darkreading
Fully Patched SonicWall Gear Under Likely Zero-Day Attack
9 months ago
A threat actor with likely links to the Abyss ransomware group is leveraging an apparent zero-day vulnerability to deploy the "Overstep" backdoor on fully up-to-date appliances.
Jai Vijayan, Contributing Writer
Securing the Budget: Demonstrating Cybersecurity's Return
9 months ago
By tying security investments to measurable outcomes — like reduced breach likelihood and financial impact — CISOs can align internal stakeholders and justify spending based on real-world risk.
Kara Sprague
Altered Telegram App Steals Chinese Users' Android Data
9 months ago
Using more than 600 domains, attackers entice Chinese-speaking victims to download a vulnerable Telegram app that is nearly undetectable on older versions of Android.
Robert Lemos, Contributing Writer
Lessons Learned From McDonald's Big AI Flub
9 months ago
McDonald's hiring platform was using its original default credentials and inadvertently exposed information belonging to possibly millions of job applicants.
Alexander Culafi
AI Is Reshaping How Attorneys Practice Law
9 months ago
Experts recommend enhanced AI literacy, training around the ethics of using AI, and verification protocols to maintain credibility in an increasingly AI-influenced courtroom.
Arielle Waldman
AsyncRAT Spawns Concerning Labyrinth of Forks
9 months ago
Since surfacing on GitHub in 2019, AsyncRAT has become a poster child for how open source malware can democratize cybercrime, with a mazelike footprint of variants available across the spectrum of functionality.
Jai Vijayan, Contributing Writer
Attackers Abuse AWS Cloud to Target Southeast Asian Governments
9 months ago
The intelligence-gathering cyber campaign introduces the novel HazyBeacon backdoor and uses legitimate cloud communication channels for command-and-control (C2) and exfiltration to hide its malicious activities.
Elizabeth Montalbano, Contributing Writer
How Criminal Networks Exploit Insider Vulnerabilities
9 months ago
Criminal networks are adapting quickly, and they're betting that companies won't keep pace. Let's prove them wrong.
Rob Juncker
MITRE Launches AADAPT Framework for Financial Systems
9 months ago
The new framework is modeled after and meant to complement the MITRE ATT&CK framework, and it is aimed at detecting and responding to cyberattacks on cryptocurrency assets and other financial targets.
Kristina Beek
Web-Inject Campaign Debuts Fresh Interlock RAT Variant
9 months ago
A cyber-threat campaign is using legitimate websites to inject victims with remote access Trojans belonging to the Interlock ransomware group, in order to gain control of devices.
Alexander Culafi
Military Veterans May Be What Cybersecurity Is Looking For
9 months ago
As the field struggles with a shortage, programs that aim to provide veterans with the technical skills needed to succeed in cybersecurity may be the solution for everyone.
Kristina Beek
Google Gemini AI Bug Allows Invisible, Malicious Prompts
9 months ago
A prompt-injection vulnerability in the AI assistant allows attackers to create messages that appear to be legitimate Google Security alerts but instead can be used to target users across various Google products with vishing and phishing.
Elizabeth Montalbano, Contributing Writer
The Dark Side of Global Power Shifts & Demographic Decline
9 months ago
As global power realigns and economies falter, the rise in cybercrime is no longer hypothetical — it's inevitable.
Ty Greenhalgh
Pay2Key Ransomware Gang Resurfaces With Incentives to Attack US, Israel
9 months ago
The ransomware-as-a-service (RaaS) operation, which has been tied to an Iranian advanced persistent threat (APT) group, recently boosted its affiliate profit share to 80% for attacks on Western targets.
Rob Wright
350M Cars, 1B Devices Exposed to 1-Click Bluetooth RCE
9 months ago
Mercedes, Skoda, and Volkswagen vehicles, as well as untold industrial, medical, mobile, and consumer devices, may be vulnerable to an attack chain called "PerfektBlue."
Nate Nelson, Contributing Writer
As Cyber-Insurance Premiums Drop, Coverage Is Key to Resilience
9 months ago
Cyber-insurance premiums continue to decline from their explosive growth from 2020 to 2022, but coverage is more important than ever to manage risks, experts say.
Robert Lemos, Contributing Writer
Factoring Cybersecurity Into Finance's Digital Strategy
9 months ago
As financial institutions continue to embrace digital transformation, their success will depend on their ability to establish and maintain robust and responsible cybersecurity practices.
Jeff Prelle
Customer, Employee Data Exposed in Nippon Steel Breach
9 months 1 week ago
Information from the company's NS Solutions subsidiary has yet to show up on any Dark Web sites, but it doesn't rule out the possibility that the data may have been stolen.
Kristina Beek
Digital Fingerprints Test Privacy Concerns in 2025
9 months 1 week ago
Digital fingerprinting technology creates detailed user profiles by combining device data with location and demographics, which increases the risks of surveillance.
Stephen Lawton
Checked
1 hour 47 minutes ago
Public RSS feed
darkreading feed