Welcome!

Unlock your personalized experience.
Sign Up

Cybersecurity

New Exim BDAT Vulnerability Exposes GnuTLS Builds to...

Exim has released security updates to address a severe security issue affecti...

20 Leaders Who Built the CISO Era: 2 Decades of Change

As part of Dark Reading's 20th anniversary special coverage, we profile the C...

Hugging Face Packages Weaponized With a Single File ...

A tokenizer library file present in Hugging Face AI models can be manipulated...

New TrickMo Variant Uses TON C2 and SOCKS5 to Create...

Cybersecurity researchers have flagged a new version of the TrickMo Android b...

Webinar: What the Riskiest SOC Alerts Go Unanswered ...

Why do the Riskiest SOC Alerts Go Unanswered? Security operations teams are d...

SAP fixes critical vulnerabilities in Commerce Cloud...

SAP has released the May 2026 security updates addressing 15 vulnerabilities ...

Shai Hulud attack ships signed malicious TanStack, M...

Hundreds of packages across npm and PyPI have been compromised in a new Shai-...

Why Agentic AI Is Security's Next Blind Spot

Agentic AI is already running in production environments across many organiza...

OpenAI Launches Daybreak for AI-Powered Vulnerabilit...

OpenAI has launched Daybreak, a new cybersecurity initiative that brings toge...

Instructure Reaches Ransom Agreement with ShinyHunte...

American educational technology company Instructure, the parent company of Ca...

Mini Shai-Hulud Worm Compromises TanStack, Mistral A...

TeamPCP, the threat actor behind the recent supply chain attack spree, has be...

Instructure reaches 'agreement' with ShinyHunters to...

Instructure, the edtech giant behind the widely popular Canvas learning manag...

iOS 26.5 Brings Default End-to-End Encrypted RCS Mes...

Apple on Monday officially released iOS 26.5 with support for end-to-end encr...

GM agrees to $12.75M California settlement over sale...

California Attorney General Rob Bonta announced a proposed $12.75 million set...

Tech Can't Stop These Threats — Your People Can

Security controls can do only so much. Here are four attacks where your emplo...

FCC Softens Ban on Foreign-Made Routers

The Federal Communications Commission eased some restrictions and pushed back...