darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
3 days 3 hours hence
76% of All Crypto Stolen in 2026 Is Now in North Korea
10 hours 58 minutes ago
North Korean threat actors are pulling off historic cryptocurrency heists on a yearly, sometimes weekly basis now. AI might be helping them.
Nate Nelson
If AI's So Smart, Why Does It Keep Deleting Production Databases?
16 hours 53 minutes ago
The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environments before proper security testing.
Alexander Culafi
Name That Toon: Mark of (Security) Progress
19 hours 32 minutes ago
Feeling creative? Have something to say about the last 20 years of cybersecurity? Our editors will award the best cybersecurity-related caption with a $20 gift card.
John Klossner
20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage
19 hours 32 minutes ago
On this day in 2006, Dark Reading went live. We have a celebration planned that spans our two decades of covering the industry, and you, dear readers, are invited.
Kelly Jackson Higgins
TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack
1 day 10 hours ago
Several npm packages for SAP's cloud application development ecosystem have been compromised as TeamPCP's supply chain attacks broaden.
Rob Wright
Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug
1 day 10 hours ago
The proof-of-concept exploit code runs only 10 lines long, but luckily, a patch is already available.
Nate Nelson
Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber
1 day 12 hours ago
In this latest installment of the Reporters' Notebook video series, we discuss how the new AI model threatens to completely upend cybersecurity, and what industry leaders are telling the press.
Becky Bracken, Kristina Beek
Oracle Red Bull Racing Team Revs Up Automation to Boost Security
1 day 17 hours ago
While drivers race to shave off seconds on the track, the team's IT and engineering staff are speeding up how they deliver security.
Arielle Waldman
Claude Mythos Fears Startle Japan's Financial Services Sector
2 days 7 hours ago
Global financial institutions are panicked over Anthropic's new superhacker AI model. Cyber experts aren't quite as worried.
Nate Nelson
Reverse Engineering With AI Unearths High-Severity GitHub Bug
2 days 11 hours ago
Wiz used an AI reverse-engineering tool to pinpoint a vulnerability that previously would have been too costly and time-consuming to undertake.
Alexander Culafi
AI Finds 38 Security Flaws in Electronic Health Record Platform
2 days 12 hours ago
Flaws in OpenEMR's platform — used by more than 100,000 healthcare providers — enabled database compromise, remote code execution, and data theft.
Jai Vijayan
Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
2 days 16 hours ago
The emerging ransomware has been deployed against victims of the TeamPCP supply chain attacks, but organizations should think twice before paying for a decryptor.
Elizabeth Montalbano
Lotus Wiper Attack Targets Venezuelan Energy Firms, Utilities
2 days 18 hours ago
An analysis of the destructive malware reveals sophisticated living-off-the-land (LotL) techniques and detailed strategies for the widespread deletion of data.
Robert Lemos
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
3 days 9 hours ago
The North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives.
Jai Vijayan
NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later
3 days 10 hours ago
Chris Inglis was the head civilian in charge at the NSA when the Snowden leaks exploded. He gets candid about mistakes the organization made, and what CISOs need to know about spotting potential threats, media disclosures, and "enculturation."
Dark Reading Editorial Team
Feuding Ransomware Groups Leak Each Other's Data
3 days 11 hours ago
When 0APT and KryBit attacked each other, they exposed infrastructure and operational data, giving defenders rare insight into ransomware operations.
Alexander Culafi
Vidar Rises to Top of Chaotic Infostealer Market
3 days 12 hours ago
The malware has filled the gap created by last year's law enforcement takedowns of Lumma and Rhadamanthys.
Jai Vijayan
Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain
3 days 16 hours ago
Attackers continue to scale a campaign to seed Open VSX with seemingly benign VS Code extensions that spread self-propagating malware.
Elizabeth Montalbano
Checked
32 minutes 56 seconds ago
Public RSS feed
darkreading feed