Downgrade Attack Allows Phishing Kits to Bypass FIDO – Dark Reading
You probably can’t break FIDO authentication. Still, researchers have shown that there are ways to get around it. – Read More
You probably can’t break FIDO authentication. Still, researchers have shown that there are ways to get around it. – Read More
Federal funding cuts to the Multi-State Information Sharing and Analysis Center (MS-ISAC) are about to leave more than 18,000 state and local organizations without access to basic cybersecurity resources they…
Organizations increasingly use agents to automate mundane tasks and address an overwhelming amount of sensitive data. However, adoption requires strict security strategies that keep humans in the loop for now.…
In this Dark Reading News Desk interview, Google’s Mark Berschadski highlights the critical role browsers play in today’s work environment and how Chrome Enterprise is evolving to meet modern security…
Cybercriminals are auctioning off live email credentials, giving other criminals access to sensitive systems, confidential intelligence, and, potentially, a higher success rate than ever. – Read More
The US National Institute of Standards and Technology updated its Digital Identity Guidelines to match current threats. The document detailed technical recommendations as well as suggestions for organizations. – Read…
Two critical N-able vulnerabilities enable local code execution and command injection; they require authentication to exploit, suggesting they wouldn’t be seen at the beginning of an exploit chain. – Read…
Security budgets are lowest in healthcare, professional and business services, retail, and hospitality, but budget growth remained above 5% in financial services, insurance, and tech. – Read More
Dark Reading’s Terry Sweeney and Google’s Loren Hudziak discuss how the humble web browser has transformed from a simple web access tool into a common conduit through which a lot…
Multiple HTTP/2 implementations have been found susceptible to a new attack technique called MadeYouReset that could be explored to conduct powerful denial-of-service (DoS) attacks. “MadeYouReset bypasses the typical server-imposed limit…
New UCAS data The number of students accepted onto university and college law courses has surged by over 10% this year, according to fresh UCAS data released on A-Level results…
Two now-patched critical flaws in Grafana’s plugin architecture could let attackers take full control of an organization’s observability instance. Grafana is a widely used DevOps observability platform for visualizing metrics,…
Companies ready to move beyond reactive defense and toward full-spectrum protection need to invest in strategies that rally around resiliency, unified cybersecurity, and data protection. – Read More
Japan’s CERT coordination center (JPCERT/CC) on Thursday revealed it observed incidents that involved the use of a command-and-control (C2) framework called CrossC2, which is designed to extend the functionality of…
By Robert Taylor, CEO and General Counsel at Legal Futures Associate 360 Law Services In April 2025, the UK Supreme Court handed down a landmark judgment in For Women Scotland…