darkreading
Financial, Other Industries Urged to Prepare for Quantum Computers
1 day 6 hours ago
Despite daunting technical challenges, a quantum computer capable of breaking public-key encryption systems may only be a decade or two off.
Robert Lemos, Contributing Writer
Critical infrastructure CISOs Can't Ignore 'Back-Office Clutter' Data
1 day 7 hours ago
OT and ICS systems indeed hold the crown jewels of critical infrastructure organizations, but unmonitored data sprawl is proving to be pure gold for increasingly brazen nation-state threat actors like Volt Typhoon, Pearce argues.
Joe Pearce
Generation AI: Why Today's Tech Graduates Are At a Disadvantage
1 day 7 hours ago
With artificial intelligence supplanting entry-level security jobs, new cyber professionals will have to up their game to stay competitive in the industry.
Kristina Beek
GITEX GLOBAL 2025
1 day 10 hours ago
1Password Addresses Critical AI Browser Agent Security Gap
3 days 23 hours ago
The security company looks to tackle new authentication challenges that could lead to credential leakage, as enterprises increasingly leverage AI browser agents.
Arielle Waldman
RondoDox Botnet: an 'Exploit Shotgun' for Edge Vulns
4 days 2 hours ago
RondoDox takes a hit-and-run, shotgun approach to exploiting bugs in consumer edge devices around the world.
Nate Nelson, Contributing Writer
The Fight Against Ransomware Heats Up on the Factory Floor
4 days 3 hours ago
Ransomware gangs continue to set their sights on the manufacturing industry, but companies are taking steps to protect themselves, starting with implementing timely patch management protocols.
Arielle Waldman
Feds Shutter ShinyHunters Salesforce Extortion Site
4 days 4 hours ago
The group warned that law-enforcement crackdowns are imminent in the wake of the takedown, but its extortion threats against Salesforce victims remain active.
Kristina Beek
Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks
4 days 5 hours ago
In a new wrinkle for adversary tactics, the Storm-2603 threat group is abusing the digital forensics and incident response (DFIR) tool to gain persistent access to victim networks.
Rob Wright
Microsoft Adds Agentic AI Capabilities to Sentinel
4 days 6 hours ago
Microsoft previewed the Sentinel security graph and MCP server at its annual Microsoft Secure virtual event earlier this month.
Jeffrey Schwartz
Deepfake Awareness High at Orgs, But Cyber Defenses Badly Lag
4 days 6 hours ago
The vast majority of organizations are encountering AI-augmented threats, but remain confident in their defenses, despite inadequate detection investment and more than half falling to successful attacks.
Robert Lemos, Contributing Writer
Commentary Section Launches New, More Opinionated Era
4 days 7 hours ago
Dark Reading is looking for leading industry experts with a point of view they want to share with the rest of the cybersecurity community for our new Commentary section.
Becky Bracken
GitHub Copilot 'CamoLeak' AI Attack Exfiltrates Data
5 days 1 hour ago
While GitHub has advanced protections for its built-in AI agent, a researcher came up with a creative proof-of-concept (PoC) attack for exfiltrating code and secrets via Copilot.
Nate Nelson, Contributing Writer
SonicWall: 100% of Firewall Backups Were Breached
5 days 2 hours ago
SonicWall said a breach it disclosed last month affected firewall configuration files for all customers who have used SonicWall’s cloud backup service — up from its previous 5% estimate.
Alexander Culafi
Fastly CISO: Using Major Incidents as Career Catalysts
5 days 5 hours ago
Marshall Erwin shares how crisis leadership shaped his path from CIA analyst to the US Congress to protecting global Web traffic at Fastly.
Kristina Beek
Take Note: Cyber-Risks With AI Notetakers
5 days 7 hours ago
Transcription applications are joining your online meetings. Here's how to create policies for ensuring compliance and security of your information.
Gadi Evron, Joe Sullivan
Chaos Ransomware Upgrades With Aggressive New C++ Variant
5 days 11 hours ago
New encryption, wiper, and cryptocurrency-stealing capabilities make the evolving ransomware-as-a-service operation more dangerous than ever.
Elizabeth Montalbano, Contributing Writer
Vampire Bot Malware Sinks Fangs Into Job Hunters
6 days ago
The campaign is the latest by BatShadow, one of a growing number of cybercrime groups operating out of Vietnam.
Jai Vijayan, Contributing Writer
Red Hat Hackers Team Up With Scattered Lapsus$ Hunters
6 days ago
Crimson Collective, which recently breached the GitLab instance of Red Hat Consulting, has teamed up with the notorious cybercriminal collective.
Rob Wright
Checked
2 hours 25 minutes ago
Public RSS feed
darkreading feed