darkreading
Secure Your Spot at RSAC 2026 Conference
1 day hence
Patch Now: Oracle's Fusion Middleware Has Critical RCE Flaw
1 day 15 hours ago
Attackers can execute arbitrary code without authentication if Oracle's Identity or Web Services Managers are exposed to the Web.
Nate Nelson
Cyber OpSec Fail: Beast Gang Exposes Ransomware Server
1 day 18 hours ago
Files on a central cloud server used by the ransomware group highlight a systematic, aggressive attack on network backups as a key TTP.
Robert Lemos
Interlock Ransomware Targets Cisco Enterprise Firewalls
1 day 21 hours ago
The ransomware gang, known for double-extortion attacks, had access to a critical Cisco firewall vulnerability weeks before it was publicly disclosed.
Alexander Culafi
AI Conundrum: Why MCP Security Can't Be Patched Away
2 days 12 hours ago
RSAC Conference Preview: MCP introduces security risks into LLM environments that are architectural and not easily fixable, researcher says.
Jai Vijayan
With Government's Role Uncertain, Businesses Unite to Combat Fraud
2 days 13 hours ago
Major industry leaders agree to share information and collaborate to boost defenses in the wake of distressing online scams.
Arielle Waldman
Native Launches With Security Control Plane for Multicloud
2 days 14 hours ago
The cloud security startup's platform translates and enforces security policies across AWS, Azure, Google Cloud, and Oracle using provider-native controls.
Dark Reading Staff
Post-Quantum Web Could be Safer, Faster
2 days 16 hours ago
Major providers are testing a quantum-safe version of HTTPS that shrinks certificates to one-tenth their previous size, decreasing latency and adding transparency.
Robert Lemos
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
2 days 19 hours ago
EU Sanctions Companies in China, Iran for Cyberattacks
3 days 3 hours ago
These rulings prohibit the entities from entering or doing business in the European Union.
Nate Nelson
C2 Implant 'SnappyClient' Targets Crypto Wallets
3 days 12 hours ago
In addition to enabling remote access, the malware supports a wide range of capabilities, including data theft and spying.
Jai Vijayan
DarkSword: iPhone Exploit Kit Serves Spies & Thieves Alike
3 days 13 hours ago
A sophisticated iOS exploit chain leverages multiple zero-day vulnerabilities and is targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine.
Alexander Culafi
'Claudy Day’ Trio of Flaws Exposes Claude Users to Data Theft
3 days 19 hours ago
A prompt injection vulnerability paired with other flaws can turn a Google search into a full attack chain that could threaten enterprise networks.
Elizabeth Montalbano
SideWinder Espionage Campaign Expands Across Southeast Asia
3 days 21 hours ago
The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent access.
Robert Lemos
Researchers: Meta, TikTok Steal Personal & Financial Info When Users Click Ads
3 days 21 hours ago
Tracking pixels let social media companies spy on their users even after they click over to advertiser sites, gleaning credit card info, geolocations, and more, according to an analysis.
Nate Nelson
More Attackers Are Logging In, Not Breaking In
4 days 12 hours ago
Credential theft soared in the second half of 2025, thanks in part to the industrialization of infostealer malware and AI-enabled social engineering.
Jai Vijayan
Clear Communication: The Missing Link in Cybersecurity Success
4 days 12 hours ago
When technical expertise meets clear communication, cybersecurity teams thrive. Learn how to foster trust and collaboration across diverse working groups.
Kristina Beek
Less Lucrative Ransomware Market Makes Attackers Alter Methods
4 days 12 hours ago
Ransomware actors are ditching Cobalt Strike in favor of native Windows tools, as payment rates hit record lows and data theft surges.
Alexander Culafi
Hackers Target Cybersecurity Firm Outpost24 in 7-Stage Phish
4 days 14 hours ago
In an unsuccessful phishing attack, threat actors leveraged trusted brands and domains to try to redirect a C-suite executive at Outpost24 to give up his credentials.
Jai Vijayan
Checked
2 hours 37 minutes ago
Public RSS feed
darkreading feed