darkreading
Secure Your Spot at RSAC 2026 Conference
1 month 1 week hence
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
1 month hence
Senegalese Data Breaches Expose Lack of 'Security Maturity'
20 hours 10 minutes ago
Green Blood Group steals personal records and biometric data of the West African nation's nearly 20 million residents.
Nate Nelson, Contributing Writer
North Korea's UNC1069 Hammers Crypto Firms With AI
1 day 7 hours ago
In moving away from traditional banks to focus on Web3 companies, the threat actor is leveraging LLMs, deepfakes, legitimate platforms, and ClickFix.
Alexander Culafi
How to Stay on Top of Future Threats With a Cutting-Edge SOC
1 day 8 hours ago
CISOs should focus on harnessing and securing AI and building new skills among their people. Vision and change management can transform security.
Richard Thurston
Automaker Secures the Supply Chain With Developer-Friendly Platform
1 day 9 hours ago
How a platform engineering team embeds supply chain security into infrastructure without slowing developers.
Joan Goodchild
AI Rising: Do We Know Enough About the Data Populating It?
1 day 14 hours ago
Organizations remain reluctant to address the fact that AI can dangerously expose business operations as well as personal data.
Adam Strange
Top Cyber Industry Defenses Spike CO2 Emissions
1 day 15 hours ago
Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks.
Nate Nelson, Contributing Writer
Asia Fumbles With Throttling Back Telnet Traffic in Region
2 days 3 hours ago
Only Taiwan made the top 10 list of governments, effectively blocking the threat-ridden protocol, but overall, the region lagged in curbing Telnet traffic.
Robert Lemos, Contributing Writer
SolarWinds WHD Attacks Highlight Risks of Exposed Apps
2 days 7 hours ago
Organizations that have exposed their instances of Web Help Desk to the public Internet have inadvertently made them prime targets for attackers.
Rob Wright
In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware'
2 days 7 hours ago
With access to SIM, location data, and a preview of recent SMSes, attackers have everything they need for account takeover or targeted social engineering.
Alexander Culafi
Microsoft Patches 6 Actively Exploited Zero-Days
2 days 8 hours ago
Three of those zero-days are security feature bypass flaws, which give attackers a way to slip past built-in protections in multiple Microsoft products.
Jai Vijayan, Contributing Writer
OT Attacks Get Scary With 'Living-off-the-Plant' Techniques
2 days 12 hours ago
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.
Nate Nelson, Contributing Writer
TransUnion's Real Networks Deal Focuses on Robocall Blocking
3 days 6 hours ago
The acquisition allows the credit reporting agency to add SMS spam and scam prevention to its robocall blocking capabilities.
Jeffrey Schwartz
Warlock Gang Breaches SmarterTools Via SmarterMail Bugs
3 days 7 hours ago
The ransomware group breached SmarterTools through a vulnerability in the company's own SmarterMail product.
Alexander Culafi
TeamPCP Turns Cloud Infrastructure Into Crime Bots
3 days 7 hours ago
The threat actor has been compromising cloud environments at scale with automated worm-like attacks on exposed services and interfaces.
Jai Vijayan, Contributing Writer
'Reynolds' Bundles BYOVD With Ransomware Payload
3 days 8 hours ago
Researchers discovered a newly disclosed vulnerable driver embedded in Reynolds' ransomware, illustrating the increasing popularity of the defense-evasion technique.
Rob Wright
What Organizations Need to Change When Managing Printers
3 days 11 hours ago
Ask the Expert: Organizations need to close the ownership vacuum, establish durable security controls, and ensure printers are protected as rigorously as other endpoints.
Jim LaRoe
'Encrypt It Already' Campaign Pushes Big Tech to Prioritize E2E Encryption
6 days 12 hours ago
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption (E2E) by default across their services, as privacy concerns mount amid increased AI use.
Arielle Waldman
Checked
9 hours 8 minutes ago
Public RSS feed
darkreading feed