darkreading
Yet Another Way to Bypass Google Chrome's Encryption Protection
10 hours 55 minutes ago
Authors of the VoidStealer Trojan uncovered a way to get around Google's App-Bound Encryption (ABE), opening the door to infostealers.
Jai Vijayan
Instructure Breach Exposes Schools' Vendor Dependence
11 hours 11 minutes ago
ShinyHunters' attack on Instructure, which owns the widely used Canvas learning management system (LMS), carries big questions about the trust educational institutions put into their vendors.
Alexander Culafi
From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber
20 hours 14 minutes ago
As part of its 20th anniversary celebration, Dark Reading looks back on 20 of the biggest newsmaking events from the past two decades that influenced the risk landscape for today's cybersecurity teams.
Dark Reading Editorial Team
Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA
21 hours 44 minutes ago
In hard-to-detect attacks, hackers are dropping the CloudZ RAT and a fresh plug-in, Pheno, to hijack the Windows-based bridge between PCs and smartphones.
Elizabeth Montalbano
Middle East Cyber Battle Field Broadens — Especially in UAE
1 day 2 hours ago
As the war with Iran continues, breach attempts targeting the United Arab Emirates tripled in a few weeks — many targeting critical infrastructure.
Robert Lemos
Trellix Source Code Breach Highlights Growing Supply Chain Threats
1 day 11 hours ago
Info is scant, but such breaches can reveal where a security product's controls are located and how detections are designed, giving attackers a leg up.
Rob Wright
Research Hub Bridges Cybersecurity Gap for Under-Resourced Organizations
1 day 12 hours ago
The UC Berkeley Center for Long-Term Cybersecurity (CLTC) offers tools and support to schools, local governments, and non-profits as they defend themselves against a growing volume of cyberattacks.
Arielle Waldman
Why Security Leadership Makes or Breaks a Pen Test
1 day 13 hours ago
Well-run security drills go beyond checking audit boxes to identifying and addressing trouble spots. Effective leaders ensure proper scope, access, and follow-through, but it's not easy.
Jai Vijayan
Microsoft Edge Stores Passwords in Process Memory, Posing Enterprise Risk
1 day 17 hours ago
A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and thus use them to engage in further malicious activity.
Elizabeth Montalbano
How the Story of a USB Penetration Test Went Viral
1 day 20 hours ago
Two decades ago, pen tester Steve Stasiukonis caused a sensation by sprinkling rigged thumb drives around a credit union parking lot and following what curious employees did next. This episode looks back at the history-making event.
Dark Reading Editorial Team
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
1 day 21 hours ago
Physical Cargo Theft Gets a Boost From Cybercriminals
2 days 10 hours ago
Cargo theft is no longer about small groups of criminals operating on the ground, but transnational cybercriminal syndicates using access to supply chain systems to reroute goods.
Robert Lemos
RMM Tools Fuel Stealthy Phishing Campaign
2 days 11 hours ago
Attackers are abusing two remote monitoring and management (RMM) tools to evade detection in a campaign that has impacted over 80 organizations so far.
Jai Vijayan
Exploit Cyber-Frenzy Threatens Millions via Critical cPanel Vulnerability
2 days 13 hours ago
Shortly after the authentication-bypass flaw was disclosed multiple proof-of-concept exploits appeared, and one researcher claims there's been zero-day activity for at least a month.
Rob Wright
Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia
2 days 17 hours ago
More than 1,600 socially engineered messages from the China-backed advanced persistent threat (APT) group target various sectors to deliver the previously undocumented ABCDoor backdoor, ValleyRAT, and other malware.
Elizabeth Montalbano
How Dark Reading Lifted Off the Launchpad in 2006
2 days 20 hours ago
Twenty years ago, this media brand didn't have a print edition to attract eyeballs and sponsors. Top-notch content and editorial talent did the heavy lifting.
Terry Sweeney
76% of All Crypto Stolen in 2026 Is Now in North Korea
5 days 11 hours ago
North Korean threat actors are pulling off historic cryptocurrency heists on a yearly, sometimes weekly basis now. AI might be helping them.
Nate Nelson
If AI's So Smart, Why Does It Keep Deleting Production Databases?
5 days 17 hours ago
The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environments before proper security testing.
Alexander Culafi
Name That Toon: Mark of (Security) Progress
5 days 20 hours ago
Feeling creative? Have something to say about the last 20 years of cybersecurity? Our editors will award the best cybersecurity-related caption with a $20 gift card.
John Klossner
Checked
2 hours 14 minutes ago
Public RSS feed
darkreading feed