darkreading
How Has IoT Security Changed Over the Past 5 Years?
1 day 4 hours ago
Experts agree there have been subtle improvements, with new laws and applied best practices, but there is still a long way to go.
Arielle Waldman
Critical SAP S/4HANA Vulnerability Under Attack, Patch Now
1 day 4 hours ago
Exploitation of CVE-2025-42957 requires "minimal effort" and can result in a complete compromise of the SAP system and host OS, according to researchers.
Rob Wright
Anyone Using Agentic AI Needs to Understand Toxic Flows
1 day 5 hours ago
The biggest vulnerabilities may lie at the boundaries of where the AI agent connects with the enterprise system.
Ericka Chickowski, Contributing Writer
Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT'
1 day 6 hours ago
TAG-150 is running a multifaceted and relatively successful malware-as-a-service operation, without advertising itself on the Dark Web.
Nate Nelson, Contributing Writer
Scammers Are Using Grok to Spread Malicious Links on X
1 day 9 hours ago
It's called "grokking," and gives spammers a way to skirt X's ban on links in promoted posts and reach larger audiences than ever before.
Nate Nelson, Contributing Writer
Embracing the Next Generation of Cybersecurity Talent
1 day 10 hours ago
Programs like student-run SOCs can expand our cybersecurity workforce and better secure our public and private entities for when, not if, cyberattacks occur.
Bruce Johnson
Federal Cuts Put Local, State Agencies at Cyber-Risk
1 day 11 hours ago
Cyberattackers target local and state agencies, a problem as the Trump administration cuts cybersecurity funds and culls workers at federal security agencies.
Robert Lemos, Contributing Writer
Sitecore Zero-Day Sparks New Round of ViewState Threats
2 days 2 hours ago
The vulnerability marks the latest example of threat actors weaponizing exposed ASP.NET machine keys for remote injection and deserialization attacks.
Rob Wright
Bridgestone Americas Confirms Cyberattack
2 days 3 hours ago
Reports of disruptions at North American plants emerged earlier this week, though the nature of the attack on the tire manufacturer remains unclear.
Kristina Beek
Chinese Hackers Game Google to Boost Gambling Sites
2 days 3 hours ago
New threat actor "GhostRedirector" is using a malicious IIS module to inject links that try to artificially boost search engine ranking for target sites.
Jai Vijayan, Contributing Writer
ISC2 Aims to Bridge DFIR Skills Gap With New Certificate
2 days 4 hours ago
The nonprofit training organization's new program addresses digital forensics, incident management, and network threat hunting.
Arielle Waldman
Phishing Empire Runs Undetected on Google, Cloudflare
2 days 4 hours ago
What's believed to be a global phishing-as-a-service enterprise using cloaking techniques has been riding on public cloud infrastructure for more than 3 years.
Elizabeth Montalbano, Contributing Writer
Czech Warning Highlights China Stealing User Data
2 days 4 hours ago
Czech cyber agency NÚKIB warned of the risks of using products and software that send data back to China.
Alexander Culafi
Blast Radius of Salesloft Drift Attacks Remains Uncertain
2 days 8 hours ago
Many high-profile Salesloft Drift customers have disclosed data breaches as a result of a recent supply chain attack, but the extent and severity of this campaign are unclear.
Alexander Culafi
UltraViolet Expands AppSec Capabilities With Black Duck's Testing Business
2 days 10 hours ago
The addition of Black Duck's application security testing offering to UltraViolet Cyber's portfolio helps security teams find and remediate issues earlier in the security lifecycle.
Dark Reading Staff
Why Threat Hunting Should Be Part of Every Security Program
2 days 10 hours ago
The more you hunt, the more you learn.
Robert Lackey
How Gray-Zone Hosting Companies Protect Data the US Wants Erased
2 days 11 hours ago
The digital refuge: Abortion clinics, activist groups, and other organizations are turning to overseas hosting providers willing to keep their data — and their work — safe.
Andrada Fiscutean
Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs
2 days 18 hours ago
The Homeland Justice APT tried spying on countries and organizations from six continents, using more than 100 hijacked email accounts.
Nate Nelson, Contributing Writer
Japan, South Korea Take Aim at North Korean IT Worker Scam
2 days 23 hours ago
With the continued success of North Korea's IT worker scams, Asia-Pacific nations are working with private firms to blunt the scheme's effectiveness.
Robert Lemos, Contributing Writer
Checked
8 hours 52 minutes ago
Public RSS feed
darkreading feed