darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
2 weeks 3 days hence
Coast Guard's New Cybersecurity Rules Offers Lessons for CISOs
3 hours 4 minutes ago
The Maritime Transportation Security Act (MTSA) requires plans to protect OT systems, audits by independent third parties, and a hybrid OT-security role.
Robert Lemos
NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities
18 hours 16 minutes ago
The National Institute of Standards and Technology carved a new path for vulnerability remediation by changing the way it prioritizes software flaws.
Arielle Waldman
North Korea Uses ClickFix to Target macOS Users' Data
20 hours 21 minutes ago
Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.
Alexander Culafi
'Harmless' Global Adware Transforms Into an AV Killer
20 hours 56 minutes ago
A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender.
Nate Nelson
Two-Factor Authentication Breaks Free from the Desktop
1 day ago
Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.
Arielle Waldman
Microsoft's Original Windows Secure Boot Certificate Is Expiring
1 day ago
The Secure Boot refresh is one of the largest coordinated security maintenance efforts across the Windows ecosystem, Microsoft said. Update those PCs soon.
Jeffrey Schwartz
6-Year Ransomware Campaign Targets Turkish Homes & SMBs
1 day 10 hours ago
While enterprises breaches make more headlines, smaller incidents tend to be under-reported, if at all, allowing campaigns to last longer with less disruption.
Nate Nelson
Critical MCP Integration Flaw Puts NGINX at Risk
1 day 18 hours ago
Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuration files.
Jai Vijayan
Navigating the Unique Security Risks of Asia's Digital Supply Chain
1 day 20 hours ago
Regulatory differences, interconnected digital ecosystems, and the rise of AI have created a complex supply chain Asian organizations must wrangle.
Alexander Culafi
Prepping for 'Q-Day': Why Quantum Risk Management Should Start Now
2 days ago
Quantum computers are coming and may impact systems in unexpected ways, and it will "take years to be fully quantum-safe, if ever," cryptography expert warns.
Rob Wright
Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests
2 days 1 hour ago
Google, Meta, and Microsoft about half the time don't comply with requests to opt out of online tracking per a California law mandate, privacy watchdog finds.
Elizabeth Montalbano
Microsoft, Salesforce Patch AI Agent Data Leak Flaws
2 days 4 hours ago
Two recently fixed prompt injections in Salesforce Agentforce and Microsoft Copilot would have enabled an external attacker to leak sensitive data.
Alexander Culafi
Microsoft Bets $10B to Boost Japan's AI, Cybersecurity
2 days 16 hours ago
The deal aims to accelerate AI adoption, train workers, and develop cybersecurity partnerships — the latest move by a hyperscaler to compete for sovereign AI and data centers.
Robert Lemos
Privilege Elevation Dominates Massive Microsoft Patch Update
2 days 18 hours ago
Elevation-of-privilege bugs accounted for more than half of the 165 vulnerabilities patched, with two zero-days in that mix.
Jai Vijayan
EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses
2 days 19 hours ago
Stopping EDR killers, which employ bring-your-own-vulnerable-driver (BYOVD) attack techniques, is difficult, but not impossible.
Rob Wright
War Game Exercise Demonstrates How Social Media Manipulation Works
2 days 23 hours ago
In an educational game called "Capture the Narrative," students created bots to sway a fictional election, simulating influence in real-world political scenarios.
Elizabeth Montalbano
Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads
3 days 18 hours ago
Security teams can't test distributed denial-of-service defenses in a vacuum. They need to test during periods of high demand, such as tax-filing deadlines.
Matthew Andriani
CSA: CISOs Should Prepare for Post-Mythos Exploit Storm
3 days 18 hours ago
In a new report from the Cloud Security Alliance (CSA), experts warn of an "AI vulnerability storm" triggered by the introduction of Anthropic's Claude Mythos.
Alexander Culafi
Checked
3 hours 4 minutes ago
Public RSS feed
darkreading feed