Key Market Indicator:
F&G: 49
25.202,10 NASDAQ · 50.341,99 DOW · 6.967,16 S&P · 5.051,80 Gold · 68,55 BRENT

Proteo Defence 365/24/7 
Security Audits · CyberCrime Forensics · R/G/W Teaming
Powerful app-Suite for Admins, Website operators, Research

Switch View
Source: Dark Reading Filter zurücksetzen
© Sector News
10.02.2026
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
News Preview
© Dark Reading 2026
© Sector News
10.02.2026
OT Attacks Get Scary With 'Living-off-the-Plant' Techniques
News Preview
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.
© Dark Reading 2026
© Sector News
10.02.2026
TransUnion's Real Networks Deal Focuses on Robocall Blocking
News Preview
The acquisition allows the credit reporting agency to add SMS spam and scam prevention to its robocall blocking capabilities.
© Dark Reading 2026
Worth to know
20.10.2025
Short Selling Radar

USA, Europe, Asia
Track Short Selling Activities worldwide
Knowing what matters
Short sale statistics, hedge fund activities and much more user-friendly information
© Sector News
09.02.2026
Warlock Gang Breaches SmarterTools Via SmarterMail Bugs
News Preview
The ransomware group breached SmarterTools through a vulnerability in the company's own SmarterMail product.
© Dark Reading 2026
Swarmalpha i/o · The Event Futures Prediction X
23.01.2026
© Sector News
09.02.2026
TeamPCP Turns Cloud Infrastructure Into Crime Bots
News Preview
The threat actor has been compromising cloud environments at scale with automated worm-like attacks on exposed services and interfaces.
© Dark Reading 2026
© Sector News
09.02.2026
'Reynolds' Bundles BYOVD With Ransomware Payload
News Preview
Researchers discovered a newly disclosed vulnerable driver embedded in Reynolds' ransomware, illustrating the increasing popularity of the defense-evasion technique.
© Dark Reading 2026
© Sector News
09.02.2026
What Organizations Need to Change When Managing Printers
News Preview
Ask the Expert: Organizations need to close the ownership vacuum, establish durable security controls, and ensure printers are protected as rigorously as other endpoints.
© Dark Reading 2026
© Sector News
06.02.2026
'Encrypt It Already' Campaign Pushes Big Tech to Prioritize E2E Encryption
News Preview
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption (E2E) by default across their services, as privacy concerns mount amid increased AI use.
© Dark Reading 2026
© Sector News
06.02.2026
Shai-hulud: The Hidden Costs of Supply Chain Attacks
News Preview
Recent supply chain attacks involving self-propagating worms have spread far, but the damage and long-term impact is hard to quantify.
© Dark Reading 2026
© Sector News
06.02.2026
OpenClaw's Gregarious Insecurities Make Safe Usage Difficult
News Preview
Malicious "skills" and persnickety configuration settings are just some of the issues that security researchers have found when installing — and removing — the OpenClaw AI assistant.
© Dark Reading 2026
© Sector News
05.02.2026
EnCase Driver Weaponized as EDR Killers Persist
News Preview
The forensic tool's driver was signed with a digital certificate that expired years ago, but major security gaps allowed Windows to load it.
© Dark Reading 2026
© Sector News
05.02.2026
Agentic AI Site 'Moltbook' Is Riddled With Security Risks
News Preview
Someone used AI to build an entire Web platform, which then did something predictable and preventable: It exposed all its data through a publicly accessible API.
© Dark Reading 2026
Advertisment
20.10.2025
© Sector News
05.02.2026
Data Tool to Triage Exploited Vulnerabilities Can Make KEV More Useful
News Preview
A disconnect exists between an organization's cybersecurity needs and lists like CISA's KEV Catalog. KEV Collider combines data from multiple open source vulnerability frameworks to help security teams quickly assess which are important, based on their priorities.
© Dark Reading 2026
© Sector News
05.02.2026
Cyber Success Trifecta: Education, Certifications & Experience
News Preview
Col. Georgeo Xavier Pulikkathara, CISO at iMerit, discusses the importance of fundamentals, continuous learning, and human ingenuity in the face of AI-driven cybersecurity evolution.
© Dark Reading 2026
© Sector News
05.02.2026
Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis
News Preview
Iranian threat actors have been stealing credentials from people of interest across the Middle East, using spear-phishing and social engineering.
© Dark Reading 2026
© Sector News
04.02.2026
Ransomware Gang Goes Full 'Godfather' With Cartel
News Preview
DragonForce is taking cues from organized crime, emphasizing cooperation and coordination among ransomware gangs.
© Dark Reading 2026
© Sector News
04.02.2026
CISA Makes Unpublicized Ransomware Updates to KEV Catalog
News Preview
A third of the "flipped" CVEs affected network edge devices, leading one researcher to conclude, "Ransomware operators are building playbooks around your perimeter."
© Dark Reading 2026
© Sector News
04.02.2026
Attackers Use Windows Screensavers to Drop Malware, RMM Tools
News Preview
By tapping the unusual .scr file type, attackers leverage "executables that don't always receive executable-level controls," one researcher noted.
© Dark Reading 2026
© Sector News
04.02.2026
Extra Extra! Announcing DR Global Latin America
News Preview
Dark Reading has something new hitting the newsstand: a content section purpose-built for Latin American readers, featuring news, analysis, features, and multimedia.
© Dark Reading 2026
© Sector News
04.02.2026
Big Breach or Smooth Sailing? Mexican Gov't Faces Leak Allegations
News Preview
A hacktivist group claims a 2.3-terabyte data breach exposes the information of 36 million Mexicans, but no sensitive accounts are at risk, says government.
© Dark Reading 2026
© Sector News
04.02.2026
Google Looker Bugs Allow Cross-Tenant RCE, Data Exfil
News Preview
Attackers could even have used one vulnerable Lookout user to gain access to other GCP tenants' environments.
© Dark Reading 2026
© Sector News
03.02.2026
Russian Hackers Weaponize Microsoft Office Bug in Just 3 Days
News Preview
APT28's attacks rely on specially crafted Microsoft Rich Text Format (RTF) documents to kick off a multistage infection chain to deliver malicious payloads.
© Dark Reading 2026
© Sector News
03.02.2026
GlassWorm Malware Returns to Shatter Developer Ecosystems
News Preview
The self-replicating malware has poisoned a fresh set of Open VSX software components, leaving potential downstream victims with infostealer infections.
© Dark Reading 2026
© Sector News
03.02.2026
AI May Supplant Pen Testers, But Oversight & Trust Are Not There Yet
News Preview
Crowdsourced bug bounties and pen-testing firms see AI agents stealing the low-hanging vulnerabilities from their human counterparts. Oversight remains key.
© Dark Reading 2026
© Sector News
03.02.2026
8-Minute Access: AI Accelerates Breach of AWS Environment
News Preview
The AI-assisted attack, which started with exposed credentials from public S3 buckets, rapidly achieved administrative privilges.
© Dark Reading 2026
© Sector News
03.02.2026
Dark Patterns Undermine Security, One Click at a Time
News Preview
People trust organizations to do the right thing, but some websites and apps have user interfaces that ultimately lead to inadequate security.
© Dark Reading 2026
© Sector News
02.02.2026
Attackers Harvest Dropbox Logins Via Fake PDF Lures
News Preview
A malware-free phishing campaign targets corporate inboxes and asks employees to view "request orders," ultimately leading to Dropbox credential theft.
© Dark Reading 2026
© Sector News
02.02.2026
County Pays $600K to Wrongfully Jailed Pen Testers
News Preview
Iowa police arrested two penetration testers in 2019 for doing their jobs, highlighting the risk to security professionals in red teaming exercises.
© Dark Reading 2026
© Sector News
02.02.2026
Chinese Hackers Hijack Notepad++ Updates for 6 Months
News Preview
State-sponsored threat actors compromised the popular code editor's hosting provider to redirect targeted users to malicious downloads.
© Dark Reading 2026
© Sector News
02.02.2026
ShinyHunters Expands Scope of SaaS Extortion Attacks
News Preview
Following their attacks on Salesforce instances last year, members of the cybercrime group have broadened their targeting and gotten more aggressive with extortion tactics.
© Dark Reading 2026
© Sector News
30.01.2026
Torq Moves SOCs Beyond SOAR With AI-Powered Hyper Automation
News Preview
Investors poured $140 million into Torq's Series D Round, raising the startup's valuation to $1.2 billion, to bring AI-based "hyper automation" to SOCs.
© Dark Reading 2026
© Sector News
30.01.2026
2026: The Year Agentic AI Becomes the Attack-Surface Poster Child
News Preview
Dark Reading asked readers whether agentic AI attacks, advanced deepfake threats, board recognition of cyber as a top priority, or password-less technology adoption would be most likely to become a trending reality for 2026.
© Dark Reading 2026
© Sector News
30.01.2026
Out-of-the-Box Expectations for 2026 Reveal a Grab Bag of Risk
News Preview
Security teams need to be thinking about this list of emerging cybersecurity realities to avoid rolling the dice on enterprise security risks (and opportunities).
© Dark Reading 2026
© Sector News
30.01.2026
Tenable Tackles AI Governance, Shadow AI Risks, Data Exposure
News Preview
The Tenable One AI Exposure add-on discovers unsanctioned AI use in the organization and enforces policy compliance with approved tools.
© Dark Reading 2026
© Sector News
30.01.2026
OpenClaw AI Runs Wild in Business Environments
News Preview
The popular open source AI assistant (aka ClawdBot, MoltBot) has taken off, raising security concerns over its privileged, autonomous control within users' computers.
© Dark Reading 2026
© Sector News
30.01.2026
Chinese APTs Hacking Asian Orgs With High-End Malware
News Preview
Advanced persistent threat (APT) groups have deployed new cyber weapons against a variety of targets, highlighting the increasing threats to the region.
© Dark Reading 2026
© Sector News
29.01.2026
Trump Administration Rescinds Biden-Era Software Guidance
News Preview
Federal agencies will no longer be required to solicit software attestations that they comply with NIST's Secure Software Development Framework (SSDF). What that means long term is unclear.
© Dark Reading 2026
© Sector News
29.01.2026
Second Round of Critical RCE Bugs in n8n Spikes Corporate Risk
News Preview
A new around of vulnerabilities in the popular AI automation platform could let attackers hijack servers and steal credentials, allowing full takeover.
© Dark Reading 2026
© Sector News
29.01.2026
Secure Your Spot at RSAC 2026 Conference
News Preview
© Dark Reading 2026
© Sector News
29.01.2026
'Semantic Chaining' Jailbreak Dupes Gemini Nano Banana, Grok 4
News Preview
If an attacker splits a malicious prompt into discrete chunks, some large language models (LLMs) will get lost in the details and miss the true intent.
© Dark Reading 2026
© Sector News
29.01.2026
From Quantum to AI Risks: Preparing for Cybersecurity's Future
News Preview
In the latest edition of "Reporters' Notebook," a trio of journalists urge the cybersecurity industry to prioritize patching vulnerabilities, preparing for quantum threats, and refining AI applications,
© Dark Reading 2026
© Sector News
28.01.2026
How Can CISOs Respond to Ransomware Getting More Violent?
News Preview
Ransomware defense requires focusing on business resilience. This means patching issues promptly, improving user education, and deploying multifactor authentication.
© Dark Reading 2026
© Sector News
28.01.2026
Months After Patch, WinRAR Bug Poised to Hit SMBs Hardest
News Preview
Russian and Chinese nation-state attackers are exploiting a months-old WinRAR vulnerability, despite a patch that came out last July.
© Dark Reading 2026
© Sector News
28.01.2026
Fortinet Confirms New Zero-Day Behind Malicious SSO Logins
News Preview
To stop the ongoing attacks, the cybersecurity vendor took the drastic step of temporarily disabling FortiCloud single sign-on (SSO) authentication for all devices.
© Dark Reading 2026
© Sector News
28.01.2026
Consumers Reluctant to Shop at Stores That Don't Take Security Seriously
News Preview
The retail sector must adapt as consumers become more cybersecurity-conscious. Increased attack transparency is a good place to start.
© Dark Reading 2026
© Sector News
28.01.2026
China-Backed 'PeckBirdy' Takes Flight for Cross-Platform Attacks
News Preview
In two separate campaigns, attackers used the JScript C2 framework to target Chinese gambling websites and Asian government entities with new backdoors.
© Dark Reading 2026
© Sector News
28.01.2026
Surging Cyberattacks Boost Latin America to Riskiest Region
News Preview
The region is up against tactics like data-leak extortion, credential-stealing campaigns, edge-device exploitation, and attackers leveraging AI.
© Dark Reading 2026
© Sector News
27.01.2026
AI & the Death of Accuracy: What It Means for Zero-Trust
News Preview
AI "model collapse," where LLMs over time train on more and more AI-generated data and become degraded as a result, can introduce inaccuracies, promulgate malicious activity, and impact PII protections.
© Dark Reading 2026
© Sector News
27.01.2026
Vibe-Coded 'Sicarii' Ransomware Can't Be Decrypted
News Preview
A new ransomware strain that entered the scene last year has poorly designed code and uses Hebrew language that might be a false flag.
© Dark Reading 2026
© Sector News
27.01.2026
Critical Telnet Server Flaw Exposes Forgotten Attack Surface
News Preview
While telnet is considered obsolete, the network protocol is still used by hundreds of thousands of legacy systems and IoT devices for remote access.
© Dark Reading 2026
© Sector News
27.01.2026
Microsoft Rushes Emergency Patch for Office Zero-Day
News Preview
To exploit the vulnerability, an attacker would need either system access or be able to convince a user to open a malicious Office file.
© Dark Reading 2026
© Sector News
27.01.2026
'Stanley' Toolkit Turns Chrome Into Undetectable Phishing Vector
News Preview
The malware-as-a-service kit enables malicious extensions to overlay pages on real websites without changing the visible URL, signaling a fresh challenge for enterprise security.
© Dark Reading 2026
© Sector News
27.01.2026
WorldLeaks Extortion Group Claims It Stole 1.4TB of Nike Data
News Preview
The sportswear brand is investigating an alleged breach of its network that exposed some 188,347 files of highly sensitive corporate data.
© Dark Reading 2026
© Sector News
27.01.2026
WorldLeaks Extortion Group Claims It Stole 1.4TB of Nike Data
News Preview
The sportswear brand is investigating an alleged breach of its network that exposed some 188,347 files of highly sensitive corporate data.
© Dark Reading 2026
© Sector News
27.01.2026
Hand CVE Over to the Private Sector
News Preview
How MITRE has mismanaged the world's vulnerability database for decades and wasted millions along the way.
© Dark Reading 2026
© Sector News
27.01.2026
Beauty in Destruction: Exploring Malware's Impact Through Art
News Preview
Artistic initiatives turn cybersecurity into immersive exhibits at the Museum of Malware Art, transforming digital threats into thought-provoking experiences.
© Dark Reading 2026
© Sector News
26.01.2026
Sandworm Blamed for Wiper Attack on Polish Power Grid
News Preview
Researchers attributed the failed attempt to the infamous Russian APT Sandworm, which is notorious for wiper attacks on critical infrastructure organizations.
© Dark Reading 2026
© Sector News
26.01.2026
DPRK's Konni Targets Blockchain Developers With AI-Generated Backdoor
News Preview
The North Korean threat group is using a new PowerShell backdoor to compromise development environments and target cryptocurrency holdings, according to researchers.
© Dark Reading 2026
© Sector News
24.01.2026
2025 Was a Wake-up Call to Protect Human Decisions, Not Just Systems
News Preview
Cybersecurity must shift from solely protecting systems to safeguarding human decision-making under uncertainty and system failures.
© Dark Reading 2026
© Sector News
23.01.2026
Swipe, Plug-in, Pwned: Researchers Find New Ways to Hack Vehicles
News Preview
Security researchers exploited dozens of vulnerabilities in vehicle infotainment systems and EV chargers during the latest Pwn2Own contest at Automotive World 2026.
© Dark Reading 2026

Gamechanger in online marketing · Innovation as a service · Upgrade your own internet presence.

© 2026 Select Sector SPDRs

* * *

More Sector related Investment Ideas
© 2026 WEBs Investments ETFs
About GICS Technologies
GICS Technologies is part of the GICS Eleven information portfolio, which focuses primarily on information from listed companies in the information technology sector.
About GICS Eleven

GICS Eleven (G11, GICS11) bundles topic-specific content and enables quick access to relevant information thanks to its gate function. The project is largely based on the Global Industry Classification Standard (GICS®), which was developed by MSCI and Standard & Poor's and enables a breakdown into sectors. GICS® consists of 11 sectors, 24 industry branches, 69 industries and 158 sub-industries.

GICS® is a registered trademark of MSCI Inc. and S&P Dow Jones Indices.

Member of 3R/RSQ Network
Digital Content
Network Alliance
Transparency - Reliability - Credibility
Information regarding Product Information
Wednesday, 11.02.2026, Calendar Week 07, 42nd day of the year, 323 days remaining until EoY.