Researchers discovered seven vulnerabilities — including an unauthenticated RCE issue — in widely deployed Telit Cinterion ...
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for its tool ...
Enterprises are increasingly recognizing that the CISO's skills and experience building risk-based cyber programs translate ...
CISA's Secure by Design pledge consists of areas of improvement split into seven primary categories: multi-factor ...
The attack cut off access to electronic healthcare records (EHRs) and ordering systems, plunging the organization and its ...
Our brand-new podcast, Dark Reading Confidential, has officially launched. You don't want to miss our first episode with the ...
So, what do you do when you've been breached? Here are four steps security leaders can take to minimize the damage. First and ...