In a recent revelation that has sent ripples through the cybersecurity community, APT41, a …
Cyber threat landscape
-
-
AI in CybersecurityAI in Software DevelopmentIT security
3 Severe Bugs Patched in Versa’s Concerto Orchestrator
by Samantha Rowland 2 minutes readIn the realm of software development and IT security, the recent discovery of three …
-
AI in CybersecurityGlobal Security
Asia Produces More APT Actors, As Focus Expands Globally
by David Chenby David Chen 2 minutes readIn the ever-evolving landscape of cybersecurity, Asia has emerged as a prominent player in …
-
AI in CybersecurityContainerizationRetail Technology
Docker Launches Hardened Images, Intensifying Secure Container Market
by Nia Walkerby Nia Walker 2 minutes readDocker, a trailblazer in the containerization realm, has recently upped the ante in the …
-
AI in CybersecurityBiotechnologyInformation TechnologyMobile Devices
Endpoint Security Controls: Designing a Secure Endpoint Architecture, Part 1
by Lila Hernandez 3 minutes readEndpoint Security Controls: Designing a Secure Endpoint Architecture, Part 1 In today’s digital landscape, …
-
3D Modeling Software3D printing technologyAI in Cybersecurity
Google patches Chrome vulnerability used for account takeover and MFA bypass
by Nia Walkerby Nia Walker 2 minutes readTitle: Google Swiftly Patches Chrome Vulnerability Threatening Account Security Google recently took swift action …
-
Cybersecurity in Retail
Critical SAP NetWeaver Vuln Faces Barrage of Cyberattacks
by Nia Walkerby Nia Walker 2 minutes readIn the dynamic realm of cybersecurity, the relentless pursuit of vulnerabilities by threat actors …
-
AI in Cybersecurity
Cyber Then & Now: Inside a 2-Decade Industry Evolution
by Priya Kapoorby Priya Kapoor 2 minutes readThe Evolution of Cybersecurity: A 20-Year Journey As we reflect on Dark Reading’s 19-year …
-
AI in CybersecurityAI-Powered Security SolutionsCybersecurity Risk Management
Security Tools Alone Don’t Protect You — Control Effectiveness Does
by Priya Kapoorby Priya Kapoor 2 minutes readSecurity Tools Alone Don’t Protect You — Control Effectiveness Does In the ever-evolving landscape …
-
3D printing technologyAI in CybersecurityAI startups
Experts Share: How Should Startups Protect Their Data In 2025?
by Jamal Richaqrds 2 minutes readSafeguarding Your Startup’s Future: Expert Advice on Data Protection in 2025 As we step …