darkreading
Microsoft: New Variant of macOS Threat XCSSET Spotted in the Wild
1 month 1 week ago
Microsoft is warning the modular and potentially wormable Apple-focused infostealer boasts new capabilities for obfuscation, persistence, and infection, and could lead to a supply chain attack.
Elizabeth Montalbano, Contributing Writer
Introducing enQase for Quantum-Safe Security
1 month 1 week ago
This Security Firm's 'Bias' Is Also Its Superpower
1 month 2 weeks ago
Credible Security's founders bring their varied experiences to help growing companies turn trust into a strategic advantage.
Mercedes Cardona
Open Source AI Models: Perfect Storm for Malicious Code, Vulnerabilities
1 month 2 weeks ago
Companies pursing internal AI development using models from Hugging Face and other open source repositories need to focus on supply chain security and checking for vulnerabilities.
Robert Lemos, Contributing Writer
How Banks Can Adapt to the Rising Threat of Financial Crime
1 month 2 weeks ago
Banking fraud and financial crimes are growing more sophisticated every day. By understanding the threats and building strong collaborations, banks can protect themselves and their clients.
Alena Robertson
Salt Typhoon Exploits Cisco Devices in Telco Infrastructure
1 month 2 weeks ago
The China-sponsored state espionage group has exploited known, older bugs in Cisco gear for successful cyber intrusions on six continents in the past two months.
Nate Nelson, Contributing Writer
Warning: Tunnel of Love Leads to Scams
1 month 2 weeks ago
Romance-baiting losses were up 40% last year, as more and more pig-butchering efforts crop up in the wild.
Kristina Beek, Associate Editor, Dark Reading
CyberArk Makes Identity Security Play With Zilla Acquisition
1 month 2 weeks ago
CyberArk announces the Zilla deal on the same day leading identity service provider SailPoint returns to the public markets.
Jeffrey Schwartz
Roundtable: Is DOGE Flouting Cybersecurity for US Data?
1 month 2 weeks ago
Cybersecurity experts weigh in on the red flags flying around the new Department of Government Efficiency's handling of the mountains of US data it now has access to, potentially without basic information security protections in place.
Becky Bracken, Senior Editor, Dark Reading
Chinese APT 'Emperor Dragonfly' Moonlights With Ransomware
1 month 2 weeks ago
Pivoting from prior cyber espionage, the threat group deployed its backdoor tool set to ultimately push out RA World malware, demanding $2 million from its victim.
Kristina Beek, Associate Editor, Dark Reading
How Public & Private Sectors Can Better Align Cyber Defense
1 month 2 weeks ago
With investment in cybersecurity capabilities and proactive measures to address emerging challenges, we can work together to navigate the complexities of combating cybercrime.
Chris Henderson
Japan Goes on Offense With New 'Active Cyber Defense' Bill
1 month 2 weeks ago
Japan is on a mission to catch up to the US standard of national cyber preparedness, and its new legislation is a measure intended to stop escalating Chinese cyber-espionage efforts, experts say.
Nate Nelson, Contributing Writer
President Trump to Nominate Former RNC Official as National Cyber Director
1 month 2 weeks ago
Sean Cairncross will be one of the primary advisers to the administration on national cybersecurity matters.
Jai Vijayan, Contributing Writer
Content Credentials Technology Verifies Image, Video Authenticity
1 month 2 weeks ago
The open technology, which tackles disinformation, has gained steam in the past year, surpassing 500 corporate members and continuing to evolve.
Robert Lemos, Contributing Writer
Feds Sanction Russian Hosting Provider for Supporting LockBit Attacks
1 month 2 weeks ago
US, UK, and Australian law enforcement have targeted a company called Zservers (and two of its administrators) for providing bulletproof hosting services to the infamous ransomware gang.
Elizabeth Montalbano, Contributing Writer
Microsoft: Russia's Sandworm APT Exploits Edge Bugs Globally
1 month 2 weeks ago
Sandworm (aka Seashell Blizzard) has an initial access wing called "BadPilot" that uses standard intrusion tactics to spread Russia's tendrils around the world.
Nate Nelson, Contributing Writer
Is AI a Friend or Foe of Healthcare Security?
1 month 2 weeks ago
When it comes to keeping patient information safe, people empowerment is just as necessary as deploying new technologies.
Claudio Gallo
India's Cybercrime Problems Grow as Nation Digitizes
1 month 2 weeks ago
More than half of attacks on Indian businesses come from outside the country, while 45% of those targeting consumers come from Cambodia, Myanmar, and Laos.
Robert Lemos, Contributing Writer
Gartner: Most Security Leaders Cannot Balance Data Security, Business Goals
1 month 2 weeks ago
The analyst firm recommends defining security and governance processes while reducing friction for business stakeholders.
Edge Editors
Checked
5 hours 7 minutes ago
Public RSS feed
darkreading feed