Cyber Security

Inside Microsoft’s veteran-to-tech workforce pipeline

The technology workforce is changing, and military veterans are increasingly bei...

Brakeman: Open-source vulnerability scanner for Ruby on...

Brakeman is an open-source security scanner used by teams that build application...

Incident response lessons learned the hard way

In this Help Net Security video, Ryan Seymour, VP, Consulting and Education at C...

AWS releases updated PCI PIN compliance report for paym...

Amazon Web Services has published an updated Payment Card Industry Personal Iden...

Week in review: Fully patched FortiGate firewalls are g...

Here’s an overview of some of last week’s most interesting news, articles, inter...

2025 Was a Wake-Up Call to Protect Human Decisions, Not...

Cybersecurity must shift from solely protecting systems to safeguarding human de...

Europe's GCVE Raises Concerns Over Fragmentation in Vul...

GCVE would enhance global collaboration, flexibility, and efficiency in tracking...

Healthy Security Cultures Want People to Report Risks

The signs of an effective security culture are shifting as companies call on CIS...

Multi-Stage Phishing Campaign Targets Russia with Amnes...

A new multi-stage phishing campaign has been observed targeting users in Russia ...

New DynoWiper Malware Used in Attempted Sandworm Attack...

The Russian nation-state hacking group known as Sandworm has been attributed to ...

Who Approved This Agent? Rethinking Access, Accountabil...

AI agents are accelerating how work gets done. They schedule meetings, access da...

CISA Adds Actively Exploited VMware vCenter Flaw CVE-20...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added...

Swipe, Plug-in, Pwned: Researchers Find New Ways to Hac...

Security researchers exploited dozens of vulnerabilities in vehicle infotainment...

Exploited Zero-Day Flaw in Cisco UC Could Affect Millions

Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical bec...

Dark Reading Confidential: Reviving the Hacker Ethos Th...

Dark Reading Confidential Episode 14: How curious, ethical problem solving can c...

Healthy Security Cultures Thrive on Risk Reporting

The signs of an effective security culture are shifting as companies call on CIS...