darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
2 weeks 6 days hence
CSA: CISOs Should Prepare for Post-Mythos Exploit Storm
1 day 9 hours ago
In a new report from the Cloud Security Alliance (CSA), experts warn of an "AI vulnerability storm" triggered by the introduction of Anthropic's Claude Mythos.
Alexander Culafi
Adobe Patches Actively Exploited Zero-Day That Lingered for Months
1 day 9 hours ago
An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four months.
Jai Vijayan
Empty Attestations: OT Lacks the Tools for Cryptographic Readiness
1 day 11 hours ago
OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security.
Brad McInnis
APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials
1 day 15 hours ago
The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.
Elizabeth Montalbano
Hims Breach Exposes the Most Sensitive Kinds of PHI
4 days 10 hours ago
Threat actors breached the telehealth brand, and now they may know patients' personal health details. What could they do with that information?
Nate Nelson
Your Next Breach Will Look Like Business as Usual
4 days 11 hours ago
These are the fundamental detection model shifts cybersecurity teams need to make to keep up with the rising number of credential-based attacks.
Jeanette Miller-Osborn
FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threats
4 days 14 hours ago
Orange Business Reimagines Enterprise Voice Communications With Trust and AI
4 days 15 hours ago
Industrial Controllers Still Vulnerable As Conflicts Move to Cyber
4 days 17 hours ago
The US government warns programmable logic controllers are being targeted, and research turns up 179 vulnerable operational technology (OT) devices.
Robert Lemos
Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?
4 days 17 hours ago
Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said.
Alexander Culafi
Russia's 'Fancy Bear' APT Continues Its Global Onslaught
5 days 9 hours ago
Victims don't need to match the cyber espionage group's technical sophistication, experts say. But patching and some form of zero trust are now non-negotiable.
Alexander Culafi
'BlueHammer' Windows Zero-Day Exploit Signals Microsoft Bug Disclosure Issues
5 days 10 hours ago
Under the alias 'Chaotic Eclipse,' a researcher released a PoC exploit for a zero-day flaw that allows for system takeover by a local user, citing an undisclosed beef with Microsoft.
Elizabeth Montalbano
Do Ceasefires Slow Cyberattacks? History Suggests Not
5 days 12 hours ago
The cybersecurity community is waiting with bated breath to see if Iranian hackers will honor a ceasefire that doesn't actually name or directly involve them.
Nate Nelson
Russia's Forest Blizzard Nabs Rafts of Logins via SOHO Routers
6 days 5 hours ago
Heard of fileless malware? How about malwareless cyber espionage? Russia's APT28 is spying on global organizations by modifying just one DNS setting in vulnerable routers.
Nate Nelson
Threat Actors Get Crafty With Emojis to Escape Detection
6 days 10 hours ago
When 🤖 means "bot available," 🧰 signifies "toolkit," or 💰💰💰 translates to "big ransom," bad actors can evade filters and keep it all on the down-low.
Jai Vijayan
AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties
6 days 10 hours ago
Discovery used to be the bottleneck for open source bugs, but with automated discovery, remediation's the bottleneck, which bounties don't fund.
Jai Vijayan
Fraud Rockets Higher in Mobile-First Latin America
6 days 14 hours ago
Cyber-fraudsters move quickly from compromised devices to account takeover to funds transfer, shifting money before many financial institutions can react.
Robert Lemos
Full Sail University to Open IBM Cyber Defense Range Powered by AWS and Cloud Range on Campus
6 days 15 hours ago
Checked
14 hours 30 minutes ago
Public RSS feed
darkreading feed