Cybersecurity industry visionary and renowned executive Amit Yoran has passed away after an almost one-year battle with cancer. Go to Source Author: Dark Reading Staff
Category Archives: Uncategorized
These latest attacks follow a long string of cyberattacks and breaches targeting US and global telecom and ISP companies. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
A fake Telegram Premium app delivers information-stealing malware, in a prime example of the rising threat of adversaries leveraging everyday applications, researchers say. Go to Source Author: Becky Bracken, Senior Editor, Dark Reading
The malware, operated by China-backed cyberattackers, has been significantly fortified with new evasive and post-infection capabilities. Go to Source Author: Elizabeth Montalbano, Contributing Writer
New security regulations are more than compliance hurdles — they’re opportunities to build better products, restore trust, and lead the next chapter of innovation. Go to Source Author: Carsten Rhod Gregersen
The Indian government has published a draft version of the Digital Personal Data Protection (DPDP) Rules for public consultation. “Data fiduciaries must provide clear and accessible information about how personal data is processed, enabling informed consent,” India’s Press Information Bureau (PIB) said in a statement released Sunday. “Citizens are empowered with rights to demand data […]
Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for attackers. The line between convenience and vulnerability has never been thinner. This week, we dive […]
In 2024, cyber threats targeting SaaS surged, with 7,000 password attacks blocked per second (just in Entra ID)—a 75% increase from last year—and phishing attempts up by 58%, causing $3.5 billion in losses (source: Microsoft Digital Defense Report 2024). SaaS attacks are increasing, with hackers often evading detection through legitimate usage patterns. The cyber threat […]
An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram messaging app to steal data and maintain persistent remote control over compromised devices. “Disguised as a fake ‘Telegram Premium’ app, it is distributed through a GitHub.io-hosted phishing site that impersonates RuStore – a popular app store in […]
Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic Foundation’s Hardhat tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers have infiltrated these platforms through malicious npm packages, exfiltrating critical data such as private keys, mnemonics, Go […]
