New ‘Shade BIOS’ Technique Beats Every Kind of Security – Dark Reading
What if malware didn’t require an operating system to function? How would anyone possibly notice, let alone disable it? – Read More
What if malware didn’t require an operating system to function? How would anyone possibly notice, let alone disable it? – Read More
ISC2 is launching a 6-course certification program to address the growing demand for AI security expertise. Courses cover topics such as AI fundamentals, ethics, and risks. – Read More
The SIEM market is at a pivotal point as XDR platforms and generative AI shake up the security analytics space. – Read More
Thorium enhances cybersecurity teams’ defense capabilities by seamlessly integrating commercial, open-source, and custom tools used to analyze malware. – Read More
Forget gullible old people — Gen Z is the most at-risk age group on the Web. Older folks might want to ignore it, but employers are likely to feel the…
The fall of RansomHub led to a major consolidation of the ransomware ecosystem last quarter, which was a boon for the DragonForce and Qilin gangs. – Read More
The ransomware gang claims to have stolen 3.5TB of data, and told the technology distributor to pay up or suffer a data breach. – Read More
To reposition cybersecurity as a strategic, business-critical investment, CFOs and CISOs play a critical role in articulating the significant ROI that robust security measures can deliver. – Read More
An ongoing AitM campaign by the infamous Moscow-sponsored cyber-threat actor has widened its scope, dropping the dangerous ApolloShadow custom backdoor malware thanks to lawful intercept systems. – Read More
Following a number of high-profile security and development issues surrounding the use of LLMs and GenAI to code and create applications, it’s worth taking a temperature check to ask: Is…
The lesson from the breach is not just about what went wrong — but what could have gone right. – Read More
Dark Reading Confidential Episode 8: Federal funding for the CVE Program expires in April 2026, and a trio of experts agree the industry isn’t doing enough to deal with the…
Using the API Connections for Azure Logic Apps, a security researcher found unauthenticated users could access sensitive data of other customers. – Read More
A swath of copycat Korean apps are hiding spyware, occasionally leading to highly personal, disturbing extortions. – Read More
Attackers are becoming faster at exploiting vulnerabilities, but this startup seeks to stop threats before they lead to breaches. – Read More