Latest World News

Proxy Trojan Targets macOS Users for Traffic Redirection
Proxy Trojan Targets macOS Users for Traffic Redirection
Apple users who end up with the Trojan on their machines face a number of bad outcomes, including potential criminal liability.
Latest Commentary
DFIR Expert Evangelist, CYGNVS
Senior Manager, Threat Intelligence, Netscout
OT Cybersecurity Strategist, Nozomi Networks
Deep Reading
See More Dark Reading ResearchInstead of fighting workarounds that compromise security, a human-centered system fixes the process issues that prompt people to work dangerously.
Come up with a clever cybersecurity-related caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
These office giving-friendly fidgets, stress balls, brain teasers, and more are perfect to calm the most harried cybersecurity professionals.
Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.
Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.
The Dragos Community Defense Program provides small water, gas, and electric utilities with access to the Dragos Platform, training resources, and threat intelligence.
Cybersecurity analysts use playbooks as a guide to quickly investigate and respond to incidents, but they regularly neglect to keep the process documents up to date.
An ESA cybersecurity expert explains how space-based data and services benefit from public investment in space programs.
State-sponsored actors continue to exploit CVE-2023-23397, a dangerous no-interaction vulnerability in Microsoft's Outlook email client that was patched in March, in a widespread global campaign.
Privacy concerns see the proposed digital identity system paused until February.
New techniques in a second variant of the malware improved functionality and communication commands.
Breaking cybersecurity news, news analysis, commentary, and other content from around the world.
Partner Perspectives
More Partner PerspectivesPress Releases
See all9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
2022 Insurance Industry Cyber Threat Landscape Report
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023What's In Your Cloud?
Nov 30, 2023Everything You Need to Know About DNS Attacks
Nov 30, 2023