darkreading
Congress Advances Bill to Add AI to National Vulnerability Database
2 months 3 weeks ago
The AI Incident Reporting and Security Enhancement Act would allow NIST to create a process for reporting and tracking vulnerabilities found in AI systems.
Jennifer Lawinski, Contributing Writer
Public Wi-Fi Compromised in UK Train Stations
2 months 3 weeks ago
British Transport Police and Network Rail are investigating the incident, in which bad actors posted Islamophobic messages on the transport system's network.
Dark Reading Staff
Hurricane Helene Prompts CISA Fraud Warning
2 months 3 weeks ago
Beware that friendly text from the IT department giving you an "update" about restoring your broadband connectivity.
Tara Seals, Managing Editor, News, Dark Reading
Moving DevOps Security Out of 'the Stone Age'
2 months 3 weeks ago
Developers need to do more than scan code and vet software components, and ops should do more than just defend the deployment pipeline.
Robert Lemos, Contributing Writer
Moving DevOps Security Out of the 'Stone Age'
2 months 3 weeks ago
Developers need to do more than scan code and vet software components, and ops should do more than just defend the deployment pipeline.
Robert Lemos, Contributing Writer
Boredom Is the Silent Killer in Your IT Systems
2 months 3 weeks ago
An environment that values creativity, continuous learning, and calculated risk-taking can prevent boredom while building a resilient, adaptable team ready to tackle whatever challenges come their way.
Mackenzie Jackson
GenAI Writes Malicious Code to Spread AsyncRAT
2 months 3 weeks ago
Researchers have uncovered one of the first examples of threat actors using artificial intelligence chatbots for malware creation, in a phishing attack spreading the open source remote access Trojan.
Elizabeth Montalbano, Contributing Writer
'SloppyLemming' APT Abuses Cloudflare Service in Pakistan Attacks
2 months 3 weeks ago
Who needs advanced malware when you can take advantage of a bunch of OSS tools and free cloud services to compromise your target?
Nate Nelson, Contributing Writer
NIST Drops Password Complexity, Mandatory Reset Rules
2 months 3 weeks ago
The latest draft version of NIST's password guidelines simplifies password management best practices and eliminates those that did not promote stronger security.
Edge Editors
CrowdStrike Offers Mea Culpa to House Committee
2 months 3 weeks ago
The company said the rogue update that caused disruptions on a global scale resulted from a "perfect storm" of issues.
Jai Vijayan, Contributing Writer
Pwn2Own Auto Offers $500K for Tesla Hacks
2 months 3 weeks ago
There will be four major categories in the 2025 retread of the hacking competition, with prizes ranging for each challenge, from $20,000 to half a million.
Dark Reading Staff
China's 'Salt Typhoon' Cooks Up Cyberattacks on US ISPs
2 months 3 weeks ago
The state-sponsored advanced persistent threat (APT) is going after high-value communications service provider networks in the US, potentially with a dual set of goals.
Tara Seals, Managing Editor, News, Dark Reading
Third Ivanti Bug Comes Under Active Exploit, CISA Warns
2 months 3 weeks ago
Though the critical vulnerability was patched in August, Ivanti is reminding customers to update as soon as possible as attacks from unauthenticated threat actors start circulating.
Dark Reading Staff
How Russia, China & Iran Are Targeting US Elections
2 months 3 weeks ago
While these threats remain a valid concern, US government agencies have doubled down on their assurances to the American public that election infrastructure is secure.
Stephanie Schneider
Sophisticated RAT Hides Behind P. Diddy Scandal Lures
2 months 3 weeks ago
The advanced Python-based PysSilon malware can steal data, record keystrokes, and execute remote commands. The attackers behind it are promising to leak details of deleted X posts related to accused rapper and music producer Sean Combs.
Elizabeth Montalbano, Contributing Writer
US May Be Losing the Race for Global AI Leadership
2 months 3 weeks ago
To maintain AI leadership, Congress and regulatory agencies must recognize that our foreign competitors are working to surpass us.
Haiman Wong
Keep Tier-One Applications Out of Virtual Environments
2 months 3 weeks ago
Crafty bad actors can infect all of an organization's virtual machines at once, rendering tier-one applications useless.
Morey Haber
6 Cybersecurity Headaches That Sports Organizations Have to Worry About
2 months 3 weeks ago
Leaders in professional athletics lament the realities and risks of growth in connected stadium environments, social networks, and legalized gambling.
Jeffrey Schwartz, Contributing Writer
Security Concerns Plague Emerging Chip Architecture
2 months 3 weeks ago
The RISC-V chip architecture is gaining popularity worldwide, but the fact that it is easy to modify the processor design means it is also easy to introduce hard-to-patch vulnerabilities.
Agam Shah, Contributing Writer
Checked
5 hours 15 minutes ago
Public RSS feed
darkreading feed