darkreading
'Landfall' Malware Targeted Samsung Galaxy Users
2 days 17 hours ago
The tool let its operators secretly record conversations, track device locations, capture photos, collect contacts, and perform other surveillance on compromised devices.
Jai Vijayan, Contributing Writer
'Ransomvibing' Infests Visual Studio Extension Market
2 days 18 hours ago
A published VS Code extension didn't hide the fact that it encrypts and exfiltrates data and also failed to remove obvious signs it was AI-generated.
Alexander Culafi
Microsoft Backs Massive AI Push in UAE, Raising Security Concerns
2 days 18 hours ago
In partnership with Emirates tech company G42, Microsoft is building the first stage of a 5-gigawatt US-UAE AI campus using Nvidia GPUs.
Robert Lemos, Contributing Writer
AI Agents Are Going Rogue: Here's How to Rein Them In
3 days ago
Human-centered identity frameworks are incorrectly being applied to AI agents, creating the potential for catastrophe at machine speed, Poghosyan argues.
Art Poghosyan
AI Security Agents Get Persona Makeovers
3 days ago
New synthetic security staffers promise to bring artificial intelligence comfortably into the security operations center, but they will require governance to protect security.
Robert Lemos, Contributing Writer
Ollama, Nvidia Flaws Put AI Infrastructure at Risk
3 days 1 hour ago
Security researchers discovered multiple vulnerabilities in AI infrastructure products, including one capable of remote code execution.
Alexander Culafi
Sora 2 Makes Videos So Believable, Reality Checks Are Required
3 days 17 hours ago
Threat actors will continue to abuse deepfake technology to conduct fraudulent activity, so organizations need to implement strong security protocols – even if it adds to user friction.
Arielle Waldman
SonicWall Firewall Backups Stolen by Nation-State Actor
3 days 18 hours ago
The network security vendor said the MySonicWall breach was unrelated to the recent wave of Akira ransomware attacks targeting the company's devices.
Rob Wright
Multiple ChatGPT Security Bugs Allow Rampant Data Theft
4 days 5 hours ago
Attackers can use them to inject arbitrary prompts, exfiltrate personal user information, bypass safety mechanisms, and take other malicious actions.
Jai Vijayan, Contributing Writer
APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs
4 days 13 hours ago
A critical security issue in a popular endpoint manager (CVE-2025-61932) allowed Chinese state-sponsored attackers to backdoor Japanese businesses.
Nate Nelson, Contributing Writer
Nikkei Suffers Breach Via Slack Compromise
4 days 16 hours ago
The Japanese media giant said thousands of employee and business partners were impacted by an attack that compromised Slack account data and chat histories.
Rob Wright
Operational Technology Security Poses Inherent Risks for Manufacturers
4 days 23 hours ago
Despite increased awareness, manufacturers continue to face an onslaught of attacks.
Arielle Waldman
Critical Site Takeover Flaw Affects 400K WordPress Sites
5 days ago
Attackers are already targeting a vulnerability in the Post SMTP plug-in that allows them to fully compromise an account and website for nefarious purposes.
Elizabeth Montalbano, Contributing Writer
Risk 'Comparable' to SolarWinds Incident Lurks in Popular Software Update Tool
5 days 1 hour ago
Some of the world's biggest technology companies use a program liable to introduce malware into their software. The potential consequences are staggering, but there's an easy fix.
Nate Nelson, Contributing Writer
Closing the AI Execution Gap in Cybersecurity — A CISO Framework
5 days 1 hour ago
CISOs must navigate five critical dimensions of AI in cybersecurity: augmenting security with AI, automating security with AI, protecting AI systems, defending against AI-powered threats, and aligning AI strategies with business goals. Neglecting any of these areas is a recipe for disaster.
Adam Etherington, Rik Turner
Iran's Elusive "SmudgedSerpent' APT Phishes Influential US Policy Wonks
5 days 5 hours ago
Iran is spying on American foreign policy influencers. But exactly which of its government's APTs is responsible remains a mystery.
Nate Nelson, Contributing Writer
Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
5 days 13 hours ago
The well-known North Korean threat group continues to improve the obfuscation and anti-analysis features of its attack toolchain.
Robert Lemos, Contributing Writer
AI App Spending Report: Where Are the Security Tools?
5 days 17 hours ago
An analysis of startup firms' spending on AI applications finds the top categories to be productivity and content-generation. Security? Not so much.
Robert Lemos, Contributing Writer
Pro-Russian Hackers Use Linux VMs to Hide in Windows
5 days 17 hours ago
A threat actor known as "Curly COMrades" is using Linux VMs to remain undetected in Windows environments while conducting Russia-aligned activities.
Alexander Culafi
Checked
1 hour 3 minutes ago
Public RSS feed
darkreading feed