darkreading
Orgs Move to SSO, Passkeys to Solve Bad Password Habits
4 days 2 hours ago
In 2025, employees are still using weak passwords. Instead of forcing an impossible change, security leaders are working around the problem.
Nate Nelson, Contributing Writer
[Dark Reading Virtual Event] Know Your Enemy: How cybercriminals and nation-state hackers operate
4 days 2 hours ago
Coyote, Maverick Banking Trojans Run Rampant in Brazil
4 days 4 hours ago
South America's largest country is notorious for banking malware attacks; Maverick self-terminates if its targeted user is based outside Brazil.
Alexander Culafi
Kenya Kicks Off 'Code Nation' With a Nod to Cybersecurity
4 days 11 hours ago
The African country aims to train 1 million workers in tech skills in the short term, with a focus on software engineering, cybersecurity, and data science.
Robert Lemos, Contributing Writer
'CitrixBleed 2' Wreaks Havoc as Zero-Day Bug
4 days 20 hours ago
The same APT hammered critical bugs in Citrix NetScaler (CVE-2025-5777) and the Cisco Identity Service Engine (CVE-2025-20337) in a sign of growing adversary interest in identity and access management systems.
Jai Vijayan, Contributing Writer
Google Looks to Dim 'Lighthouse' Phishing-as-a-Service Op
4 days 20 hours ago
The phishing kit, run by a group known as the "Smishing Triad," has powered massive amounts of unpaid tolls and package tracking texts.
Rob Wright
Microsoft Exchange 'Under Imminent Threat,' Act Now
5 days 1 hour ago
Threats against Microsoft Exchange continue to mount, but there are steps both organizations and Microsoft can take to limit them.
Arielle Waldman
Phishing Tool Uses Smart Redirects to Bypass Detection
5 days 2 hours ago
A campaign against Microsoft 365 users leverages Quantum Route Redirection, which simplifies previously technical attack steps and has affected victims across 90 countries.
Elizabeth Montalbano, Contributing Writer
Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs
5 days 22 hours ago
Security teams may have a less burdensome rollout in November after October's Goliath Patch Tuesday, but shouldn't wait on a few top-priority fixes.
Jai Vijayan, Contributing Writer
Grandparents to C-Suite: Elder Fraud Reveals Gaps in Human-Centered Cybersecurity
6 days 3 hours ago
Cybercriminals are weaponizing AI voice cloning and publicly available data to craft social engineering scams that emotionally manipulate senior citizens—and drain billions from their savings.
Joan Goodchild
Bridging the Skills Gap: How Military Veterans Are Strengthening Cybersecurity
6 days 4 hours ago
From intelligence analysts to surface warfare officers, military veterans of all backgrounds are successfully pivoting to cybersecurity careers and strengthening the industry's defense capabilities.
Kristina Beek
Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk
6 days 6 hours ago
Konni, a subset of the state-sponsored DPRK cyberespionage group, first exploits Google Find Hub, which ironically aims to protect lost Android devices, to remotely wipe devices.
Elizabeth Montalbano, Contributing Writer
OWASP Highlights Supply Chain Risks in New Top 10 List
6 days 20 hours ago
Security misconfiguration jumped to second place while injection vulnerabilities dropped, as organizations improve defenses against traditional coding flaws.
Jai Vijayan, Contributing Writer
GlassWorm Returns, Slices Back into VS Code Extensions
6 days 20 hours ago
GlassWorm, a self-propagating VS Code malware first found in the Open VSX marketplace, continues to infect developer devices around the world.
Alexander Culafi
ClickFix Campaign Targets Hotels, Spurs Secondary Customer Attacks
1 week ago
Attackers compromise hospitality providers with an infostealer and RAT malware and then use stolen data to launch phishing attacks against customers via both email and WhatsApp.
Elizabeth Montalbano, Contributing Writer
'Landfall' Malware Targets Samsung Galaxy Users
1 week 2 days ago
The tool let its operators secretly record conversations, track device locations, capture photos, collect contacts, and perform other surveillance on compromised devices.
Jai Vijayan, Contributing Writer
'Ransomvibing' Infests Visual Studio Extension Market
1 week 2 days ago
A published VS Code extension didn't hide the fact that it encrypts and exfiltrates data and also failed to remove obvious signs it was AI-generated.
Alexander Culafi
Microsoft Backs Massive AI Push in UAE, Raising Security Concerns
1 week 2 days ago
In partnership with Emirates tech company G42, Microsoft is building the first stage of a 5-gigawatt US-UAE AI campus using Nvidia GPUs.
Robert Lemos, Contributing Writer
AI Agents Are Going Rogue: Here's How to Rein Them In
1 week 3 days ago
Human-centered identity frameworks are incorrectly being applied to AI agents, creating the potential for catastrophe at machine speed, Poghosyan argues.
Art Poghosyan
Checked
3 days 11 hours ago
Public RSS feed
darkreading feed