Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.
Security researchers at Sysdig have observed new campaigns exploiting React2Shell which appear to have the hallmarks of North Korean hackers. React2Shell is a remote code execution vulnerability in ...
Threat actors are actively exploiting a critical vulnerability in the Post SMTP plugin installed on more than 400,000 WordPress sites, to take complete control by hijacking administrator accounts.
Update Nov. 3, 10:42 am UTC: This article has been updated to include a section on Berachain’s emergency hard fork. Update Nov. 3, 9:47 am UTC: This article has been updated to add the latest figures, ...
$1 million WhatsApp hack at Pwn2Own Ireland confirmed. October 23 should stick in the memory of smartphone users for some time to come. This is the day that the Samsung Galaxy S25 was hacked, ...
Thousands of networks—many of them operated by the US government and Fortune 500 companies—face an “imminent threat” of being breached by a nation-state hacking group following the breach of a major ...
Sen. Chris Van Hollen (D-Md.) discusses what he views as threats to free speech following the brief suspension of late-night host Jimmy Kimmel and the Trump ...
Sen. Chris Van Hollen (D-Md.) discusses what he views as threats to free speech following the brief suspension of late-night host Jimmy Kimmel and the Trump administration’s reaction to a deadly ...
In this Black Hat USA 2025 interview, Michael Bargury, Zenity CTO, discusses his alarming "AgentFlayer" research on AI enterprise compromise methods with Dark Reading's Rob Wright, senior news ...
A security researcher said flaws in a carmaker’s online dealership portal exposed the private information and vehicle data of its customers, and could have allowed hackers to remotely break into any ...