Cyber Security

Download: Automating Pentest Delivery Guide

Pentesting remains one of the most effective ways to identify real-world weaknes...

Name That Toon: Mark of (Security) Progress

Feeling creative? Have something to say about the last 20 years of cybersecurity...

20 Years in Cyber: Dark Reading Marks Milestone With Mo...

On this day in 2006, Dark Reading went live. We have a celebration planned that ...

Top Five Sales Challenges Costing MSPs Cybersecurity Re...

The managed security services market is projected to grow from $38.31 billion in...

Two Cybersecurity Professionals Get 4-Year Sentences in...

The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two...

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines ...

A new software supply chain attack campaign has been observed using sleeper pack...

Identity is the control plane for distributed infrastru...

Teleport CEO Ev Kontsevoy makes the case that distributed infrastructure, across...

Shadow AI risks deepen as 31% of users get no employer ...

Between one-fifth and one-third of workers use AI outside the influence and gove...

Open-source privacy proxy masks PII before prompts reac...

Enterprise developers routinely send prompts to external large language models t...

New infosec products of the month: April 2026

Here’s a look at the most interesting products from the past month, featuring re...

AI traffic is getting bigger, louder, and less predictable

AI workflows need storage that supports repeated movement across the model lifec...

TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack

Several npm packages for SAP's cloud application development ecosystem have been...

Another AI-Assisted Software Scan Yields 9-Year-Old Lin...

The proof-of-concept exploit code runs only 10 lines long, but luckily, a patch ...

Anthropic's Mythos Has Landed: Here's What Comes Next f...

In this latest installment of the Reporters' Notebook video series, we discuss h...

PyTorch Lightning and Intercom-client Hit in Supply Cha...

In yet another software supply chain attack, threat actors have managed to compr...

PyTorch Lightning Compromised in PyPI Supply Chain Atta...

In yet another software supply chain attack, threat actors have managed to compr...