darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
2 weeks 4 days hence
'Harmless' Global Adware Transforms Into an AV Killer
14 hours 58 minutes ago
A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender.
Nate Nelson
Two-Factor Authentication Breaks Free from the Desktop
18 hours 37 minutes ago
Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.
Arielle Waldman
Microsoft's Original Windows Secure Boot Certificate Is Expiring
18 hours 48 minutes ago
The Secure Boot refresh is one of the largest coordinated security maintenance efforts across the Windows ecosystem, Microsoft said. Update those PCs soon.
Jeffrey Schwartz
6-Year Ransomware Campaign Targets Turkish Homes & SMBs
1 day 4 hours ago
While enterprises breaches make more headlines, smaller incidents tend to be under-reported, if at all, allowing campaigns to last longer with less disruption.
Nate Nelson
Critical MCP Integration Flaw Puts NGINX at Risk
1 day 12 hours ago
Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuration files.
Jai Vijayan
Navigating the Unique Security Risks of Asia's Digital Supply Chain
1 day 14 hours ago
Regulatory differences, interconnected digital ecosystems, and the rise of AI have created a complex supply chain Asian organizations must wrangle.
Alexander Culafi
Prepping for 'Q-Day': Why Quantum Risk Management Should Start Now
1 day 18 hours ago
Quantum computers are coming and may impact systems in unexpected ways, and it will "take years to be fully quantum-safe, if ever," cryptography expert warns.
Rob Wright
Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests
1 day 19 hours ago
Google, Meta, and Microsoft about half the time don't comply with requests to opt out of online tracking per a California law mandate, privacy watchdog finds.
Elizabeth Montalbano
Microsoft, Salesforce Patch AI Agent Data Leak Flaws
1 day 22 hours ago
Two recently fixed prompt injections in Salesforce Agentforce and Microsoft Copilot would have enabled an external attacker to leak sensitive data.
Alexander Culafi
Microsoft Bets $10B to Boost Japan's AI, Cybersecurity
2 days 10 hours ago
The deal aims to accelerate AI adoption, train workers, and develop cybersecurity partnerships — the latest move by a hyperscaler to compete for sovereign AI and data centers.
Robert Lemos
Privilege Elevation Dominates Massive Microsoft Patch Update
2 days 12 hours ago
Elevation-of-privilege bugs accounted for more than half of the 165 vulnerabilities patched, with two zero-days in that mix.
Jai Vijayan
EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses
2 days 13 hours ago
Stopping EDR killers, which employ bring-your-own-vulnerable-driver (BYOVD) attack techniques, is difficult, but not impossible.
Rob Wright
War Game Exercise Demonstrates How Social Media Manipulation Works
2 days 17 hours ago
In an educational game called "Capture the Narrative," students created bots to sway a fictional election, simulating influence in real-world political scenarios.
Elizabeth Montalbano
Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads
3 days 12 hours ago
Security teams can't test distributed denial-of-service defenses in a vacuum. They need to test during periods of high demand, such as tax-filing deadlines.
Matthew Andriani
CSA: CISOs Should Prepare for Post-Mythos Exploit Storm
3 days 12 hours ago
In a new report from the Cloud Security Alliance (CSA), experts warn of an "AI vulnerability storm" triggered by the introduction of Anthropic's Claude Mythos.
Alexander Culafi
Adobe Patches Actively Exploited Zero-Day That Lingered for Months
3 days 13 hours ago
An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four months.
Jai Vijayan
Empty Attestations: OT Lacks the Tools for Cryptographic Readiness
3 days 14 hours ago
OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security.
Brad McInnis
APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials
3 days 18 hours ago
The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.
Elizabeth Montalbano
Checked
14 hours 3 minutes ago
Public RSS feed
darkreading feed