darkreading
TXOne Networks Introduces Capability for Intelligent Vulnerability Mitigation
7 months 4 weeks ago
'Crocodilus' Sharpens Its Teeth on Android Users
8 months ago
The data-stealing malware initially targeted users in Turkey but has since evolved into a global threat.
Jai Vijayan, Contributing Writer
Victoria's Secret Delays Earnings Call Due to Cyber Incident
8 months ago
But that didn't stop the clothing retailer from issuing preliminary results for the first quarter of 2025.
Kristina Beek, Associate Editor, Dark Reading
Chrome Drops Trust for Chunghwa, Netlock Certificates
8 months ago
Digital certificates authorized by the authorities will no longer have trust by default in the browser starting in August, over what Google said is a loss of integrity in actions by the respective companies.
Elizabeth Montalbano, Contributing Writer
LummaC2 Fractures as Acreed Malware Becomes Top Dog
8 months ago
LummaC2 formerly accounted for almost 92% of Russian Market's credential theft log alerts. Now, the Acreed infostealer has replaced its market share.
Kristina Beek, Associate Editor, Dark Reading
Is Your CISO Navigating Your Flight Path?
8 months ago
If your CISO isn't wielding influence with the CEO and helping top leaders clearly see the flight path ahead, your company is dangerously exposed.
Richard Marcus
Open-Weight Chinese AI Models Drive Privacy Innovation in LLMs
8 months ago
Edge computing and stricter regulations could usher in a new era of AI privacy.
Laura Koetzle, Omer Akgul
EMR-ISAC Shuts Down: What Happens Now?
8 months ago
This information-sharing hub provided essential information to the emergency services sector on physical and cyber threats. Some say the timing is concerning.
Arielle Waldman
Exploitation Risk Grows for Critical Cisco Bug
8 months ago
New details on the Cisco IOS XE vulnerability could help attackers develop a working exploit soon, researchers say.
Jai Vijayan, Contributing Writer
Trickbot, Conti Ransomware Operator Unmasked Amid Huge Ops Leak
8 months ago
An anonymous whistleblower has leaked large amounts of data tied to the alleged operator behind Trickbot and Conti ransomware.
Alexander Culafi, Senior News Writer, Dark Reading
Australia Begins New Ransomware Payment Disclosure Rules
8 months ago
The country will require certain organizations to report ransomware payments and communications within 72 hours after they're made or face potential civil penalties.
Kristina Beek, Associate Editor, Dark Reading
Critical Bugs Could Spark Takeover of Widely Used Fire Safety OT/ICS Platform
8 months ago
The unpatched security vulnerabilities in Consilium Safety's CS5000 Fire Panel could create "serious safety issues" in environments where fire suppression and safety are paramount, according to a CISA advisory.
Elizabeth Montalbano, Contributing Writer
Beyond the Broken Wall: Why the Security Perimeter Is Not Enough
8 months ago
Organizations need to abandon perimeter-based security for data-centric protection strategies in today's distributed IT environments.
Tim Freestone
In the AI Race With China, Don't Forget About Security
8 months ago
The US needs to establish a clear framework to provide reasonable guardrails to protect its interests — the quicker, the better.
Andrew Grotto
'Earth Lamia' Exploits Known SQL, RCE Bugs Across Asia
8 months ago
A "highly active" Chinese threat group is taking proverbial candy from babies, exploiting known bugs in exposed servers to steal data from organizations in sensitive sectors.
Nate Nelson, Contributing Writer
FBI Warns of Filipino Tech Company Running Sprawling Crypto Scams
8 months ago
The US Treasury said cryptocurrency investment schemes like the ones facilitated by Funnull Technology Inc. have cost Americans billions of dollars annually.
Kristina Beek, Associate Editor, Dark Reading
Vibe Coding Changed the Development Process
8 months ago
AI tools shook up development. Now, product security must change too.
Michael Nov
Tenable to Acquire AI Security Startup Apex
8 months ago
Apex will enhance Tenable's AI Aware tool by mitigating the threats of AI applications and tools not governed by organizations, while enforcing existing security policies.
Jeffrey Schwartz
CISO Stature Rises, but Security Budgets Remain Tight
8 months ago
The rate of compensation gains has slowed from the COVID years, and budgets remain largely static due to economic fears, but CISOs are increasingly gaining executive status and responsibilities.
Robert Lemos, Contributing Writer
Checked
1 hour 12 minutes ago
Public RSS feed
darkreading feed