Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
AI red team specialist details his methods for manipulating AI guardrails through jailbreaking and data poisoning, helping developers harden machine learning models.
The ShinyHunters extortion gang stole personal information belonging to over 119,000 people after hacking the Vimeo online video platform in April, according to data breach notification service Have I Been Pwned.
Dubbed Bleeding Llama, the heap out-of-bounds read issue can be exploited remotely, without authentication.
View CSAF
CVE-2026-0073 affects Android’s System component and it can be exploited without any user interaction.
OAuth tokens without expiry enable breaches like Drift attack on 700+ firms, bypassing MFA and exposing sensitive data.
Two decades ago Dark Reading posted its first blockbuster — a story from a pen tester who sprinkled rigged thumb drives around a credit union parking lot and let curious employees do the rest. This episode looks back at the history-making column with its author Steve Stasiukonis, Dark Reading sen...