darkreading
K2 Secures Navy SeaPort Next Generation Contract
8 months 2 weeks ago
Grupo Bimbo Ventures Announces Investment in NanoLock Security
8 months 2 weeks ago
Microsoft Cracks Down on Malicious Copilot AI Use
8 months 2 weeks ago
According to the tech giant, it has observed a threat group seeking out vulnerable customer accounts using generative AI, then creating tools to abuse these services.
Kristina Beek, Associate Editor, Dark Reading
Cloud Attackers Exploit Max-Critical Aviatrix RCE Flaw
8 months 2 weeks ago
The security vulnerability tracked as CVE-2024-50603, which rates 10 out of 10 on the CVSS scale, enables unauthenticated remote code execution on affected systems, which cyberattackers are using to plant malware.
Jai Vijayan, Contributing Writer
Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results
8 months 2 weeks ago
Threat actors are targeting people searching for pirated or cracked software with fake downloaders that include infostealing malware such as Lumma and Vidar.
Elizabeth Montalbano, Contributing Writer
Telefonica Breach Exposes Jira Tickets, Customer Data
8 months 2 weeks ago
The Hellcat ransomware group has stolen roughly 5,000 documents, potentially containing confidential information, from the telecom giant's internal database.
Kristina Beek, Associate Editor, Dark Reading
The Shifting Landscape of Open Source Security
8 months 2 weeks ago
By focusing on vigilant security practices, responsible AI deployment, and alignment with global regulatory standards, the OSS community can make 2025 a transformative year for security.
Christopher Robinson
Threat Actors Exploit a Critical Ivanti RCE Bug, Again
8 months 2 weeks ago
New year, same story. Despite Ivanti's commitment to secure-by-design principles, threat actors — possibly the same ones as before — are exploiting its edge devices for the nth time.
Nate Nelson, Contributing Writer
China's UNC5337 Exploits a Critical Ivanti RCE Bug, Again
8 months 2 weeks ago
New year, same story. Despite Ivanti's commitment to secure-by-design principles, Chinese threat actors are exploiting its edge devices for the nth time.
Nate Nelson, Contributing Writer
Fake CrowdStrike 'Job Interviews' Become Latest Hacker Tactic
8 months 2 weeks ago
Cybercriminals are luring victims into downloading the XMRig cryptomining malware via convincing emails, inviting them to schedule fake interviews using a malicious link.
Kristina Beek, Associate Editor, Dark Reading
Russia Carves Out Commercial Surveillance Success Globally
8 months 2 weeks ago
Growing sales of the System for Operative Investigative Activities (SORM), a Russian wiretapping platform, in Central Asia and Latin American suggests increasing risks for Western businesses.
Robert Lemos, Contributing Writer
The Path Toward Championing Diversity in Cybersecurity Education
8 months 2 weeks ago
To build a truly inclusive and diverse cybersecurity workforce, we need a comprehensive approach beyond recruitment and retention.
Laurie Salvail
Chinese APT Group Is Ransacking Japan's Secrets
8 months 2 weeks ago
Since 2019, MirrorFace has been stealing information from myriad Japanese organizations to gain leverage over Japan in the event of hostilities between the two countries, experts said.
Becky Bracken, Senior Editor, Dark Reading
Banshee 2.0 Malware Steals Apple's Encryption to Hide on Macs
8 months 2 weeks ago
The most recent iteration of the open source infostealer skates by antivirus programs on Macs, using an encryption mechanism stolen from Apple's own antivirus product.
Nate Nelson, Contributing Writer
Hacking Group 'Silk Typhoon' Linked to US Treasury Breach
8 months 2 weeks ago
The attack used a stolen remote support SaaS API key to exfiltrate data from workstations in the Treasury Department's Office of Foreign Assets Control.
Kristina Beek, Associate Editor, Dark Reading
New AI Challenges Will Test CISOs & Their Teams in 2025
8 months 3 weeks ago
CISOs need to recognize the new threats AI can present — while also embracing AI-powered solutions to stay ahead of those threats.
Josh Lemos
India Readies Overhauled National Data Privacy Rules
8 months 3 weeks ago
The country awaits implementation guidelines for a framework that gives Indians greater autonomy and security over their personal data — and recognizes a right to personal privacy.
Nate Nelson, Contributing Writer
Fed 'Cyber Trust' Label: Good Intentions That Fall Short
8 months 3 weeks ago
The voluntary program is intended to boost consumer confidence in vulnerable IoT devices, but experts want to see vendors held to a higher standard.
Kristina Beek, Associate Editor, Dark Reading
CrowdStrike Achieves FedRAMP Authorization for New Modules
8 months 3 weeks ago
Checked
16 hours 5 minutes ago
Public RSS feed
darkreading feed