Cyberattacks & Data Breaches recent news | Dark Reading (original) (raw)
TechTarget and Informa Tech’s Digital Business Combine.TechTarget and Informa
TechTarget and Informa Tech’s Digital Business Combine.
Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.
Black Hat NewsOmdia CybersecurityAdvertise
Cybersecurity Topics
Related Topics
- Application Security
- Cybersecurity Careers
- Cloud Security
- Cyber Risk
- Cyberattacks & Data Breaches
- Cybersecurity Analytics
- Cybersecurity Operations
- Data Privacy
- Endpoint Security
- ICS/OT Security
- Identity & Access Mgmt Security
- Insider Threats
- IoT
- Mobile Security
- Perimeter
- Physical Security
- Remote Workforce
- Threat Intelligence
- Vulnerabilities & Threats
World
Related Topics
Events
Related Topics
Resources
Related Topics
ten dollar bill closeup of US Treasury Building
Chinese State Hackers Breach US Treasury DepartmentChinese State Hackers Breach US Treasury Department
In what's being called a "major cybersecurity incident," Beijing-backed adversaries broke into cyber vendor BeyondTrust to access the US Department of the Treasury workstations and steal unclassified data, according to a letter sent to lawmakers.
byBecky Bracken, Senior Editor, Dark Reading
Dec 30, 2024
|
1 Min Read
A face swap deepfake in video edit
Deepfakes, Quantum Attacks Loom Over APAC in 2025Deepfakes, Quantum Attacks Loom Over APAC in 2025
byJai Vijayan, Contributing Writer
Dec 30, 2024
1 Min Read
Water pipes, valves, and manometers inside a home
Hackers Are Hot for Water UtilitiesHackers Are Hot for Water Utilities
byKelly Jackson Higgins, Editor-in-Chief, Dark Reading
Dec 27, 2024
1 Min Read
A chart showing which industry sectors filed SEC disclosure reports
SEC Disclosures Up, But Not Enough Details ProvidedSEC Disclosures Up, But Not Enough Details Provided
Dec 26, 2024
1 Min Read
Binary code in blue and orange colors
Emerging Threats & Vulnerabilities to Prepare for in 2025Emerging Threats & Vulnerabilities to Prepare for in 2025
byKristina Beek, Associate Editor, Dark Reading
Dec 26, 2024
1 Min Read
DDoS Attacks Surge as Africa Expands Its Digital FootprintDDoS Attacks Surge as Africa Expands Its Digital Footprint
byJai Vijayan, Contributing Writer
Dec 26, 2024
1 Min Read
Too Much 'Trust,' Not Enough 'Verify'
Too Much 'Trust,' Not Enough 'Verify'
Dec 24, 2024
|
1 Min Read
by
Non-Human Identities Gain Momentum, Requires Both Management, Security
Non-Human Identities Gain Momentum, Requires Both Management, Security
Dec 23, 2024
|
1 Min Read
byDon Tait, Senior Analyst, Omdia
Middle East Cyberwar Rages On, With No End in Sight
Middle East Cyberwar Rages On, With No End in Sight
Dec 23, 2024
|
1 Min Read
byKristina Beek, Associate Editor, Dark Reading
Name That Toon: Sneaking Around
Name That Toon: Sneaking Around
Dec 23, 2024
|
1 Min Read
byJohn Klossner, Cartoonist
LockBit Ransomware Developer Arrested in Israel
LockBit Ransomware Developer Arrested in Israel
Dec 20, 2024
|
1 Min Read
byBecky Bracken, Senior Editor, Dark Reading
How Nation-State Cybercriminals Are Targeting the Enterprise
How Nation-State Cybercriminals Are Targeting the Enterprise
Dec 20, 2024
|
1 Min Read
byAdam Finkelstein, Senior Vice President of Global Client Leadership, Sygnia
Malvertisers Fool Google With AI-Generated Decoy Content
Malvertisers Fool Google With AI-Generated Decoy Content
Dec 19, 2024
|
1 Min Read
byJai Vijayan, Contributing Writer
CISA Releases Draft of National Cyber Incident Response Plan
CISA Releases Draft of National Cyber Incident Response Plan
Dec 19, 2024
|
1 Min Read
byJennifer Lawinski, Contributing Writer
Supply Chain Risk Mitigation Must Be a Priority in 2025
Supply Chain Risk Mitigation Must Be a Priority in 2025
Dec 19, 2024
|
1 Min Read
byRob T. Lee, Chief of Research & Head of Faculty, SANS Institute
Interpol: Can We Drop the Term 'Pig Butchering'?
Interpol: Can We Drop the Term 'Pig Butchering?'
Dec 18, 2024
|
1 Min Read
byBecky Bracken, Senior Editor, Dark Reading
Phishers Spoof Google Calendar Invites in Fast-Spreading, Global Campaign
Phishers Spoof Google Calendar Invites in Fast-Spreading Campaign
Dec 18, 2024
|
1 Min Read
byElizabeth Montalbano, Contributing Writer
Manufacturers Lose Azure Creds to HubSpot Phishing Attack
Manufacturers Lose Azure Creds to HubSpot Phishing Attack
Dec 18, 2024
|
1 Min Read
byNate Nelson, Contributing Writer
Wallarm Releases API Honeypot Report Highlighting API Attack Trends
Wallarm Releases API Honeypot Report Highlighting API Attack Trends
Dec 18, 2024
|
1 Min Read
Thai Police Systems Under Fire From 'Yokai' Backdoor
Thai Police Systems Under Fire From 'Yokai' Backdoor
Dec 18, 2024
|
1 Min Read
byNate Nelson, Contributing Writer
Texas Tech Fumbles Medical Data in Massive Breach
Texas Tech Fumbles Medical Data in Massive Breach
Dec 17, 2024
|
1 Min Read
byTara Seals, Managing Editor, News, Dark Reading
Azure Data Factory Bugs Expose Cloud Infrastructure
Azure Data Factory Bugs Expose Cloud Infrastructure
Dec 17, 2024
|
1 Min Read
byElizabeth Montalbano, Contributing Writer
The Education Industry: Why Its Data Must Be Protected
The Education Industry: Why Its Data Must Be Protected
Dec 16, 2024
|
1 Min Read
by Vichai Levy, Vice President of R&D, Overseeing Architecture, Protegrity
Microsoft Teams Vishing Spreads DarkGate RAT
Microsoft Teams Vishing Spreads DarkGate RAT
Dec 16, 2024
|
1 Min Read
byElizabeth Montalbano, Contributing Writer
Cleo MFT Zero-Day Exploits Are About to Escalate, Analysts Warn
Cleo MFT Zero-Day Exploits Are About to Escalate
Dec 13, 2024
|
1 Min Read
byBecky Bracken, Senior Editor, Dark Reading
'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks
'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks
Dec 13, 2024
|
1 Min Read
byTara Seals, Managing Editor, News, Dark Reading
Chinese Cops Caught Using Android Spyware to Track Mobile Devices
Chinese Cops Caught Using Android Spyware to Track Mobile Devices
Dec 12, 2024
|
1 Min Read
byBecky Bracken, Senior Editor, Dark Reading
IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack
IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack
Dec 12, 2024
|
1 Min Read
byBecky Bracken, Senior Editor, Dark Reading
Europol Cracks Down on Holiday DDoS Attacks
Europol Cracks Down on Holiday DDoS Attacks
Dec 12, 2024
|
1 Min Read
byKristina Beek, Associate Editor, Dark Reading
Cultivating a Hacker Mindset in Cybersecurity Defense
Cultivating a Hacker Mindset in Cybersecurity Defense
Dec 12, 2024
|
1 Min Read
byRoei Sherman, Field CTO, Mitiga
Chinese Hacker Pwns 81K Sophos Devices With Zero-Day Bug
Chinese Hacker Pwns 81K Sophos Devices With Zero-Day
Dec 11, 2024
|
1 Min Read
byKristina Beek, Associate Editor, Dark Reading
Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack
Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack
Dec 11, 2024
|
1 Min Read
byBecky Bracken, Senior Editor, Dark Reading
Researchers Crack Microsoft Azure MFA in an Hour
Researchers Crack Microsoft Azure MFA in an Hour
Dec 11, 2024
|
1 Min Read
byElizabeth Montalbano, Contributing Writer
Cybersecurity Lessons From 3 Public Breaches
Cybersecurity Lessons From 3 Public Breaches
Dec 11, 2024
|
1 Min Read
byDmytro Tereshchenko, CISO, Sigma Software Group
Tips for Preventing Breaches in 2025
Tips for Preventing Breaches in 2025
Dec 11, 2024
|
1 Min Read
byPukar C. Hamal, Founder & CEO, SecurityPal
Editor's Choice
Binary code in blue and orange colors
Emerging Threats & Vulnerabilities to Prepare for in 2025Emerging Threats & Vulnerabilities to Prepare for in 2025
byKristina Beek, Associate Editor, Dark Reading
Dec 26, 2024
11 Min Read
Trump signing cybersecurity order creating CISA in 2018
Trump 2.0 Portends Big Shift in Cybersecurity PoliciesTrump 2.0 Portends Big Shift in Cybersecurity Policies
byBecky Bracken, Senior Editor, Dark Reading
Dec 24, 2024
7 Min Read
People shaking hands imposed over a photo of China and a globe
US Ban on TP-Link Routers More About Politics Than Exploitation RiskTP-Link Router Ban Is Mostly About Politics
byRobert Lemos, Contributing Writer
Dec 20, 2024
6 Min Read
Reports
Webinars
- Securing Your Cloud Data Across the Attack TimelineJan 15, 2025
- The Artificial Future Trend Micro Security Predictions for 2025Jan 16, 2025
White Papers
- IDC Analyst Brief: Enhancing Incident Response with Automated Investigation Workflows
- Delivering Incident Response Excellence: How Wipro enhances customer services with automated investigation and response
- Frost Radar: Cloud Security Posture Management, 2024
- 6 Key Requirements of Multicloud Security
- The State of Cloud Native Security Report 2024
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.