darkreading
Cleo MFT Zero-Day Exploits Are About to Escalate, Analysts Warn
10 months ago
Defenders running the Cleo managed file transfer are urged to be on the lookout for the Cleopatra backdoor and other indicators of an ongoing ransomware campaign, as patching details remain foggy, and no CVE has been issued.
Becky Bracken, Senior Editor, Dark Reading
Generative AI Security Tools Go Open Source
10 months ago
Businesses deploying large language models and other GenAI systems have a growing collection of open source tools for testing AI security.
Robert Lemos, Contributing Writer
With 'TPUXtract,' Attackers Can Steal Orgs' AI Models
10 months ago
A new side-channel attack method is a computationally practical way to infer the structure of a convolutional neural network — meaning that cyberattackers or rival companies can plagiarize AI models and take their data for themselves.
Nate Nelson, Contributing Writer
Test Your Cyber Skills With the SANS Holiday Hack Challenge
10 months ago
Open to players of all skill levels, the "Snow-mageddon" cybersecurity competition takes place in the world of Santa, elves, and Christmas mayhem.
Jennifer Lawinski
OData Injection Risk in Low-Code/No-Code Environments
10 months ago
As the adoption of LCNC grows, so will the complexity of the threats organizations face.
Amichai Shulman
'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks
10 months ago
A sophisticated social engineering cybercrime campaign bent on financial gain was observed being run from Tencent servers in Singapore.
Tara Seals, Managing Editor, News, Dark Reading
Lloyd's of London Launches New Cyber Insurance Consortium
10 months ago
Under the program, HITRUST-certified organizations gain access to exclusive coverage and rates.
Jennifer Lawinski
336K Prometheus Instances Exposed to DoS, 'Repojacking'
10 months ago
Open source Prometheus servers and exporters are leaking plaintext passwords and tokens, along with API addresses of internal locations.
Nate Nelson, Contributing Writer
Chinese Cops Caught Using Android Spyware to Track Mobile Devices
10 months 1 week ago
Law enforcement across mainland China have been using EagleMsgSpy surveillance tool to collect mobile device data since at least 2017, new research shows.
Becky Bracken, Senior Editor, Dark Reading
IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack
10 months 1 week ago
Researchers at Black Hat Europe demonstrate how to hack Ruijie Reyee access points without Wi-Fi credentials or even physical access to the device.
Becky Bracken, Senior Editor, Dark Reading
Europol Cracks Down on Holiday DDoS Attacks
10 months 1 week ago
In Operation PowerOFF, global authorities aim to deter individuals from engaging in malicious cyber acts.
Kristina Beek, Associate Editor, Dark Reading
Efforts to Secure US Telcos Beset by Salt Typhoon Might Fall Flat
10 months 1 week ago
The rules necessary to secure US communications have already been in place for 30 years, argues Sen. Wyden, the FCC just hasn't enforced them. It's unclear if they will help.
Nate Nelson, Contributing Writer
Cultivating a Hacker Mindset in Cybersecurity Defense
10 months 1 week ago
Security isn't just about tools — it's about understanding how the enemy thinks and why they make certain choices.
Roei Sherman
Chinese Hacker Pwns 81K Sophos Devices With Zero-Day Bug
10 months 1 week ago
The US State Department has offered a $10 million reward for Guan Tianfeng, who has been accused of developing and testing a critical SQL injection flaw with a CVSS score of 9.8 used in Sophos attacks.
Kristina Beek, Associate Editor, Dark Reading
Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack
10 months 1 week ago
Threat actors punch holes in the company's online ordering systems, tripping up doughnut deliveries across the US after a late November breach.
Becky Bracken, Senior Editor, Dark Reading
Symmetrical Cryptography Pioneer Targets the Post-Quantum Era
10 months 1 week ago
Researchers at Cavero have created a correlating numbers mechanism, adding a layer of privacy that even threat actors can't gain enough information to breach.
Kristina Beek, Associate Editor, Dark Reading
Researchers Crack Microsoft Azure MFA in an Hour
10 months 1 week ago
A critical flaw in the company's rate limit for failed sign-in attempts allowed unauthorized access to a user account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more.
Elizabeth Montalbano, Contributing Writer
Cybersecurity Lessons From 3 Public Breaches
10 months 1 week ago
High-profile security incidents provide examples of how common vulnerabilities can be exploited. If you pay attention, you can learn from others' mistakes.
Dmytro Tereshchenko
Tips for Preventing Breaches in 2025
10 months 1 week ago
Hackers are constantly evolving, and so too should our security protocols.
Pukar C. Hamal
Checked
4 hours 38 minutes ago
Public RSS feed
darkreading feed