darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
1 month hence
Apple Breaks Precedent, Patches DarkSword for iOS 18
13 hours 26 minutes ago
Even organizations with users unwilling or unable to adopt iOS 26 can now protect themselves from a severe mobile OS-cracking tool.
Nate Nelson
Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
15 hours 24 minutes ago
As organizations disclose breaches tied to TeamPCP's supply chain attacks, ShinyHunters and Lapsus$ are getting involved, taking credit, and creating a murky situation for enterprises.
Rob Wright
Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication
17 hours 5 minutes ago
"Skull vibration harmonics generated by vital signs" can be used to sign in to VR, AR, and MR headsets, according to emerging research.
Alexander Culafi
Claude Source Code Leak Highlights Big Supply Chain Missteps
17 hours 35 minutes ago
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.
Robert Lemos
Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain
17 hours 37 minutes ago
The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open source artifacts across containers, libraries, agent skills, and GitHub Actions.
Jeffrey Schwartz
CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry
18 hours 42 minutes ago
Once CrowdStrike's nemesis, Microsoft is now a collaborator. A shared interest in Formula 1 helped thaw the years-long fierce rivalry.
Jeffrey Schwartz
Geopolitics, AI, and Cybersecurity: Insights From RSAC 2026
1 day 9 hours ago
AI-driven threats, global leadership shifts, and the future of cybersecurity in a rapidly evolving landscape were among the discussions at RSAC 2026 Conference.
Becky Bracken, Kristina Beek
Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate
1 day 10 hours ago
The company's 8-K filing notes "unauthorized access" and that it has activated business continuity plans and taken some systems offline.
Nate Nelson
Security Bosses Are All-In on AI. Here's Why
1 day 11 hours ago
CISOs are bullish on AI and have big plans to roll out future tools. We talk to Reddit CISO Frederick Lee and leading analyst Dave Gruber about how AI is working out in the real world, as well as its future promise.
Dark Reading Staff
RSAC 2026: AI Dominates, But Community Remains Key to Security
1 day 14 hours ago
As AI took center stage at this year's conference, experts debated automation, oversight and the evolving role of human intelligence in cybersecurity — despite the US government's notable absence.
Kristina Beek, Rob Wright
Bank Trojan 'Casbaneiro' Worms Through Latin America
1 day 17 hours ago
Augmented Marauder's multipronged banking-Trojan cyber campaigns are targeting Spanish speakers, evading detection, and replicating rapidly.
Nate Nelson
Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense
2 days 8 hours ago
A chief medical information officer describes what hospitals face when they inevitably suffer a ransomware attack—whether it leads to short- or long-term outages.
Arielle Waldman
LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut
2 days 11 hours ago
A newly released study exclusively shared with Dark Reading details the unique circumstances that make up Latin America's labor pool, and why organizations may want to expand their talent search.
Alexander Culafi
Cyberattacks Intensify Pressure on Latin American Governments
2 days 13 hours ago
Cyber threats across Latin America are increasingly targeting government systems, from disruptive attacks in Puerto Rico to a surge of probes against Colombia’s health sector.
Robert Lemos
Venom Stealer MaaS Platform Commoditizes ClickFix Attacks
2 days 15 hours ago
A new service on the cybercrime market provides automated capabilities to create persistent information-stealing social engineering attacks.
Elizabeth Montalbano
Are We Training AI Too Late?
2 days 19 hours ago
Ask the Expert: Cybersecurity teams need to expand their field of view to include new, unique threat sources, rather than relying on past, proven threat actors.
Nishawn Smagh
The Forgotten Endpoint: Security Risks of Dormant Devices
3 days 8 hours ago
Technology Talk: That forgotten notebook holds plenty of secrets to enterprise access.
Abib Oyebamiji
Axios NPM Package Compromised in Precision Attack
3 days 9 hours ago
The NPM package for Axios, a popular JavaScript HTTP client library, was briefly compromised this week, possibly by North Korean threat actors.
Alexander Culafi
Checked
10 hours 33 minutes ago
Public RSS feed
darkreading feed