darkreading
Secure Your Spot at RSAC 2026 Conference
1 week 1 day hence
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
4 days 9 hours hence
Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos
1 day 10 hours ago
The excitement around Cisco's latest SD-WAN bugs has inspired some light fraud, misunderstandings, and overlooked risks.
Nate Nelson
The Data Gap: Why Nonprofit Cyber Incidents Go Underreported
1 day 11 hours ago
Threat actors target nonprofits due to security gaps and highly coveted information, but a lack of sufficient data makes it difficult to grasp the entire picture.
Arielle Waldman
Cyberattackers Don't Care About Good Causes
1 day 12 hours ago
Sightline Security's founder and advisory board discuss how cybersecurity poses significant problems for nonprofits and suggest ways the industry can help.
Arielle Waldman
Will AI Save Consumers From Smartphone-Based Phishing Attacks?
1 day 13 hours ago
Sophisticated phishing attacks are bypassing on-device protections with troubling frequency, making it more critical than ever for users to protect themselves from potential threats, new research from Omdia shows.
Hollie Hennessy, Aaron West
Most Google Cloud Attacks Start With Bug Exploitation
1 day 16 hours ago
Forget stolen credentials and misconfigurations; AI means vulnerability exploits that beat patching cycles are the top cause of compromises in the cloud.
Robert Lemos
Real-Time Banking Trojan Strikes Brazil's Pix Users
1 day 16 hours ago
The latest banking Trojan campaign to hit Brazil combines classic malware with a real-time human operator, waiting for the perfect moment to strike.
Alexander Culafi
Why Post-Quantum Cryptography Can't Wait
2 days 7 hours ago
Organizations have to prepare to ensure they have cryptography in place in the post-quantum world.
Manju Naglapur
Iran MOIS Colludes With Criminals to Boost Cyberattacks
2 days 8 hours ago
Iranian APTs have long pretended to be cybercriminal groups. Now they're working with actual cybercriminal groups.
Nate Nelson
Commercial Spyware Opponents Fear US Policy Shifting
2 days 8 hours ago
Rescinded sanctions and reactivated contracts have created confusion about the Trump administration's spyware policy and where it draws the line.
Rob Wright
Delinea's StrongDM Acquisition Highlights the Changing Role of PAM
2 days 12 hours ago
StrongDM, which injects ephemeral, real-time credentials into developer workflows, will enable Delinea to offer privilege access management across cloud, SaaS, Kubernetes, and database environments.
Jeffrey Schwartz
Why Stryker's Outage Is a Disaster Recovery Wake-Up Call
2 days 12 hours ago
The Iranian cyberattack on Stryker is the kind of stress test that business continuity and disaster recovery programs often do not plan for.
Jai Vijayan
What Orgs Can Learn From Olympics, World Cup IR Plans
2 days 14 hours ago
In this edition of "Reporters' Notebook," we discuss cyberattackers targeting the Milan-Cortina Winter Games, adding them to a long list of global sporting events in the crosshairs. Though the attack surface is grander, there are key incident-response takeaways for regular enterprises, too.
Tara Seals
A Guy Who Wrote the Code Died in 2005. I Still Have to Secure It
3 days 7 hours ago
The real frontline of American cybersecurity is a bidding war on eBay for 30-year-old industrial controllers.
Chuck Everette
INC Ransomware Group Holds Healthcare Hostage in Oceania
3 days 7 hours ago
Government agencies, emergency clinics, and others in Australia, New Zealand, and Tonga have had serious run-ins with the prolific ransomware outfit.
Nate Nelson
Xygeni GitHub Action Compromised Via Tag Poison
3 days 9 hours ago
Attackers operated an active C2 implant for up to a week and compromised AppSec vendor Xygeni's xygeni/xygeni-action in that time.
Alexander Culafi
Chinese Nexus Actors Shift Focus to Qatar Amid Iranian Conflict
3 days 14 hours ago
Two attacks on Qatari entities signal a shift in focus for China-backed actors and demonstrate how quickly they can pivot in response to geopolitical events.
Elizabeth Montalbano
Middle East Conflict Highlights Cloud Resilience Gaps
4 days ago
Data centers — used by both governments and militaries for operations — are now fair game, not just for cyberattacks, but for kinetic attacks as well.
Robert Lemos
Checked
12 hours 23 minutes ago
Public RSS feed
darkreading feed