Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

Dark Reading Confidential: Meet the Ransomware Negotiators

Episode 2: Incident response experts-turned-ransomware negotiators Ed Dubrovsky, COO and managing partner of CYPFER, and Joe Tarraf, chief delivery officer of Surefire Cyber, explain how they interact with cyber threat actors who hold victim organizations' systems and data for ransom. Among their fascinating stories: how they negotiated with cybercriminals to restore operations in a hospital NICU where lives were at stake, and how they helped a church, where the attackers themselves "got a little religion."

Latest News

More News
Shocked, Devastated, Stuck: Cybersecurity Pros Open Up About Their Layoffs

Here's a dose of reality from those on the frontlines and how they're coping.

CSA Updates Cloud Security Certificate, Training

The latest version of the Cloud Security Alliance's certification provides a comprehensive catalog of essential skills that cybersecurity professionals need to master.

Training at Black Hat to Focus on Equipping Cybersecurity Leaders With Soft Skills

A two-day presentation will examine the social-behavioral aspects of cybersecurity leadership to drive team success.

Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.

Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.

Linx Security Launches With Identity Management Platform

The Israeli security startup's technology helps organizations map existing accounts and credentials to existing employees to identify those that should be removed.

Tech Giants Agree to Standardize AI Security

The Coalition for Secure AI is a consortium of influential AI companies aiming to develop tools to secure AI applications and set up an ecosystem for sharing best practices.

CISA Publishes Resiliency Playbook for Critical Infrastructure

The manual provides guidance on how to improve the resiliency of critical infrastructure.

Russia Adjusts Cyber Strategy for the Long Haul in War With Ukraine

Russia has cast aside its focus on civilian infrastructures and is instead targeting Ukraine's military operations in myriad ways.

China's 'Evasive Panda' APT Spies on Taiwan Targets Across Platforms

The cohort's variety of individual tools covers just about any operating system it could possibly wish to attack.

Under-Resourced Maintainers Pose Risk to Africa's Open Source Push

Many nations see open source software as a great equalizer, giving the Global South the tools necessary for sustainable development. But recent supply chain attacks highlight the need for security.

Breaking cybersecurity news, news analysis, commentary, and other content from around the world.