darkreading
FCC Softens Ban on Foreign-Made Routers
15 hours 21 minutes ago
The Federal Communications Commission eased some restrictions and pushed back deadlines for foreign router manufacturers, but the ban is still in place.
Jai Vijayan
Tech Can't Stop These Threats — Your People Can
16 hours 47 minutes ago
Security controls can do only so much. Here are four attacks where your employees are usually your first, and only, line of cyber defense.
A. Stryker
'Dirty Frag' Exploit Poised to Blow Up on Enterprise Linux Distros
21 hours 31 minutes ago
The privilege escalation vulnerability, which is similar to other Linux flaws like Copy Fail and Dirty Pipe, may already be under limited exploitation.
Elizabeth Montalbano
Hackers Use AI for Exploit Development, Attack Automation
23 hours 37 minutes ago
Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate complex attacks.
Alexander Culafi
Cyber Espionage Group Targets Aviation Firms to Steal Map Data
1 day ago
The campaign quietly compromises aerospace and drone operators to exfiltrate GIS files, terrain models, and GPS data and gain a clear picture of adversaries' world view.
Robert Lemos
ShinyHunters Claims Second Attack Against Instructure
3 days 16 hours ago
The edtech company is struggling to wrest control from its hackers. PII belonging to hundreds of millions of people is on the line.
Nate Nelson
After Replacing TeamPCP Malware, 'PCPJack' Steals Cloud Secrets
4 days 15 hours ago
PCPJack makes innovative use of parquet files for stealthy, pre-validated target discovery as it canvasses multiple cloud environments.
Nate Nelson
Has CISA Finally Found Its New Leader in Tom Parker?
4 days 17 hours ago
Dark Reading investigates rumors that Tom Parker, a board room "operator" and longtime cyber exec, could be next in line to take over CISA.
Becky Bracken
'TrustFall' Convention Exposes Claude Code Execution Risk
4 days 23 hours ago
Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal or no user interaction, thanks to skimpy warning dialogs.
Jai Vijayan
AI-Driven Cyberattack on Mexico Couldn't Breach OT Systems
4 days 23 hours ago
The most sophisticated AI-integrated campaign to date hit a brick wall in the form of a SCADA login screen.
Nate Nelson
VoidStealer Malware Darts Past Google Chrome's Encryption
5 days 15 hours ago
Authors of the VoidStealer Trojan uncovered yet another way to get around Google's App-Bound Encryption (ABE), opening the door to infostealers.
Jai Vijayan
Instructure Breach Exposes Schools' Vendor Dependence
5 days 15 hours ago
ShinyHunters' attack on Instructure, which owns the widely used Canvas learning management system (LMS), carries big questions about the trust educational institutions put into their vendors.
Alexander Culafi
From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber
6 days ago
As part of its 20th anniversary celebration, Dark Reading looks back on 20 of the biggest newsmaking events from the past two decades that influenced the risk landscape for today's cybersecurity teams.
Dark Reading Editorial Team
Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA
6 days 2 hours ago
In hard-to-detect attacks, hackers are dropping the CloudZ RAT and a fresh plug-in, Pheno, to hijack the Windows-based bridge between PCs and smartphones.
Elizabeth Montalbano
Middle East Cyber Battle Field Broadens — Especially in UAE
6 days 7 hours ago
As the war with Iran continues, breach attempts targeting the United Arab Emirates tripled in a few weeks — many targeting critical infrastructure.
Robert Lemos
Trellix Source Code Breach Highlights Growing Supply Chain Threats
6 days 15 hours ago
Info is scant, but such breaches can reveal where a security product's controls are located and how detections are designed, giving attackers a leg up.
Rob Wright
Research Hub Bridges Cybersecurity Gap for Under-Resourced Organizations
6 days 16 hours ago
The UC Berkeley Center for Long-Term Cybersecurity (CLTC) offers tools and support to schools, local governments, and non-profits as they defend themselves against a growing volume of cyberattacks.
Arielle Waldman
Why Security Leadership Makes or Breaks a Pen Test
6 days 18 hours ago
Well-run security drills go beyond checking audit boxes to identifying and addressing trouble spots. Effective leaders ensure proper scope, access, and follow-through, but it's not easy.
Jai Vijayan
Microsoft Edge Stores Passwords in Process Memory, Posing Enterprise Risk
6 days 21 hours ago
A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and thus use them to engage in further malicious activity.
Elizabeth Montalbano
Checked
1 hour 35 minutes ago
Public RSS feed
darkreading feed