Latest World News

Google Patches Another Chrome Zero-Day as Browser Attacks Mount
Google Patches Another Chrome Zero-Day as Browser Attacks Mount
The vulnerability is among a rapidly growing number of zero-day bugs that major browser vendors have reported recently.
Latest Commentary
Principal Product Manager, Arkose Labs
VP Security Strategy & Threat Intelligence
Deep Reading
See More Dark Reading ResearchOffice giving-friendly fidgets, stress balls, brain teasers, and more that are perfect to calm the most harried cybersecurity professionals.
Stay away from using these tactics when trying to educate employees about risk.
Researchers used machine learning to analyze Hungarian media reports and found Russian narratives soured the nation's perspective on EU sanctions and arms deliveries months before the Ukraine invasion.
Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.
Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.
IBM joins CrowdStrike and Microsoft in releasing AI models to cloud-native SIEM platforms.
Understanding the risks of generative AI and the specific defenses to build to mitigate those risks is vital for effective business and public use of GenAI.
Initial access brokers (IABs) are often difficult to track. This Tech Tip spells out some countermeasures enterprises need to defend against stolen credentials.
Black Hat speaker and 13-year-old ethical hacker Marco Liberale talks about his interest in cybersecurity, and what opportunities he has in Saudi Arabia.
Organizations from the Middle East and Africa have typically escaped public ransoms, but that's changing amid heightened geopolitical conflicts and digitalization initiatives.
All African nations saw a reduced number of cyberattacks on industrial and IoT systems in the third quarter of 2023 compared with earlier this year.
Breaking cybersecurity news, news analysis, commentary, and other content from around the world.
Partner Perspectives
More Partner PerspectivesPress Releases
See allHacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023