darkreading
Cybersecurity Industry Leaders Launch the Cyber Threat Intelligence Capability Maturity Model
3 months 4 weeks ago
Dataprise Acquires Phoenix IT Adding Cyber Incident Response & Remediation Services
3 months 4 weeks ago
Votiro Unveils New Data Privacy Features and Integrations
3 months 4 weeks ago
BlankBot Trojan Targets Turkish Android Users
3 months 4 weeks ago
While still under development, the malware contains Turkish-language filenames, can record the screen and keystrokes, and inject custom overlays to steal passwords and sensitive data.
Robert Lemos, Contributing Writer
Attackers Use Multiple Techniques to Bypass Reputation-Based Security
3 months 4 weeks ago
Protections like Windows Smart App Control are useful but susceptible to attacks that allow threat actors initial access to an environment without triggering any alerts.
Jai Vijayan, Contributing Writer
Cyberattack Strikes the Grand Palais RMN; Impact Appears Limited
3 months 4 weeks ago
Everyone expected some kind of cyberattack during the Olympics. If this is the best they've got, the bad guys don't deserve a spot on the podium.
Nate Nelson, Contributing Writer
Russia's Priorities in Prisoner Swap Suggest Cyber Focus
3 months 4 weeks ago
At least two Russian nationals serving prison sentences for cybercrime offenses, Vladislav Klyushin and Roman Seleznev, were released as part of the landmark prisoner swap.
Robert Lemos, Contributing Writer
Hunters International Disguises SharpRhino RAT as Legitimate Network Admin Tool
3 months 4 weeks ago
The RaaS group that distributes Hive ransomware delivers new malware impersonating as validly signed network-administration software to gain initial access and persistence on targeted networks
Elizabeth Montalbano, Contributing Writer
Startup Spotlight: RAD Security Brings Behavioral Profiling to Cloud
3 months 4 weeks ago
Cybersecurity startup RAD Security, a finalist in this year's Black Hat USA Startup Spotlight competition, looks for "drift events," or events that vary from the baseline.
Dark Reading Staff
Preparing for the Future of Post-Quantum Cryptography
3 months 4 weeks ago
The AI boom and increasing popularity of quantum computing necessitates quantum-resilient security.
David O'Berry
Rockwell PLC Security Bypass Threatens Manufacturing Processes
3 months 4 weeks ago
A security vulnerability in Rockwell Automation's ControlLogix 1756 programmable logic controllers, tracked as CVE-2024-6242, could allow tampering with physical processes at plants.
Tara Seals, Managing Editor, News, Dark Reading
Sophisticated Android Spyware Targets Users in Russia
3 months 4 weeks ago
Researchers say "LianSpy" malware has been in use in a covert data gathering operation that's gone undetected for at least three years.
Jai Vijayan, Contributing Writer
Name That Edge Toon: Pointing Fingers
3 months 4 weeks ago
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
John Klossner, Cartoonist
20K Ubiquiti IoT Cameras & Routers Are Sitting Ducks for Hackers
3 months 4 weeks ago
In the cloud, patches disseminate automatically. On your computer, you get notified. IoT devices, meanwhile, can escape attention for years on end.
Nate Nelson, Contributing Writer
FTC Slams TikTok With Lawsuit After Continued COPPA Violations
3 months 4 weeks ago
Though TikTok is expected to adhere to certain COPPA-outlined measures, the social media giant has failed to meet those expectations, the Feds allege.
Dark Reading Staff
Critical Apache OFBiz Vulnerability Allows Preauth RCE
3 months 4 weeks ago
The enterprise resource planning platform bug CVE-2024-38856 has a vulnerability-severity score of 9.8 out of 10 on the CVSS scale and offers a wide avenue into enterprise applications for cyberattackers.
Tara Seals, Managing Editor, News, Dark Reading
China's Evasive Panda Attacks ISP to Send Malicious Software Updates
3 months 4 weeks ago
The APT used DNS poisoning to install the Macma backdoor on targeted networks and then deliver malware to steal data via post-exploitation activity.
Elizabeth Montalbano, Contributing Writer
Startup Spotlight: Knostic Tackles AI's Oversharing Problem
3 months 4 weeks ago
Cybersecurity startup Knostic, a finalist in this year's Black Hat USA Startup Spotlight competition, adds guardrails to how AI uses enterprise data to ensure sensitive data doesn't get leaked.
Dark Reading Staff
Startup Spotlight: LeakSignal Helps Plug Leaky Data in Organizations
3 months 4 weeks ago
Cybersecurity startup LeakSignal, a finalist in this year's Black Hat USA Startup Spotlight competition, helps organizations see where data is leaking within their environments.
Checked
3 hours 35 minutes ago
Public RSS feed
darkreading feed