darkreading
42% of Developers Using AI Say Their Codebase is Now Mostly AI-Generated
2 days 15 hours ago
Akira Ramps Up Assault on SonicWall Firewalls, Suggesting Zero-Day
2 days 20 hours ago
An uptick of ransomware activity by the group in late July that uses the vendor's SSL VPN devices for initial intrusion shows evidence of an as-yet-undisclosed flaw under exploitation.
Elizabeth Montalbano, Contributing Writer
Turning Human Vulnerability Into Organizational Strength
2 days 20 hours ago
Investing in building a human-centric defense involves a combination of adaptive security awareness training, a vigilant and skeptical culture, and the deployment of layered technical controls.
Erich Kron
What Is the Role of Provable Randomness in Cybersecurity?
5 days 12 hours ago
Random numbers are the cornerstone of cryptographic security. As organizations adopt quantum-resistant algorithms, it's equally important to examine the randomness underpinning them.
Duncan Jones
Dark Reading News Desk Turns 10, Back at Black Hat USA for 2025
5 days 16 hours ago
Dark Reading's 2025 News Desk marks a decade of Black Hat USA memories. We're making our return with a slate of interviews that help you stay up on the latest research from Black Hat — no trip to Las Vegas required.
Becky Bracken
LLMs' AI-Generated Code Remains Wildly Insecure
5 days 19 hours ago
Security debt ahoy: Only about half of the code that the latest large language models (LLMs) create is cybersecure, and more and more of it is being created all the time.
Robert Lemos, Contributing Writer
Building the Perfect Post-Security Incident Review Playbook
5 days 20 hours ago
By creating a safe environment for open discussion, prioritizing human context alongside technical data, and involving diverse stakeholders, organizations can turn security incidents into accelerators of resilience.
Pritesh Parekh
Male-Dominated Cyber Industry Still Holds Space for Women With Resilience
5 days 20 hours ago
When trying to crack your way into a cyber career, true passion and a bold love of the industry is a must to set yourself apart from hundreds of other job applicants, according to Weave CISO Jessica Sica, in this latest "Career Conversations With a CISO" video.
Kristina Beek, Tara Seals
New 'Shade BIOS' Technique Beats Every Kind of Security
5 days 21 hours ago
What if malware didn't require an operating system to function? How would anyone possibly notice, let alone disable it?
Nate Nelson, Contributing Writer
ISC2 Launches New Security Certificate for AI Expertise
5 days 21 hours ago
The six-course program cover topics such as AI fundamentals, ethics, and risks.
Edge Editors
SIEMs: Dying a Slow Death or Poised for AI Rebirth?
5 days 22 hours ago
The SIEM market is at a pivotal point as XDR platforms and generative AI shake up the security analytics space.
Rob Wright
CISA Releases Free Thorium Malware Analysis Tool
6 days 12 hours ago
Thorium enhances cybersecurity teams' defense capabilities by seamlessly integrating commercial, open source, and custom tools used to analyze malware.
Dark Reading Staff
Gen Z Falls for Scams 2x More Than Older Generations
6 days 13 hours ago
Forget gullible old people — Gen Z is the most at-risk age group on the Web. Older folks might want to ignore it, but employers are likely to feel the brunt.
Nate Nelson, Contributing Writer
DragonForce Ransom Cartel Profits Off Rivals' Demise
6 days 15 hours ago
The fall of RansomHub led to a major consolidation of the ransomware ecosystem last quarter, which was a boon for the DragonForce and Qilin gangs.
Alexander Culafi
SafePay Claims Ingram Micro Breach, Sets Ransom Deadline
6 days 15 hours ago
The ransomware gang claims to have stolen 3.5TB of data, and told the technology distributor to pay up or suffer a data breach.
Rob Wright
3 Things CFOs Need to Know About Mitigating Threats
6 days 17 hours ago
To reposition cybersecurity as a strategic, business-critical investment, CFOs and CISOs play a critical role in articulating the significant ROI that robust security measures can deliver.
Raymond Daoud
Russia's Secret Blizzard APT Gains Embassy Access via ISPs
6 days 18 hours ago
An ongoing AitM campaign by the infamous Moscow-sponsored cyber-threat actor has widened its scope, dropping the dangerous ApolloShadow custom backdoor malware thanks to lawful intercept systems.
Tara Seals
Getting a Cybersecurity Vibe Check on Vibe Coding
6 days 19 hours ago
Following a number of high-profile security and development issues surrounding the use of LLMs and GenAI to code and create applications, it's worth taking a temperature check to ask: Is this technology ready for prime time?
Alexander Culafi
What the Coinbase Breach Says About Insider Risk
6 days 20 hours ago
The lesson from the breach is not just about what went wrong — but what could have gone right.
Verrion Wright
Checked
12 hours 35 minutes ago
Public RSS feed
darkreading feed