the Regulatory and Compliance MazeFeb 26, 2025Where Does Outsourcing Make Sense for Your Organization?Feb 27, 2025Shift Left: Integrating Security into the Software Development LifecycleMar 5, 2025Boosting Threat Detection w/AI and Machine LearningMar 6, 2025More WebinarsDiscover MoreBlack HatOmdiaWorking With UsAbout UsAdvertiseReprintsJoin UsNewsletter Sign-UpFollow UsCopyright © 2025. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466.Home|Cookie Policy|Privacy|Terms of Use
en
en
1740351841
https://darkreading.com
Modifier votre site ?
Que fais-tu?