Mideast & Africa News
Fujitsu: Malware on Company Computers Exposed Customer Data
Fujitsu: Malware on Company Computers Exposed Customer Data
It remains unclear how long the IT services giant's systems were infiltrated and just how the cyberattack unfolded.
Latest Commentary
Co-Founder & CEO, Entro Security
Chief Information Security Officer, IBS Software
Deputy CISO, Centene Corporation
Chief Innovation Officer, DataTribe
Deputy CISO, Centene Corporation
Deep Reading
See More Dark Reading ResearchCISOs must build out a security data management and security data architecture to get the most out of their security data for the least amount of investment.
With the final switchover to the latest version of the credit card standard, here's what all security professionals can draw from the changes.
How lava lamps, pendulums, and suspended rainbows keep the Internet safe.
Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.
Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.
Just because Google has put in the work to quantum-proof Chrome doesn't mean post-quantum security is all set.
Rushing to onboard artificial intelligence, companies and their developers are downloading a variety of pretrained machine learning models, but verifying security and integrity remains a challenge.
CISA and OpenSSF jointly published new guidance recommending technical controls to make it harder for developers to bring malicious software components into code.
Kimsuky-attributed campaign uses eight steps to compromise systems — from initial execution to downloading additional code from Dropbox, and executing code to establish stealth and persistence.
Interpol assisted in the operation, in which analysts identified Grandoreiro group members by analyzing and matching malware samples.
LockBit ransomware gang claims 668GB of data it dumped online was stolen from South Africa's pension agency.
Breaking cybersecurity news, news analysis, commentary, and other content from around the world.
Partner Perspectives
More Partner PerspectivesPress Releases
See allIncident Response Planning Guide
FortiSASE Customer Success Stories - The Benefits of Single Vendor SASE
Fortinet Named a Leader in the Forrester Wave: Zero Trust Edge (ZTE) Solutions
2023 Gartner Magic Quadrant for Single-Vendor SASE
The Forrester Wave: External Threat Intelligence Service Providers, Q3 2023
Unleash the Power of Gen AI for Application Development, Securely
March 19, 2024The Anatomy of a Ransomware Attack, Revealed
March 20, 2024How To Optimize and Accelerate Cybersecurity Initiatives for Your Business
March 26, 2024Building a Modern Endpoint Strategy for 2024 and Beyond
March 27, 2024Building a Modern Endpoint Strategy for 2024 and Beyond
March 27, 2024