Nine application security toolmakers band together to fork the popular Semgrep code-scanning project, touching off a controversy over access to features and fairness.
Follow Dark Reading:
 February 01, 2025
LATEST SECURITY FEATURES & COMMENTARY
Code-Scanning Tool's License at Heart of Security Breakup
Nine application security toolmakers band together to fork the popular Semgrep code-scanning project, touching off a controversy over access to features and fairness.
State Data Privacy Regulators Are Coming. What Story Will You Tell Them?
Regulators are ready to enforce new state data privacy laws. Here's how experts say organizations can stay compliant and avoid penalties.
PrintNightmare Aftermath: Windows Print Spooler Is Better. What's Next?
While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.
CrowdStrike Highlights Magnitude of Insider Risk
The impetus for CrowdStrike's new professional services came from last year's Famous Chollima threat actors, which used fake IT workers to infiltrate organizations and steal data.
7 Tips for Strategically Saying 'No' in Cybersecurity
Cybersecurity can't always be "Department of No," but saying yes all the time is not the answer. Here is how to enable innovation gracefully without adding risk to the organization.
Tenable to Acquire Vulcan Cyber to Boost Exposure Management Focus
The deal, expected to close this quarter, will give Tenable One Exposure Management much-needed integration with over 100 third-party security tools and platforms.
Exposure Management Provider CYE Acquires Solvo
The addition of Solvo CSPM to CYE Hyver aims to address the need for multicloud vulnerability monitoring and risk assessment.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
Super Bowl LIX Could Be a Magnet for Cyberattacks
Concerns include everything from ransomware, malware, and phishing attacks on the game's infrastructure to those targeting event sponsors and fans.

New Jailbreaks Allow Users to Manipulate GitHub Copilot
Whether by intercepting its traffic or just giving it a little nudge, GitHub's AI assistant can be made to do malicious things it isn't supposed to.

Crisis Simulations: A Top 2025 Concern for CISOs
CISOs are planning to adjust their budgets this year to reflect their growing concerns for cybersecurity preparedness in the event of a cyberattack.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
MITRE's Latest ATT&CK Simulations Tackle Cloud Defenses
The MITRE framework's applied exercise provides defenders with critical feedback about how to detect and defend against common, but sophisticated, attacks.
3 Use Cases for Third-Party API Security
Third-party API security requires a tailored approach for different scenarios. Learn how to adapt your security strategy to outbound data flows, inbound traffic, and SaaS-to-SaaS interconnections.
Data Privacy Day 2025: Time for Data Destruction to Become Standard Business Practice
Compliance standards are mandating better data security. There are several ways to do this, but most organizations would admit that erasure is not one of them.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.