Cyberattacks & Data Breaches recent news | Dark Reading (original) (raw)

Logo Informa

TechTarget and Informa Tech’s Digital Business Combine.TechTarget and Informa

TechTarget and Informa Tech’s Digital Business Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Black Hat NewsOmdia CybersecurityAdvertise

Dark Reading Logo

Newsletter Sign-Up

Newsletter Sign-Up

Cybersecurity Topics

World

See All

The Edge

DR Technology

Events

SEE ALL

Resources

SEE ALL

ten dollar bill closeup of US Treasury Building

Cyberattacks & Data Breaches

Chinese State Hackers Breach US Treasury DepartmentChinese State Hackers Breach US Treasury Department

In what's being called a "major cybersecurity incident," Beijing-backed adversaries broke into cyber vendor BeyondTrust to access the US Department of the Treasury workstations and steal unclassified data, according to a letter sent to lawmakers.

byBecky Bracken, Senior Editor, Dark Reading

Dec 30, 2024

|

1 Min Read

A face swap deepfake in video edit

Cyberattacks & Data Breaches

Deepfakes, Quantum Attacks Loom Over APAC in 2025Deepfakes, Quantum Attacks Loom Over APAC in 2025

byJai Vijayan, Contributing Writer

Dec 30, 2024

1 Min Read

Water pipes, valves, and manometers inside a home

ICS/OT Security

Hackers Are Hot for Water UtilitiesHackers Are Hot for Water Utilities

byKelly Jackson Higgins, Editor-in-Chief, Dark Reading

Dec 27, 2024

1 Min Read

A chart showing which industry sectors filed SEC disclosure reports

Cyber Risk

SEC Disclosures Up, But Not Enough Details ProvidedSEC Disclosures Up, But Not Enough Details Provided

byFahmida Y. Rashid

Dec 26, 2024

1 Min Read

Binary code in blue and orange colors

Vulnerabilities & Threats

Emerging Threats & Vulnerabilities to Prepare for in 2025Emerging Threats & Vulnerabilities to Prepare for in 2025

byKristina Beek, Associate Editor, Dark Reading

Dec 26, 2024

1 Min Read

Cyberspace communication concept with digital Africa map, glowing social media icons, computer signs and locks at dark background

Сloud Security

DDoS Attacks Surge as Africa Expands Its Digital FootprintDDoS Attacks Surge as Africa Expands Its Digital Footprint

byJai Vijayan, Contributing Writer

Dec 26, 2024

1 Min Read

Cube with Zero Trust written on two visible sides; dark blue background with squares floating around

Cyberattacks & Data Breaches

Too Much 'Trust,' Not Enough 'Verify'

Too Much 'Trust,' Not Enough 'Verify'

Dec 24, 2024

|

1 Min Read

by

Rob Sloan,

Sam Curry

Headshot of Don Tait, Omdia.

Cybersecurity Operations

Non-Human Identities Gain Momentum, Requires Both Management, Security

Non-Human Identities Gain Momentum, Requires Both Management, Security

Dec 23, 2024

|

1 Min Read

byDon Tait, Senior Analyst, Omdia

Glowing blue shield icon hovering in front of a dark background with green and blue code

Cyberattacks & Data Breaches

Middle East Cyberwar Rages On, With No End in Sight

Middle East Cyberwar Rages On, With No End in Sight

Dec 23, 2024

|

1 Min Read

byKristina Beek, Associate Editor, Dark Reading

Three people in grey hoodies holding computer equipment sneaking past a security guard sitting in a chair.

Vulnerabilities & Threats

Name That Toon: Sneaking Around

Name That Toon: Sneaking Around

Dec 23, 2024

|

1 Min Read

byJohn Klossner, Cartoonist

Two men with hands up facing a wall like they are being arrested

Cyberattacks & Data Breaches

LockBit Ransomware Developer Arrested in Israel

LockBit Ransomware Developer Arrested in Israel

Dec 20, 2024

|

1 Min Read

byBecky Bracken, Senior Editor, Dark Reading

Globe superimposed over image of person typing on keyboard; blue tint

Vulnerabilities & Threats

How Nation-State Cybercriminals Are Targeting the Enterprise

How Nation-State Cybercriminals Are Targeting the Enterprise

Dec 20, 2024

|

1 Min Read

byAdam Finkelstein, Senior Vice President of Global Client Leadership, Sygnia

The word MALTERTISING made out of blue dots, superimposed over photo of a hooded figure

Сloud Security

Malvertisers Fool Google With AI-Generated Decoy Content

Malvertisers Fool Google With AI-Generated Decoy Content

Dec 19, 2024

|

1 Min Read

byJai Vijayan, Contributing Writer

Three wooden figures representing people in front of a whiteboard

Cyberattacks & Data Breaches

CISA Releases Draft of National Cyber Incident Response Plan

CISA Releases Draft of National Cyber Incident Response Plan

Dec 19, 2024

|

1 Min Read

byJennifer Lawinski, Contributing Writer

Broken orange chain link

Cyberattacks & Data Breaches

Supply Chain Risk Mitigation Must Be a Priority in 2025

Supply Chain Risk Mitigation Must Be a Priority in 2025

Dec 19, 2024

|

1 Min Read

byRob T. Lee, Chief of Research & Head of Faculty, SANS Institute

Woman shamed with fingers pointing at her

Cyberattacks & Data Breaches

Interpol: Can We Drop the Term 'Pig Butchering'?

Interpol: Can We Drop the Term 'Pig Butchering?'

Dec 18, 2024

|

1 Min Read

byBecky Bracken, Senior Editor, Dark Reading

![Black fishhook that has hooked a card that says "Enter your login information" with user name and password fields filled ](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt14a18ea964734eaa/6762a6940203dbc45cca5bc2/AnatoliiBabii-alamyjpg.jpg?width=300&auto=webp&quality=80&disable=upscale "Black fishhook that has hooked a card that says "Enter your login information" with user name and password fields filled ")

Cyberattacks & Data Breaches

Phishers Spoof Google Calendar Invites in Fast-Spreading, Global Campaign

Phishers Spoof Google Calendar Invites in Fast-Spreading Campaign

Dec 18, 2024

|

1 Min Read

byElizabeth Montalbano, Contributing Writer

A close-up of a finger tapping a Microsoft Azure app store page

Сloud Security

Manufacturers Lose Azure Creds to HubSpot Phishing Attack

Manufacturers Lose Azure Creds to HubSpot Phishing Attack

Dec 18, 2024

|

1 Min Read

byNate Nelson, Contributing Writer

Press Release logo

Cyberattacks & Data Breaches

Wallarm Releases API Honeypot Report Highlighting API Attack Trends

Wallarm Releases API Honeypot Report Highlighting API Attack Trends

Dec 18, 2024

|

1 Min Read

![Japanese art depicting "yokai" spirits](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28be23d72af95ffc/6760c7ccf38e1a2415bbc4d9/Yokai-CPA_Media_Pte_Ltd-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale "Japanese art depicting "yokai" spirits")

Threat Intelligence

Thai Police Systems Under Fire From 'Yokai' Backdoor

Thai Police Systems Under Fire From 'Yokai' Backdoor

Dec 18, 2024

|

1 Min Read

byNate Nelson, Contributing Writer

Texas Tech Red Raiders quarterback Tyler Shough and Ole Miss Rebels linebacker Khari Coleman (23) collide at the goal line

Cyberattacks & Data Breaches

Texas Tech Fumbles Medical Data in Massive Breach

Texas Tech Fumbles Medical Data in Massive Breach

Dec 17, 2024

|

1 Min Read

byTara Seals, Managing Editor, News, Dark Reading

Cloud drawing lit up inside by connected lines and lights against black backdrop above a network of lines and lights

Сloud Security

Azure Data Factory Bugs Expose Cloud Infrastructure

Azure Data Factory Bugs Expose Cloud Infrastructure

Dec 17, 2024

|

1 Min Read

byElizabeth Montalbano, Contributing Writer

A classroom: A male teacher wearing a blue sweater stands in front of young children at their desks, some raising their hands

Vulnerabilities & Threats

The Education Industry: Why Its Data Must Be Protected

The Education Industry: Why Its Data Must Be Protected

Dec 16, 2024

|

1 Min Read

by Vichai Levy, Vice President of R&D, Overseeing Architecture, Protegrity

A hand holding a red telephone receiver

Cyberattacks & Data Breaches

Microsoft Teams Vishing Spreads DarkGate RAT

Microsoft Teams Vishing Spreads DarkGate RAT

Dec 16, 2024

|

1 Min Read

byElizabeth Montalbano, Contributing Writer

Elizabeth Taylor in the 1963 movie Cleopatra

Application Security

Cleo MFT Zero-Day Exploits Are About to Escalate, Analysts Warn

Cleo MFT Zero-Day Exploits Are About to Escalate

Dec 13, 2024

|

1 Min Read

byBecky Bracken, Senior Editor, Dark Reading

Dubai downtown skyline at sunset, Dubai, United Arab Emirates, Burj Khalifa

Cyberattacks & Data Breaches

'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks

'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks

Dec 13, 2024

|

1 Min Read

byTara Seals, Managing Editor, News, Dark Reading

Close up of an eagle

Cyberattacks & Data Breaches

Chinese Cops Caught Using Android Spyware to Track Mobile Devices

Chinese Cops Caught Using Android Spyware to Track Mobile Devices

Dec 12, 2024

|

1 Min Read

byBecky Bracken, Senior Editor, Dark Reading

A Wi-Fi hotspot in a airport

ICS/OT Security

IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack

IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack

Dec 12, 2024

|

1 Min Read

byBecky Bracken, Senior Editor, Dark Reading

Europol logo on a blue background with several silhouetted figures

Cyberattacks & Data Breaches

Europol Cracks Down on Holiday DDoS Attacks

Europol Cracks Down on Holiday DDoS Attacks

Dec 12, 2024

|

1 Min Read

byKristina Beek, Associate Editor, Dark Reading

Hands typing on a laptop in a dark room

Cyberattacks & Data Breaches

Cultivating a Hacker Mindset in Cybersecurity Defense

Cultivating a Hacker Mindset in Cybersecurity Defense

Dec 12, 2024

|

1 Min Read

byRoei Sherman, Field CTO, Mitiga

Department of State sign in front of a building

Cyberattacks & Data Breaches

Chinese Hacker Pwns 81K Sophos Devices With Zero-Day Bug

Chinese Hacker Pwns 81K Sophos Devices With Zero-Day

Dec 11, 2024

|

1 Min Read

byKristina Beek, Associate Editor, Dark Reading

Krispy Kreme doughnut assortment on plate

Cyberattacks & Data Breaches

Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack

Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack

Dec 11, 2024

|

1 Min Read

byBecky Bracken, Senior Editor, Dark Reading

A woman sitting at a laptop and holding a mobile device, the screens of both displaying a green check mark in a circle

Cyberattacks & Data Breaches

Researchers Crack Microsoft Azure MFA in an Hour

Researchers Crack Microsoft Azure MFA in an Hour

Dec 11, 2024

|

1 Min Read

byElizabeth Montalbano, Contributing Writer

A stop sign that misspells it SOTP. To err is human.

Cyberattacks & Data Breaches

Cybersecurity Lessons From 3 Public Breaches

Cybersecurity Lessons From 3 Public Breaches

Dec 11, 2024

|

1 Min Read

byDmytro Tereshchenko, CISO, Sigma Software Group

Hand reaching into a screen of 1s and 0s

Cyberattacks & Data Breaches

Tips for Preventing Breaches in 2025

Tips for Preventing Breaches in 2025

Dec 11, 2024

|

1 Min Read

byPukar C. Hamal, Founder & CEO, SecurityPal

Editor's Choice

Binary code in blue and orange colors

Vulnerabilities & Threats

Emerging Threats & Vulnerabilities to Prepare for in 2025Emerging Threats & Vulnerabilities to Prepare for in 2025

byKristina Beek, Associate Editor, Dark Reading

Dec 26, 2024

11 Min Read

Trump signing cybersecurity order creating CISA in 2018

Cybersecurity Operations

Trump 2.0 Portends Big Shift in Cybersecurity PoliciesTrump 2.0 Portends Big Shift in Cybersecurity Policies

byBecky Bracken, Senior Editor, Dark Reading

Dec 24, 2024

7 Min Read

People shaking hands imposed over a photo of China and a globe

Endpoint Security

US Ban on TP-Link Routers More About Politics Than Exploitation RiskTP-Link Router Ban Is Mostly About Politics

byRobert Lemos, Contributing Writer

Dec 20, 2024

6 Min Read

Reports

More Reports

Webinars

More Webinars

White Papers

More Whitepapers

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

Subscribe