darkreading
Secure Your Spot at RSAC 2026 Conference
5 days 4 hours hence
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
1 day 8 hours hence
More Attackers Are Logging In, Not Breaking In
8 hours 14 minutes ago
Credential theft soared in the second half of 2025, thanks in part to the industrialization of infostealer malware and AI-enabled social engineering.
Jai Vijayan
Less Lucrative Ransomware Market Makes Attackers Alter Methods
8 hours 38 minutes ago
Ransomware actors are ditching Cobalt Strike in favor of native Windows tools, as payment rates hit record lows and data theft surges.
Alexander Culafi
Hackers Target Cybersecurity Firm Outpost24 in 7-Stage Phish
10 hours 37 minutes ago
In an unsuccessful phishing attack, threat actors leveraged trusted brands and domains to try to redirect a C-suite executive at Outpost24 to give up his credentials.
Jai Vijayan
Warlock Ransomware Group Augments Post-Exploitation Activities
14 hours 42 minutes ago
In a recent attack, the group showcased stealthier cross-network activity, thanks to its use of a new BYOVD technique and other tools.
Elizabeth Montalbano
China-Nexus Hackers Skulk in Southeast Asian Military Orgs for Years
1 day 5 hours ago
Researchers uncovered an extensive cyber espionage campaign that used novel backdoors and familiar evasion techniques to maintain persistent access to regional targets.
Rob Wright
GlassWorm Malware Evolves to Hide in Dependencies
1 day 9 hours ago
Researchers have identified dozens of malicious GlassWorm extensions that come with new evasion techniques.
Alexander Culafi
Inside Olympic Cybersecurity: Lessons From Paris 2024 to Milan Cortina 2026
1 day 9 hours ago
Discover how Franz Regul, former CISO for the Paris 2024 Olympics, tackled unique cybersecurity challenges to protect the Games from evolving threats.
Kristina Beek
Attackers Abuse LiveChat to Phish Credit Card, Personal Data
1 day 16 hours ago
A social engineering campaign impersonating PayPal and Amazon uses customer support interactions to acquire sensitive info.
Elizabeth Montalbano
Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos
4 days 10 hours ago
The excitement around Cisco's latest SD-WAN bugs has inspired some light fraud, misunderstandings, and overlooked potential hazards.
Nate Nelson
The Data Gap: Why Nonprofit Cyber Incidents Go Underreported
4 days 12 hours ago
Threat actors target nonprofits due to security gaps and highly coveted information, but a lack of sufficient data makes it difficult to grasp the entire picture.
Arielle Waldman
Cyberattackers Don't Care About Good Causes
4 days 13 hours ago
Sightline Security's founder and advisory board discuss how cybersecurity poses significant problems for nonprofits and suggest ways the industry can help.
Arielle Waldman
Will AI Save Consumers From Smartphone-Based Phishing Attacks?
4 days 14 hours ago
Sophisticated phishing attacks are bypassing on-device protections with troubling frequency, making it more critical than ever for users to protect themselves from potential threats, new research from Omdia shows.
Hollie Hennessy, Aaron West
Most Google Cloud Attacks Start With Bug Exploitation
4 days 16 hours ago
Forget stolen credentials and misconfigurations. Thanks to AI, the new top cause of compromises in the cloud is vulnerability exploits that beat patching cycles.
Robert Lemos
Real-Time Banking Trojan Strikes Brazil's Pix Users
4 days 17 hours ago
The latest banking Trojan campaign to hit Brazil combines classic malware with a real-time human operator, waiting for the perfect moment to strike.
Alexander Culafi
Why Post-Quantum Cryptography Can't Wait
5 days 8 hours ago
Organizations have to prepare to ensure they have cryptography in place in the post-quantum world.
Manju Naglapur
Iran MOIS Colludes With Criminals to Boost Cyberattacks
5 days 9 hours ago
Iranian APTs have long pretended to be cybercriminal groups. Now they're working with actual cybercriminal groups.
Nate Nelson
Commercial Spyware Opponents Fear US Policy Shifting
5 days 9 hours ago
Rescinded sanctions and reactivated contracts have created confusion about the Trump administration's spyware policy and where it draws the line.
Rob Wright
Checked
4 hours 19 minutes ago
Public RSS feed
darkreading feed