Latest World News

Meta AI Models Cracked Open With Exposed API Tokens
Meta AI Models Cracked Open With Exposed API Tokens
Researchers at Lasso Security found 1,500+ tokens in total that gave them varying levels of access to LLM repositories at Google, Microsoft, VMware, and some 720 other organizations.
Latest Commentary
CTO & Co-Founder, SecurityBridge
Chief Security Officer, WatchGuard Technologies
Deep Reading
See More Dark Reading ResearchCome up with a clever cybersecurity-related caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
These office giving-friendly fidgets, stress balls, brain teasers, and more are perfect to calm the most harried cybersecurity professionals.
Stay away from using these tactics when trying to educate employees about risk.
Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.
Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.
Cybersecurity analysts use playbooks as a guide to quickly investigate and respond to incidents, but regularly neglect to keep the process documents up to date.
An ESA cybersecurity expert explains how space-based data and services benefit from public investment in space programs.
Amazon Web Services announced enhancements to several of its security tools, including GuardDuty, Inspector, Detective, IAM Access Analyzer, and Secrets Manager, to name a few during its re:Invent event.
Multiple agencies warn that attackers have been active since Nov. 22, targeting operational technology (OT) across the US.
The agency, known as JAXA, has shut down parts of its network as it conducts an investigation to discover the scope and impact of the breach.
UAE security leaders warn that people, tech, and process gaps are exposing their organizations to cybercrime.
Breaking cybersecurity news, news analysis, commentary, and other content from around the world.
Partner Perspectives
More Partner PerspectivesPress Releases
See allHacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023