darkreading
60 RubyGems Packages Steal Data From Annoying Spammers
2 days 13 hours ago
A Dark Web antihero has been stealing and then reselling credentials from unsavory online characters. Their motives are questionable, but the schadenfreude is irresistible.
Nate Nelson, Contributing Writer
BigID Launches Shadow AI Discovery to Uncover Rogue Models and Risky AI Data
2 days 17 hours ago
PwC Announces Addition of Morgan Adamski to Leadership of Cyber, Data & Technology Risk Platform
2 days 17 hours ago
Ransomware Attacks Fall by Almost Half in Q2
2 days 17 hours ago
Cybersecurity Incident at Allianz Life Exposes Personal Information of Hundreds of Thousands
2 days 17 hours ago
860K Compromised in Columbia University Data Breach
2 days 17 hours ago
While no data has yet to be misused, the university doesn't rule out the possibility of that occurring in the future, prompting it to warn affected individuals to remain vigilant in the wake of the breach.
Kristina Beek
Redefining the Role: What Makes a CISO Great
2 days 19 hours ago
Security is everyone's responsibility, but as a CISO, it starts with you.
Lane Sullivan
Data Dump From APT Actor Yields Clues to Attacker Capabilities
2 days 20 hours ago
The tranche of information includes data on recent campaigns, attack tools, compromised credentials, and command files used by a threat actor believed to be acting on behalf of China or North Korea.
Robert Lemos, Contributing Writer
Attackers Target the Foundations of Crypto: Smart Contracts
2 days 20 hours ago
A whole criminal ecosystem revolves around scamming users out of their cryptocurrency assets, but malicious — or vulnerable — smart contracts could be used against businesses as well.
Robert Lemos, Contributing Writer
Silver Fox APT Blurs the Line Between Espionage & Cybercrime
3 days 8 hours ago
Silver Fox is the Hannah Montana of Chinese threat actors, effortlessly swapping between petty criminal and nation-state-type attacks.
Nate Nelson, Contributing Writer
Air France, KLM Alert Authorities of Data Breach
3 days 12 hours ago
While no sensitive financial data like credit card information was compromised, the threat actors were able to get away with names, email addresses, phone numbers, and more.
Kristina Beek
Prime Security Wins Black Hat's Startup Spotlight Competition
3 days 12 hours ago
Security startups of all stripes submitted applications for Black Hat USA's Startup Spotlight. Prime Security won with its AI security architect platform.
Arielle Waldman
Privilege Escalation Issue in Amazon ECS Leads to IAM Hijacking
3 days 13 hours ago
A software developer discovered a way to abuse an undocumented protocol in Amazon's Elastic Container Service to escalate privileges, cross boundaries, and gain access to other cloud resources.
Rob Wright
'Samourai' Cryptomixer Founders Plead Guilty to Money Laundering
3 days 15 hours ago
As part of their plea deal, the cybercriminal founders will also have to forfeit more than $200 million.
Kristina Beek
Citizen Lab Founder Flags Rise of US Authoritarianism
3 days 15 hours ago
Citizen Lab director and founder Ron Deibert explained how civil society is locked in "vicious cycle," and human rights are being abused as a result, covering Israeli spyware, the Khashoggi killing, and an erosion of democratic norms in the US.
Alexander Culafi
Payback: 'ShinyHunters' Clocks Google via Salesforce
3 days 17 hours ago
In 2024, it was Snowflake. In 2025, it's Salesforce. ShinyHunters is back, with low-tech hacks that nonetheless manage to bring down international megaliths like Google, Cisco, and Adidas.
Nate Nelson, Contributing Writer
The Critical Flaw in CVE Scoring
3 days 19 hours ago
With informed decision-making, organizations can strengthen their overall resilience and maintain the agility needed to adapt to emerging threats, without sacrificing innovation or productivity.
Ofri Ouzan
Chanel Alerts Clients of Third-Party Breach
3 days 20 hours ago
The fashion house is added to a list of other companies that have been impacted by similar breaches, including Tiffany & Co. and Louis Vuitton.
Kristina Beek
Researcher Deploys Fuzzer to Test Autonomous Vehicle Safety
4 days 8 hours ago
As autonomous vehicles continue to evolve, new research highlights the importance of rigorous security testing to protect against both intentional attacks and unintentional unsafe commands in teleoperation systems.
Arielle Waldman
Checked
1 hour 57 minutes ago
Public RSS feed
darkreading feed