Looking Back, Looking Forward: Digesting a Dynamic Bouillabaisse of Cyber Evolution
Dark Reading editors reflect on two decades of dramatic change — from perimeter defense to assume-breach strategies — and warn…
Dark Reading editors reflect on two decades of dramatic change — from perimeter defense to assume-breach strategies — and warn…
In February 2026, a phishing-as-a-service (PhaaS) platform called EvilTokens went live. Within five weeks, it had compromised more than 340…
Drupal has issued an alert stating that it intends to release a “core security release” for all supported branches on…
Critical security vulnerabilities have been disclosed in SEPPMail Secure E-Mail Gateway, an enterprise-grade email security solution, that could be exploited…
Cybersecurity researchers have flagged a compromised version of the Nx Console extension that was published to the Microsoft Visual Studio…
You now have five important reasons to start a router security conversation with your small business clients this week, especially…
In yet another software supply chain attack, threat actors have compromised the popular GitHub Actions workflow, actions-cool/issues-helper, to run malicious…
Cybersecurity researchers have discovered a fresh software supply chain attack campaign that has compromised various npm packages associated with the…
Understanding AI BOMs and where they fit into risk management for artificial intelligence.
CVE-2026-42897 stems from a cross-site scripting (XSS) vulnerability and can allow an attacker to compromise Outlook Web Access (OWA) mailboxes.