Latest World News

Feds Seize 'Sinbad' Crypto Mixer Used by North Korea's Lazarus
Feds Seize 'Sinbad' Crypto Mixer Used by North Korea's Lazarus
The prolific threat actor has laundered hundreds of millions of dollars in stolen virtual currency through the service.
Latest Commentary
Chief Security Officer, WatchGuard Technologies
Principal Product Manager, Arkose Labs
Deep Reading
See More Dark Reading ResearchOffice giving-friendly fidgets, stress balls, brain teasers, and more that are perfect to calm the most harried cybersecurity professionals.
Stay away from using these tactics when trying to educate employees about risk.
Researchers used machine learning to analyze Hungarian media reports and found Russian narratives soured the nation's perspective on EU sanctions and arms deliveries months before the Ukraine invasion.
Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.
Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.
IBM joins CrowdStrike and Microsoft in releasing AI models to cloud-native SIEM platforms.
Understanding the risks of generative AI and the specific defenses to build to mitigate those risks is vital for effective business and public use of GenAI.
Initial access brokers (IABs) are often difficult to track. This Tech Tip spells out some countermeasures enterprises need to defend against stolen credentials.
No Iranian bank customers are safe from financially motivated cybercriminals wielding convincing but fake mobile apps.
Black Hat speaker and 13-year-old ethical hacker Marco Liberale talks about his interest in cybersecurity, and what opportunities he has in Saudi Arabia.
Organizations from the Middle East and Africa have typically escaped public ransoms, but that's changing amid heightened geopolitical conflicts and digitalization initiatives.
Breaking cybersecurity news, news analysis, commentary, and other content from around the world.
Partner Perspectives
More Partner PerspectivesPress Releases
See all9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
Build a Case for a Password Manager
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023