But the time when quantum computers pose a tangible threat to modern encryption is likely still several years away.
Follow Dark Reading:
 October 17, 2024
LATEST SECURITY NEWS & COMMENTARY
Chinese Researchers Tap Quantum to Break Encryption
But the time when quantum computers pose a tangible threat to modern encryption is likely still several years away.
Sidewinder Casts Wide Geographic Net in Latest Attack Spree
The long-active, India-sponsored cyber-threat group targeted multiple entities across Asia, Africa, the Middle East, and even Europe in a recent attack wave that demonstrated the use of a previously unknown post-exploit tool called StealerBot.
Hybrid Work Exposes New Vulnerabilities in Print Security
The shift to a distributed work model has exposed organizations to new threats, and a low but continuing stream of printer-related vulnerabilities isn't helping.
Bad Actors Manipulate Red-Team Tools to Evade Detection
By using EDRSilencer, threat actors are able to prevent security alerts and reports getting generated.
Iran's APT34 Abuses MS Exchange to Spy on Gulf Gov'ts
A MOIS-aligned threat group has been using Microsoft Exchange servers to exfiltrate sensitive data from Gulf-state government agencies.
What Cybersecurity Leaders Can Learn From the Game of Golf
As in golf, security requires collaboration across the entire organization, from individual contributors in each department to the executive level and the board.
(Sponsored Article) Rethinking Privileged Access Management in a Cloud-Driven World
Compromising privileged accounts enables direct access to sensitive data across environments, making PAM an essential part of cybersecurity.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
LLMs Are a New Type of Insider Adversary
The inherent intelligence of large language models gives them unprecedented capabilities like no other enterprise tool before.

Serious Adversaries Circle Ivanti CSA Zero-Day Flaws
Suspected nation-state actors are spotted stringing together three different zero-days in the Ivanti Cloud Services Application to gain persistent access to a targeted system.

Why Your Identity Is the Key to Modernizing Cybersecurity
Ultimately, the goal of creating a trusted environment around all digital assets and devices is about modernizing the way you do business.

WP Engine Accuses WordPress of 'Forcibly' Taking Over Its Plug-in
WordPress moves could have security implications for sites using Advanced Custom Fields plug-in.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity
Organizations should be on high alert until next month's US presidential election to ensure the integrity of the voting process, researchers warn.
LATEST FROM THE EDGE

Cyber Gangs Aren't Afraid of Prosecution
Challenges with cybercrime prosecution are making it easier for attackers to act with impunity. Law enforcement needs to catch up.
LATEST FROM DR GLOBAL

Fighting Crime With Technology: Safety First
By combining human and nonhuman identity management in one solution, Flock Safety is helping law enforcement solve an impressive number of criminal cases every day.
LATEST FROM DR TECHNOLOGY

AI-Powered Cybercrime Cartels on the Rise in Asia
All across the Asia-Pacific region, large and diverse marketplaces for AI cybercrime tools have developed, with deepfakes proving most popular.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.