Latest World News

Critical 'LogoFAIL' Bugs Offer Secure Boot Bypass for Millions of PCs
Critical 'LogoFAIL' Bugs Offer Secure Boot Bypass for Millions of PCs
Hundreds of consumer and enterprise-grade x86 and ARM models from various vendors, including Intel, Acer, and Lenovo, are potentially vulnerable to bootkits and takeover.
Latest Commentary
CTO & Co-Founder, SecurityBridge
Chief Security Officer, WatchGuard Technologies
Deep Reading
See More Dark Reading ResearchThese office giving-friendly fidgets, stress balls, brain teasers, and more are perfect to calm the most harried cybersecurity professionals.
Stay away from using these tactics when trying to educate employees about risk.
Researchers used machine learning to analyze Hungarian media reports and found Russian narratives soured the nation's perspective on EU sanctions and arms deliveries months before the Ukraine invasion.
Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.
Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.
An ESA cybersecurity expert explains how space-based data and services benefit from public investment in space programs.
The collaboration focuses on helping security teams detect and address cloud threats more effectively.
Amazon Web Services announced enhancements to several of its security tools, including GuardDuty, Inspector, Detective, IAM Access Analyzer, and Secrets Manager, to name a few during its re:Invent event.
The agency, known as JAXA, has shut down parts of its network as it conducts an investigation to discover the scope and impact of the breach.
UAE security leaders warn that people, tech, and process gaps are exposing their organizations to cybercrime.
Saudi companies are seeking extra help in droves, because of a lack of tools and personnel.
Breaking cybersecurity news, news analysis, commentary, and other content from around the world.
Partner Perspectives
More Partner PerspectivesPress Releases
See allHacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023