Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
The MuddyWater Iranian hackers disguised their operations as a Chaos ransomware attack, relying on Microsoft Teams social engineering to gain access and establish persistence.
Likely perpetrated by MuddyWater, the attack combined social engineering, persistence, credential harvesting, and data theft.
MuddyWater used Teams phishing in 2026 to steal credentials, enabling stealthy data exfiltration and persistence without encryption.
Most network incidents don't escalate due to a lack of alerts; they escalate when response breaks down. This webinar explores how to fix gaps in triage, enrichment, and coordination.
CyberStars Awards 2026 launched as a global program recognizing cybersecurity excellence across products, companies, and professionals.
As part of Dark Reading's 20th anniversary celebration, its staff looks back on 20 of the biggest newmaking events from the past two decades that shaped our industry and the risk landscape for today's security teams.
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
Gavril Sandu, 53, was indicted in 2017, but was arrested and extradited to the United States only in 2026.
AI agents outpace IAM governance as 50% identity activity stays unseen, increasing enterprise security and compliance risks.
In hard-to-detect attacks, hackers are dropping the CloudZ RAT and a fresh plugin, Pheno, to hijack the Windows-based bridge between PCs and smartphones.
The agency has issued guidance to help critical infrastructure operators prepare for cyberattacks by foreign threat actors.
The persistent, evasive implant provides remote access, surveillance, and credential exfiltration capabilities.