Cybersecurity News Feed

Latest cybersecurity incidents and threat intelligence from trusted sources.

498
Total Articles
49
Ransomware Attacks
43
Data Breaches

498 articles found

Startup Spotlight: Twine Security Tackles the Execution Gap
Security News

The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses multi-agent system to build AI Digital Employees.

08/06/2026 Dark Reading
Anthropic AI Used to Automate Data Extortion Campaign
Security News

The company said the threat actor abused its Claude Code service to "an unprecedented degree," automating reconnaissance, intrusions, and cr...

08/27/2025 Dark Reading
'ZipLine' Phishers Flip Script as Victims Email First
Security News

"ZipLine" appears to be a sophisticated and carefully planned campaign that has already affected dozens of small, medium, and large organiza...

08/27/2025 Dark Reading
Nevada's State Agencies Shutter in Wake of Cyberattack
Security News

In response to a cyberattack that was first detected on Sunday, the governor shut down in-person services for state offices while restoration efforts ...

08/27/2025 Dark Reading
China Hijacks Captive Portals to Spy on Asian Diplomats
Phishing

The Mustang Panda APT is hijacking Google Chrome browsers when they attempt to connect to new networks and redirecting them to phishing sites.

08/27/2025 Dark Reading
Google: Salesforce Attacks Stemmed From Third-Party App
Security News

A group tracked as UNC6395 engaged in "widespread data theft" via compromised OAuth tokens from a third-party app called Salesloft Drift.

08/27/2025 Dark Reading
Storm-0501 Hits Enterprise With 'Cloud-Based Ransomware' Att...
Ransomware

The financially motivated threat group used cloud resources to conduct a complex, ransomware-style attack against an enterprise victim.

08/27/2025 Dark Reading
AI-Powered Ransomware Has Arrived With 'PromptLock'
Ransomware

Researchers raise the alarm that a new, rapidly evolving ransomware strain uses an OpenAI model to render and execute malicious code in real time, ush...

08/27/2025 Dark Reading
African Law Enforcement Agencies Nab Cybercrime Syndicates
Security News

African nations work with Interpol and private-sector partners to disrupt cybercriminal operations on the continent, but more work needs to be done.

08/27/2025 Dark Reading
Hackers Lay in Wait, Then Knocked Out Iran Ship Comms
Security News

Lab-Dookhtegen claims major attack on more than 60 cargo ships and oil tankers belonging to two Iranian companies on US sanctions list.

08/25/2025 Dark Reading
FTC Chair Tells Tech Giants to Hold the Line on Encryption
Security News

The chairman sent letters out to companies like Apple, Meta, and Microsoft, advising them not to adhere to the demands of foreign governments to weake...

08/25/2025 Dark Reading
ClickFix Attack Tricks AI Summaries Into Pushing Malware
Malware

Because instructions appear to come from AI-generated content summaries and not an external source, the victim is more likely to follow them without s...

08/25/2025 Dark Reading
Fast-Spreading, Complex Phishing Campaign Installs RATs
Phishing

Attackers not only steal credentials but also can maintain long-term, persistent access to corporate networks through the global campaign.

08/25/2025 Dark Reading
Securing the Cloud in an Age of Escalating Cyber Threats
Security News

As threats intensify and cloud adoption expands, organizations must leave outdated security models behind.

08/25/2025 Dark Reading
Silk Typhoon Attacks North American Orgs in the Cloud
Malware

A Chinese APT is going where most APTs don't: deep into the cloud, compromising supply chains and deploying uncommon malware.

08/22/2025 Dark Reading
ReVault Flaw Exposed Millions of Dell Laptops to Malicious D...
Data Breach

A bug in the control board that connects peripheral devices in commonly used Dell laptops allowed malicious access all the way down to the firmware ru...

08/22/2025 Dark Reading
Apple Intelligence Is Picking Up More User Data Than Expecte...
Ransomware

Music tastes, location information, even encrypted messages — Apple's servers are gathering a "surprising" amount of personal data through A...

08/22/2025 Dark Reading
Interpol Arrests Over 1K Cybercriminals in 'Operation Sereng...
Phishing

The operation disrupted countless scams, and authorities seized a significant amount of evidence and recovered nearly $100 million in lost funds.

08/22/2025 Dark Reading
Apple Patches Zero-Day Flaw Used in 'Sophisticated' Attack
Malware

CVE-2025-43300 is the latest zero-day bug used in cyberattacks against "targeted individuals," which could signify spyware or nation-state h...

08/22/2025 Dark Reading
The Growing Challenge of AI Agent and NHI Management
Security News

The growing ecosystem of agents, chatbots, and machine credentials that outnumber human users by an order of magnitude is creating a poorly understood...

08/22/2025 Dark Reading
Insurers May Limit Payments in Cases of Unpatched CVEs
Security News

Some insurers look to limit payouts to companies that don't remediate serious vulnerabilities in a timely manner. Unsurprisingly, most companies don't...

08/22/2025 Dark Reading
Do Claude Code Security Reviews Pass the Vibe Check?
Security News

AI-assisted security reviews from Anthropic and others could help level up enterprise application security in the era of vibe coding.

08/22/2025 Dark Reading
Personal Liability, Security Becomes Bigger Issues for CISOs
Security News

While the furor from CISO prosecutions has died down, worries continue over a lack of liability protections and potential targeting by cybercriminals ...

08/22/2025 Dark Reading
System Shocks? EV Smart Charging Tech Poses Cyber-Risks
Security News

Trend Micro's Salvatore Gariuolo talks with the Black Hat USA 2025 News Desk about how the new ISO 15118 standard for electric vehicle smart charging ...

08/21/2025 Dark Reading
Scattered Spider Member Sentenced to a Decade in Prison
Security News

Noah Michael Urban, 20, was one of several members of the Scattered Spider collective who were arrested and charged in 2024 in connection with high-pr...

08/21/2025 Dark Reading
Easy ChatGPT Downgrade Attack Undermines GPT-5 Security
Security News

By using brief, plain clues in their prompts that are likely to influence the app to query older models, a user can downgrade ChatGPT for malicious en...

08/21/2025 Dark Reading
Why Video Game Anti-Cheat Systems Are a Cybersecurity Goldmi...
Security News

Sam Collins and Marius Muench of the University of Birmingham, UK, join the Black Hat USA 2025 News Desk to explain how anti-cheat systems in video ga...

08/21/2025 Dark Reading
How Architectural Controls Help Can Fill the AI Security Gap
Security News

NCC Group's David Brauchler III shared how foundational controls and threat modeling strategies can help secure agentic AI tools in ways traditional g...

08/21/2025 Dark Reading
Hackers Abuse VPS Infrastructure for Stealth, Speed
Security News

New research highlights how threat actors abuse legitimate virtual private server offerings in order to spin up infrastructure cheaply, quietly, and f...

08/21/2025 Dark Reading
K-12 School Incident Response Plans Fall Short
Security News

Quick recovery relies on three security measures.

08/21/2025 Dark Reading
Tree of AST: A Bug-Hunting Framework Powered by LLMs
Security News

Teenaged security researchers Sasha Zyuzin and Ruikai Peng discuss how their new vulnerability discovery framework leverages LLMs to address limitatio...

08/21/2025 Dark Reading
Prepping the Front Line for MFA Social Engineering Attacks
Security News

Attackers will continue to evolve, and the help desk will always be a target. But with the right mix of training, support, and trust, frontline agents...

08/21/2025 Dark Reading
Tailing Hackers, Columbia University Uses Logging to Improve...
Data Breach

Logging netflows provided valuable insight about attacker tactics during a breach by state-sponsored hackers targeting Columbia's research labs.

08/21/2025 Dark Reading
DARPA: Closing the Open Source Security Gap With AI
Security News

DARPA's Kathleen Fisher discusses the AI Cyber Challenge at DEF CON 33, and the results that proved how automation can help patch vulnerabilities at s...

08/21/2025 Dark Reading
Hacktivist Tied to Multiple Cyber Groups Sentenced to Jail
Security News

At one point, Al-Tahery Al-Mashriky was hacking thousands of websites within the span of three months while stealing personal data and sensitive infor...

08/21/2025 Dark Reading
DPRK, China Suspected in South Korean Embassy Attacks
Phishing

Detailed spear-phishing emails sent to European government entities in Seoul are being tied to North Korea, China, or both.

08/21/2025 Dark Reading
How Warlock Ransomware Targets Vulnerable SharePoint Servers
Ransomware

Researchers highlight how Warlock, a new ransomware heavyweight, uses its sophisticated capabilities to target on-premises SharePoint instances.

08/20/2025 Dark Reading
Cybercriminals Abuse Vibe Coding Service to Create Malicious...
Security News

Some LLM-created scripts and emails can lower the barrier of entry for low-skill attackers, who can use services like Lovable to create convincing, ef...

08/20/2025 Dark Reading
FBI, Cisco Warn of Russian Attacks on 7-Year-Old Flaw
Data Breach

In the past year, "Static Tundra," aka "Energetic Bear," has breached thousands of end-of-life Cisco devices unpatched against a 2...

08/20/2025 Dark Reading
Side of Fries With That Bug? Hacker Finds Flaws in McDonald'...
Security News

Exposure of APIs, sensitive data, and corporate documents are just some of the security issues that the purveyor of Big Macs was cooking up.

08/20/2025 Dark Reading
How Outer Space Became the Next Big Attack Surface
Security News

VisionSpace Technologies' Andrzej Olchawa and Milenko Starcik discussed a set of vulnerabilities capable of ending space missions at the Black Hat USA...

08/20/2025 Dark Reading
Incode Acquires AuthenticID to Enhance AI-Driven Identity Ve...
Security News

The combination of Incode's AI models and AuthenticID's experience running identity programs at scale in regulated environments will provide customers...

08/20/2025 Dark Reading
Europe's Ransomware Surge Is a Warning Shot for US Defenders
Ransomware

We can strip attackers of their power by implementing layered defenses, ruthless patch management, and incident response that assumes failure and prio...

08/20/2025 Dark Reading
Asian Orgs Shift Cybersecurity Requirements to Suppliers
Data Breach

The uptick in breaches in Asia has prompted a Japanese chipmaker and the Singaporean government to require vendors to pass cybersecurity checks to do ...

08/20/2025 Dark Reading
Russian Hacktivists Take Aim at Polish Power Plant, Again
Security News

This attack was seemingly more successful than the first iteration, causing disruptions at the plant.

08/19/2025 Dark Reading
Agentic AI, Apple Intelligence, EV Chargers: Everyday Cybers...
Security News

Cybersecurity risks can come from everywhere, as these riveting Dark Reading News Desk videos detail. Check out Part 1 of our broadcast coverage of th...

08/19/2025 Dark Reading
How to Vibe Code With Security in Mind
Security News

As more organizations integrate vibe coding and AI-assisted coding into their application development processes, it's important to remember to put sec...

08/19/2025 Dark Reading
'RingReaper' Sneaks Right Past Linux EDRs
Security News

The highly sophisticated post-compromise tool abuses the Linux kernel's io_uring interface to remain hidden from endpoint detection and response syste...

08/19/2025 Dark Reading
AI Agents Access Everything, Fall to Zero-Click Exploit
Security News

Zenity CTO Michael Bargury joins the Black Hat USA 2025 News Desk to discuss research on a dangerous exploit, how generative AI technology has "g...

08/19/2025 Dark Reading
Millions Allegedly Affected in Allianz Insurance Breach
Data Breach

Have I Been Pwned claims that the compromised data includes physical addresses, dates of birth, phone numbers, and more, for life insurance customers.

08/19/2025 Dark Reading
PipeMagic Backdoor Resurfaces as Part of Play Ransomware Att...
Ransomware

Attackers are wielding the sophisticated modular malware while exploiting CVE-2025-29824, a previously zero-day flaw in Windows Common Log File System...

08/19/2025 Dark Reading
10 Major GitHub Risk Vectors Hidden in Plain Sight
Supply Chain

By addressing these overlooked risk vectors, organizations can continue leveraging GitHub's innovation while protecting against sophisticated supply c...

08/19/2025 Dark Reading
'DripDropper' Hackers Patch Their Own Exploit
Malware

An attacker is breaking into Linux systems via a widely abused 2-year-old vulnerability in Apache ActiveMQ, installing malware and then patching the f...

08/19/2025 Dark Reading
Noodlophile Stealer Hides Behind Bogus Copyright Complaints
Phishing

Noodlophile is targeting enterprises in spear-phishing attacks using copyright claims as phishing lures.

08/18/2025 Dark Reading
Workday Breach Likely Linked to ShinyHunters Salesforce Atta...
Data Breach

The HR giant said hackers mounted a socially engineered cyberattack on its third-party CRM system but did not gain access to customer information; onl...

08/18/2025 Dark Reading
How Evolving RATs Are Redefining Enterprise Security Threats
Security News

A more unified and behavior-aware approach to detection can significantly improve security outcomes.

08/18/2025 Dark Reading
Internet-wide Vulnerability Enables Giant DDoS Attacks
Ddos

A good chunk of all websites today have been affected by the biggest DDoS risk on the Web since 2023.

08/18/2025 Dark Reading
Defending Against Cloud Threats Across Multicloud Environmen...
Security News

The vast majority of companies are using more than one cloud platform, yet struggle to establish and monitor security across different environments gi...

08/18/2025 Dark Reading
New Crypto24 Ransomware Attacks Bypass EDR
Ransomware

While several cybercrime groups have embraced "EDR killers," researchers say the deep knowledge and technical skills demonstrated by Crypto2...

08/15/2025 Dark Reading
Colt Telecommunications Struggles in Wake of Cyber Incident
Security News

The UK telco said it temporarily took some systems offline as a "protective" measure in its investigation.

08/15/2025 Dark Reading
Using Security Expertise to Bridge the Communication Gap
Security News

Cybersecurity-focused leadership delivers better products and business outcomes.

08/15/2025 Dark Reading
Water Systems Under Attack: Norway, Poland Blame Russia Acto...
Security News

Water and wastewater systems have become a favored target of nation-state actors, drawing increasing scrutiny following attacks on systems in multiple...

08/15/2025 Dark Reading
Downgrade Attack Allows Phishing Kits to Bypass FIDO
Phishing

You probably can't break FIDO authentication. Still, researchers have shown that there are ways to get around it.

08/14/2025 Dark Reading
State and Local Leaders Lobby Congress for Cybersecurity Res...
Security News

Federal funding cuts to the Multi-State Information Sharing and Analysis Center (MS-ISAC) are about to leave more than 18,000 state and local organiza...

08/14/2025 Dark Reading
Police & Government Email Access for Sale on Dark Web
Security News

Cybercriminals are auctioning off live email credentials, giving other criminals access to sensitive systems, confidential intelligence, and, potentia...

08/14/2025 Dark Reading
CISA Warns N-able Bugs Under Attack, Patch Now
Security News

Two critical N-able vulnerabilities enable local code execution and command injection; they require authentication to exploit, suggesting they wouldn'...

08/14/2025 Dark Reading
Cybersecurity Spending Slows & Security Teams Shrink
Security News

Security budgets are lowest in healthcare, professional and business services, retail, and hospitality, but budget growth remained above 5% in financi...

08/14/2025 Dark Reading
Navigating the Cybersecurity Budget Tug-of-War
Security News

Companies ready to move beyond reactive defense and toward full-spectrum protection need to invest in strategies that rally around resiliency, unified...

08/14/2025 Dark Reading
North Korea Attacks South Koreans With Ransomware
Ransomware

DPRK hackers are throwing every kind of malware at the wall and seeing what sticks, deploying stealers, backdoors, and ransomware all at once.

08/14/2025 Dark Reading
Fortinet Products Are in the Crosshairs Again
Security News

The company disclosed a critical FortiSIEM flaw with a PoC exploit for it the same week researchers warned of an ominous surge in malicious traffic ta...

08/13/2025 Dark Reading
Whispers of XZ Utils Backdoor Live on in Old Docker Images
Malware

Developers maintaining the images made the "intentional choice" to leave the artifacts available as "a historical curiosity," give...

08/13/2025 Dark Reading
Popular AI Systems Still a Work-in-Progress for Security
Security News

According to a recent Forescout analysis, open source models were significantly less successful in vulnerability research than commercial and undergro...

08/13/2025 Dark Reading
Patch Now: Attackers Target OT Networks via Critical RCE Fla...
Security News

Researchers observed exploitation attempts against a vulnerability with a CVSS score of 10 in a popular Erlang-based platform for critical infrastruct...

08/13/2025 Dark Reading
What the LockBit 4.0 Leak Reveals About RaaS Groups
Ransomware

The leak serves as a wake-up call: Being prepared is the cornerstone of a successful defense, and those who don't prepare are going to face uncertaint...

08/13/2025 Dark Reading
How an AI-Based 'Pen Tester' Became a Top Bug Hunter on Hack...
Security News

AI researcher explains how an automated penetration-testing tool became the first non-human member on HackerOne to reach the top of the platform's US ...

08/13/2025 Dark Reading
China Questions Security of AI Chips From NVIDIA, AMD
Malware

The US banned the sale of AI chips to China and then backed off. Now, Chinese sources are calling on NVIDIA to prove its AI chips have no backdoors.

08/13/2025 Dark Reading
Elevation-of-Privilege Vulns Dominate Microsoft's Patch Tues...
Security News

The company's August security update consisted of patches for 111 unique Common Vulnerabilities and Exposures (CVEs).

08/12/2025 Dark Reading
Charon Ransomware Emerges With APT-Style Tactics
Ransomware

The first documented deployment of the novel malware in a campaign against the Middle Eastern public sector and aviation industry may be tied to China...

08/12/2025 Dark Reading
How to Stay a Step Ahead of a Non-Obvious Threat
Security News

Securing business logic isn't just a technical requirement — it's a business imperative.

08/12/2025 Dark Reading
ShinyHunters Tactics Now Mirror Scattered Spider
Security News

There's growing evidence that two of arguably the most dangerous cybercrime groups out there are tag-teaming big targets.

08/12/2025 Dark Reading
BlackSuit Ransomware Takes an Infrastructure Hit From Law En...
Ransomware

A swarm of US agencies joined with international partners to take down servers and domains and seize more than $1 million associated with BlackSuit (R...

08/11/2025 Dark Reading
REvil Actor Accuses Russia of Planning 2021 Kaseya Attack
Ransomware

REvil affiliate Yaroslav Vasinskyi, who was convicted last year for his role in the 2021 Kaseya ransomware supply chain attack, said the Russian gover...

08/11/2025 Dark Reading
Echo Chamber, Prompts Used to Jailbreak GPT-5 in 24 Hours
Security News

Researchers paired the jailbreaking technique with storytelling in an attack flow that used no inappropriate language to guide the LLM into producing ...

08/11/2025 Dark Reading
Utilities, Factories at Risk From Encryption Holes in Indust...
Security News

The OPC UA communication protocol is widely used in industrial settings, but despite its complex cryptography, the open source protocol appears to be ...

08/11/2025 Dark Reading
Will Secure AI Be the Hottest Career Path in Cybersecurity?
Security News

Securing AI systems represents cybersecurity's next frontier, creating specialized career paths as organizations grapple with novel vulnerabilities, r...

08/11/2025 Dark Reading
60 RubyGems Packages Steal Data From Annoying Spammers
Security News

A Dark Web antihero has been stealing and then reselling credentials from unsavory online characters. Their motives are questionable, but the schadenf...

08/08/2025 Dark Reading
Ransomware Attacks Fall by Almost Half in Q2
Ransomware

08/08/2025 Dark Reading
860K Compromised in Columbia University Data Breach
Data Breach

While no data has yet to be misused, the university doesn't rule out the possibility of that occurring in the future, prompting it to warn affected in...

08/08/2025 Dark Reading
Redefining the Role: What Makes a CISO Great
Security News

Security is everyone's responsibility, but as a CISO, it starts with you.

08/08/2025 Dark Reading
Data Dump From APT Actor Yields Clues to Attacker Capabiliti...
Security News

The tranche of information includes data on recent campaigns, attack tools, compromised credentials, and command files used by a threat actor believed...

08/08/2025 Dark Reading
Attackers Target the Foundations of Crypto: Smart Contracts
Phishing

A whole criminal ecosystem revolves around scamming users out of their cryptocurrency assets, but malicious — or vulnerable — smart contracts could be...

08/08/2025 Dark Reading
Silver Fox APT Blurs the Line Between Espionage & Cyberc...
Security News

Silver Fox is the Hannah Montana of Chinese threat actors, effortlessly swapping between petty criminal and nation-state-type attacks.

08/08/2025 Dark Reading
Air France, KLM Alert Authorities of Data Breach
Data Breach

While no sensitive financial data like credit card information was compromised, the threat actors were able to get away with names, email addresses, p...

08/07/2025 Dark Reading
Privilege Escalation Issue in Amazon ECS Leads to IAM Hijack...
Security News

A software developer discovered a way to abuse an undocumented protocol in Amazon's Elastic Container Service to escalate privileges, cross boundaries...

08/07/2025 Dark Reading
'Samourai' Cryptomixer Founders Plead Guilty to Money Launde...
Security News

As part of their plea deal, the cybercriminal founders will also have to forfeit more than $200 million.

08/07/2025 Dark Reading
Citizen Lab Founder Flags Rise of US Authoritarianism
Malware

Citizen Lab director and founder Ron Deibert explained how civil society is locked in "vicious cycle," and human rights are being abused as ...

08/07/2025 Dark Reading
Payback: 'ShinyHunters' Clocks Google via Salesforce
Security News

In 2024, it was Snowflake. In 2025, it's Salesforce. ShinyHunters is back, with low-tech hacks that nonetheless manage to bring down international meg...

08/07/2025 Dark Reading
The Critical Flaw in CVE Scoring
Security News

With informed decision-making, organizations can strengthen their overall resilience and maintain the agility needed to adapt to emerging threats, wit...

08/07/2025 Dark Reading
Chanel Alerts Clients of Third-Party Breach
Data Breach

The fashion house is added to a list of other companies that have been impacted by similar breaches, including Tiffany & Co. and Louis Vuitton.

08/07/2025 Dark Reading
Researcher Deploys Fuzzer to Test Autonomous Vehicle Safety
Security News

As autonomous vehicles continue to evolve, new research highlights the importance of rigorous security testing to protect against both intentional att...

08/07/2025 Dark Reading
Critical Zero-Day Bugs Crack Open CyberArk, HashiCorp Passwo...
Security News

Secrets managers hold all the keys to an enterprise's kingdom. Two popular ones had longstanding, critical, unauthenticated RCE vulnerabilities.

08/06/2025 Dark Reading
'ReVault' Security Flaws Impact Millions of Dell Laptops
Security News

The now-patched vulnerabilities exist at the firmware level and enable deep persistence on compromised systems.

08/06/2025 Dark Reading
VexTrio Cybercrime Outfit Run by Legit Ad Tech Firms
Security News

New research reveals that a malicious traffic distribution system (TDS) is run not by "hackers in hoodies," but by a series of corporations ...

08/06/2025 Dark Reading
Google Gemini AI Bot Hijacks Smart Homes, Turns Off the Ligh...
Security News

Using invisible prompts, the attacks demonstrate a physical risk that could soon become reality as the world increasingly becomes more interconnected ...

08/06/2025 Dark Reading
Attackers Exploit Critical Trend Micro Apex One Zero-Day Fla...
Security News

Two critical vulnerabilities affect the security vendor's management console, one of which is under active exploitation. The company has updated cloud...

08/06/2025 Dark Reading
What CMMC 3.0 Really Means for Government Contractors
Security News

The ultimate goal of CMMC 3.0 is not just compliance — it's resilience.

08/06/2025 Dark Reading
Phishers Abuse Microsoft 365 to Spoof Internal Users
Security News

The "Direct Send" feature simplifies internal message delivery for trusted systems, and the campaign successfully duped both Microsoft Defen...

08/06/2025 Dark Reading
With Eyes on AI, African Orgs Push Security Awareness
Security News

Against the backdrop of the artificial intelligence surge, most African organizations have some form of cybersecurity awareness training but fail to t...

08/06/2025 Dark Reading
To Raise or Not to Raise: Bootstrapped Founders Share Their ...
Security News

A trio of startup founders — GreyNoise's Andrew Morris, Thinkst Canary's Haroon Meer, and runZero's HD Moore — agree that raising venture capital fund...

08/06/2025 Dark Reading
Pandora Confirms Third-Party Data Breach, Warns of Phishing ...
Data Breach

The jewelry retailer is warning customers that their data can and might be used maliciously.

08/05/2025 Dark Reading
RCE Flaw in AI-Assisted Coding Tool Poses Software Supply Ch...
Supply Chain

A critical vulnerability in the trust model of Cursor, a fast-growing tool for LLM-assisted development, allows for silent and persistent remote code ...

08/05/2025 Dark Reading
Cisco User Data Stolen in Vishing Attack
Phishing

The networking giant said this week that an employee suffered a voice phishing attack that resulted in the compromise of select user data, including e...

08/05/2025 Dark Reading
Why the Old Ways Are Still the Best for Most Cybercriminals
Security News

While the cybercrime underground has professionalized and become more organized in recent years, threat actors are, to a great extent, still using the...

08/05/2025 Dark Reading
Google Chrome Enterprise: More Than an Access Point to the W...
Security News

In a conversation with Dark Reading's Terry Sweeney, Lauren Miskelly from Google explains that Chrome Enterprise is the same Chrome browser that consu...

08/05/2025 Dark Reading
Nvidia Patches Critical RCE Vulnerability Chain
Security News

The flaws in the company's Triton Inference Server enables model theft, data leaks, and response manipulation.

08/04/2025 Dark Reading
CISA & FEMA Announce $100M+ in Community Cybersecurity G...
Security News

The grants are intended to help states, tribes, and localities enhance their cybersecurity resilience by providing them with monetary resources to red...

08/04/2025 Dark Reading
Threat Actors Increasingly Leaning on GenAI Tools
Security News

From "eCrime" actors to fake IT tech workers, CrowdStrike researchers found that adversaries are using AI to enhance their offensive cyber o...

08/04/2025 Dark Reading
Darktrace Acquires Mira Security
Security News

08/04/2025 Dark Reading
Akira Ramps Up Assault on SonicWall Firewalls, Suggesting Ze...
Ransomware

An uptick of ransomware activity by the group in late July that uses the vendor's SSL VPN devices for initial intrusion shows evidence of an as-yet-un...

08/04/2025 Dark Reading
Turning Human Vulnerability Into Organizational Strength
Security News

Investing in building a human-centric defense involves a combination of adaptive security awareness training, a vigilant and skeptical culture, and th...

08/04/2025 Dark Reading
GITEX GLOBAL 2025
Security News

08/02/2025 Dark Reading
Dark Reading News Desk Turns 10, Back at Black Hat USA for 2...
Security News

Dark Reading's 2025 News Desk marks a decade of Black Hat USA memories. We're making our return with a slate of interviews that help you stay up on th...

08/01/2025 Dark Reading
LLMs' AI-Generated Code Remains Wildly Insecure
Security News

Security debt ahoy: Only about half of the code that the latest large language models (LLMs) create is cybersecure, and more and more of it is being c...

08/01/2025 Dark Reading
Building the Perfect Post-Security Incident Review Playbook
Security News

By creating a safe environment for open discussion, prioritizing human context alongside technical data, and involving diverse stakeholders, organizat...

08/01/2025 Dark Reading
Male-Dominated Cyber Industry Still Holds Space for Women Wi...
Security News

When trying to crack your way into a cyber career, true passion and a bold love of the industry is a must, if you want to set yourself apart from hund...

08/01/2025 Dark Reading
New 'Shade BIOS' Technique Beats Every Kind of Security
Malware

What if malware didn't require an operating system to function? How would anyone possibly notice, let alone disable it?

08/01/2025 Dark Reading
ISC2 Launches New Security Certificate for AI Expertise
Security News

The six-course program cover topics such as AI fundamentals, ethics, and risks.

08/01/2025 Dark Reading
SIEMs: Dying a Slow Death or Poised for AI Rebirth?
Security News

The SIEM market is at a pivotal point as XDR platforms and generative AI shake up the security analytics space.

08/01/2025 Dark Reading
Gen Z Falls for Scams 2x More Than Older Generations
Phishing

Forget gullible old people — Gen Z is the most at-risk age group on the Web. Older folks might want to ignore it, but employers are likely to feel th...

07/31/2025 Dark Reading
DragonForce Ransom Cartel Profits Off Rivals' Demise
Ransomware

The fall of RansomHub led to a major consolidation of the ransomware ecosystem last quarter, which was a boon for the DragonForce and Qilin gangs.

07/31/2025 Dark Reading
SafePay Claims Ingram Micro Breach, Sets Ransom Deadline
Ransomware

The ransomware gang claims to have stolen 3.5TB of data, and told the technology distributor to pay up or suffer a data breach.

07/31/2025 Dark Reading
3 Things CFOs Need to Know About Mitigating Threats
Security News

To reposition cybersecurity as a strategic, business-critical investment, CFOs and CISOs play a critical role in articulating the significant ROI that...

07/31/2025 Dark Reading
Russia's Secret Blizzard APT Gains Embassy Access via ISPs
Malware

An ongoing AitM campaign by the infamous Moscow-sponsored cyber-threat actor has widened its scope, dropping the dangerous ApolloShadow custom backdoo...

07/31/2025 Dark Reading
Getting a Cybersecurity Vibe Check on Vibe Coding
Security News

Following a number of high-profile security and development issues surrounding the use of LLMs and GenAI to code and create applications, it's worth t...

07/31/2025 Dark Reading
What the Coinbase Breach Says About Insider Risk
Data Breach

The lesson from the breach is not just about what went wrong — but what could have gone right.

07/31/2025 Dark Reading
Dark Reading Confidential: Funding the CVE Program of the Fu...
Security News

Dark Reading Confidential Episode 8: Federal funding for the CVE Program expires in April 2026, and a trio of experts agree the industry isn't doing e...

07/31/2025 Dark Reading
Low-Code Tools in Microsoft Azure Allowed Unprivileged Acces...
Security News

Using the API Connections for Azure Logic Apps, a security researcher found unauthenticated users could access sensitive data of other customers.

07/31/2025 Dark Reading
Koreans Hacked, Blackmailed by 250+ Fake Mobile Apps
Malware

A swath of copycat Korean apps are hiding spyware, occasionally leading to highly personal, disturbing extortions.

07/31/2025 Dark Reading
Silk Typhoon Linked to Powerful Offensive Tools, PRC-Backed ...
Security News

An unsealed indictment associated with the Chinese threat group shows its members worked for companies closely aligned with the PRC as part of a large...

07/30/2025 Dark Reading
The CrowdStrike Outage Was Bad, but It Could Have Been Worse
Security News

A year after the largest outage in IT history, organizations need to make an active effort to diversify their technology and software vendors and crea...

07/30/2025 Dark Reading
ChatGPT, GenAI Tools Open to 'Man in the Prompt' Browser Att...
Security News

A brand-new cyberattack vector allows threat actors to use a poisoned browser extension to inject malicious prompts into all of the top generative AI ...

07/30/2025 Dark Reading
African Orgs Fall to Mass Microsoft SharePoint Exploits
Security News

The National Treasury of South Africa is among the half-dozen known victims in South Africa — along with other nations — of the mass compromise of on-...

07/30/2025 Dark Reading
Nimble 'Gunra' Ransomware Evolves With Linux Variant
Ransomware

The emerging cybercriminal gang, which initially targeted Microsoft Windows systems, is looking to go cross-platform using sophisticated, multithread ...

07/29/2025 Dark Reading
Critical Flaw in Vibe-Coding Platform Base44 Exposes Apps
Security News

A now-patched authentication issue on the popular vibe-coding platform gave unauthorized users open access to any private application on Base44.

07/29/2025 Dark Reading
The Hidden Threat of Rogue Access
Security News

With the right IGA tools, governance policies, and risk thresholds, enterprises can continuously detect and act on rogue access before attackers do.

07/29/2025 Dark Reading
Supply Chain Attacks Spotted in GitHub Actions, Gravity Form...
Malware

Researchers discovered backdoors, poisoned code, and malicious commits in some of the more popular tool developers, jeopardizing software supply chain...

07/29/2025 Dark Reading
Insurance Giant Allianz Life Grapples With Breach Affecting ...
Data Breach

The company has yet to report an exact number of how many individuals were impacted by the breach and plans to start the notification process around A...

07/28/2025 Dark Reading
Chaos Ransomware Rises as BlackSuit Gang Falls
Ransomware

Researchers detailed a newer double-extortion ransomware group made up of former members of BlackSuit, which was recently disrupted by international l...

07/28/2025 Dark Reading
Sophisticated Shuyal Stealer Targets 19 Browsers, Demonstrat...
Malware

A new infostealing malware making the rounds can exfiltrate credentials and other system data even from browsing software considered more privacy-focu...

07/28/2025 Dark Reading
How to Spot Malicious AI Agents Before They Strike
Security News

The rise of agentic AI means the battle of the machines is just beginning. To win, we'll need our own agents — human and machine — working together.

07/28/2025 Dark Reading
Cyber Career Opportunities: Weighing Certifications vs. Degr...
Security News

Longtime CISO Melina Scotto joins Dark Reading to discuss career advice gleaned from her 30 years in the cyber industry.

07/25/2025 Dark Reading
'Fire Ant' Cyber Spies Compromise Siloed VMware Systems
Security News

Suspected China-nexus threat actors targeted virtual environments and used several tools and techniques to bypass security barriers and reach isolated...

07/25/2025 Dark Reading
AI-Generated Linux Miner 'Koske' Beats Human Malware
Malware

AI malware is becoming less of a gimmick, with features that meet or exceed what traditional human-developed malware typically can do.

07/25/2025 Dark Reading
North Korea's IT Worker Rampage Continues Amid DoJ Action
Security News

Arrests and indictments keep coming, but the North Korean fake IT worker scheme is only snowballing, and businesses can't afford to assume their appli...

07/25/2025 Dark Reading
Why Security Nudges Took Off
Security News

Nudges can be powerful — but they are not immune to overuse or misapplication.

07/25/2025 Dark Reading
The Young and the Restless: Young Cybercriminals Raise Conce...
Security News

National governments warn that many hacker groups attract young people through a sense of community, fame, or the promise of money and the perception ...

07/25/2025 Dark Reading
Law Enforcement Cracks Down on XSS — but Will It Last?
Security News

The arrest of a suspected administrator for the popular cybercrime forum was one of several enforcement actions in the past week targeting malicious a...

07/24/2025 Dark Reading
Ransomware Actors Pile on 'ToolShell' SharePoint Bugs
Ransomware

Storm-2603, a China-based threat actor, is targeting SharePoint customers in an ongoing ransomware campaign.

07/24/2025 Dark Reading
Translating Cyber-Risk for the Boardroom
Security News

When security leaders embrace this truth and learn to speak in the language of leadership, they don't just protect the enterprise, they help lead it f...

07/24/2025 Dark Reading
Banking Trojan Coyote Abuses Windows UI Automation
Malware

It's the first known instance of malware that abuses the UIA framework and has enabled dozens of attacks against banks and crypto exchanges in Brazil.

07/23/2025 Dark Reading
Dark Web Hackers Moonlight as Travel Agents
Security News

Hackers are using stolen goods such as credit cards and loyalty points to book travel for sometimes unsuspecting clients, and remote workers, SMBs, tr...

07/23/2025 Dark Reading
Department of Education Site Mimicked in Phishing Scheme
Phishing

An ongoing phishing campaign is using fake versions of the department's G5 grant portal, taking advantage of political turmoil associated with the DoE...

07/23/2025 Dark Reading
Stop AI Bot Traffic: Protecting Your Organization's Website
Security News

As crawlers and bots bog down websites in the era of AI, some researchers say that the solution for the Internet's most vulnerable websites is already...

07/23/2025 Dark Reading
US Nuclear Agency Hacked in Microsoft SharePoint Frenzy
Security News

Threat actors are piling on the zero-day vulnerabilities in SharePoint, including at least three Chinese nation-state cyber-espionage groups.

07/23/2025 Dark Reading
Lumma Stealer Is Back & Stealthier Than Ever
Malware

The operators of the popular and prolific malware wasted no time in regrouping after an FBI takedown in May, and they're back to their old tricks.

07/23/2025 Dark Reading
Why ISO 42001 Matters for AI Governance at Scale
Security News

How a new international standard is shaping the future of responsible AI development and deployment.

07/23/2025 Dark Reading
China Introduces National Cyber ID Amid Privacy Concerns
Security News

China officially rolled out a voluntary Internet identity system to protect citizens' online identities and personal information, but critics worry ab...

07/23/2025 Dark Reading
3 China Nation-State Actors Target SharePoint Bugs
Security News

Hackers and cybercrime groups are part of a virtual feeding frenzy, after Microsoft's recent disclosure of new vulnerabilities in on-premises editions...

07/22/2025 Dark Reading
Dell Breached by Extortion Group, Says Data Stolen Was 'Fake...
Data Breach

The World Leaks group accessed and released data from the company's Customer Solution Center, which is separated from customer and partner systems and...

07/22/2025 Dark Reading
Darktrace Acquires Mira Security for Network Visibility
Ransomware

The acquisition gives the British cybersecurity solutions provider more insights into encrypted network traffic and additional decryption capabilities...

07/22/2025 Dark Reading
Critical Infrastructure Security Is a Critical Concern
Security News

To be truly resilient in the ever-growing threat landscape, organizations need to balance protection with preparation.

07/22/2025 Dark Reading
Coast Guard Issues Cybersecurity Rule for Maritime Transport...
Security News

The cybersecurity requirements follow an extended timeline over the next two years, and are meant to secure US shipping ports from disruption by malic...

07/22/2025 Dark Reading
China-Backed APT41 Cyberattack Surfaces in Africa
Security News

Up to now, the prolific China-sponsored cyber-espionage group has been mostly absent from the region, but a sophisticated and highly targeted attack o...

07/22/2025 Dark Reading
Malicious Implants Are Coming to AI Components, Applications
Security News

A red teamer is publishing research next month about how weaknesses in modern security products lay the groundwork for stealthy implants in AI-powered...

07/21/2025 Dark Reading
Europol Sting Leaves Russian Cybercrime's 'NoName057(16)' Gr...
Ddos

National authorities have issued seven arrest warrants in total relating to the cybercrime collective known as NoName057(16), which recruits followers...

07/21/2025 Dark Reading
Microsoft Rushes Emergency Patch for Actively Exploited Shar...
Security News

Malicious actors already have already pounced on the zero-day vulnerability, tracked as CVE-2025-53770, to compromise US government agencies and other...

07/21/2025 Dark Reading
Containment as a Core Security Strategy
Security News

We cannot keep reacting to vulnerabilities as they emerge. We must assume the presence of unknown threats and reduce the blast radius that they can af...

07/21/2025 Dark Reading
'PoisonSeed' Attacker Skates Around FIDO Keys
Phishing

Researchers discovered a novel phishing attack that serves the victim a QR code as part of supposed multifactor authentication (MFA), in order to get ...

07/18/2025 Dark Reading
Nearly 2,000 MCP Servers Possess No Security Whatsoever
Security News

Authentication in MCP — the backbone of agentic AI — is optional, and nobody's implementing it. Instead, they're allowing any passing attackers full c...

07/18/2025 Dark Reading
3 Ways Security Teams Can Minimize Agentic AI Chaos
Security News

Security often lags behind innovation. The path forward requires striking a balance.

07/18/2025 Dark Reading
Firmware Vulnerabilities Continue to Plague Supply Chain
Supply Chain

Four flaws in the basic software for Gigabyte motherboards could allow persistent implants, underscoring problems in the ways firmware is developed an...

07/18/2025 Dark Reading
4 Chinese APTs Attack Taiwan's Semiconductor Industry
Security News

Chinese threat actors have turned to cyberattacks as a way to undermine and destabilize Taiwan's most important industrial sector.

07/18/2025 Dark Reading
Cisco Discloses '10' Flaw in ISE, ISE-PIC — Patch Now
Security News

Cisco just disclosed a critical severity flaw in its ISE and ISE-PIC products, joining two similar bugs disclosed last month.

07/17/2025 Dark Reading
Printer Security Gaps: A Broad, Leafy Avenue to Compromise
Security News

Security teams aren't patching firmware promptly, no one's vetting the endpoints before purchase, and visibility into potential dangers is limited — d...

07/17/2025 Dark Reading
Armenian Extradited to US Over Ryuk Ransomware
Ransomware

The suspect faces three charges for his alleged crimes that could earn him up to five years in federal prison, and a heap of fines.

07/17/2025 Dark Reading
Why Cybersecurity Still Matters for America's Schools
Security News

Cyberattacks on educational institutions are growing. But with budget constraints and funding shortfalls, leadership teams are questioning whether — a...

07/17/2025 Dark Reading
China-Backed Salt Typhoon Hacks US National Guard for Nearly...
Security News

Between March and December of last year, infamous Chinese state-sponsored APT Salt Typhoon gained access to sensitive US National Guard data.

07/17/2025 Dark Reading
ISC2 Finds Orgs Are Increasingly Leaning on AI
Security News

While many organizations are eagerly integrating AI into their workflows and cybersecurity practices, some remain undecided and even concerned about p...

07/16/2025 Dark Reading
Elite 'Matanbuchus 3.0' Loader Spruces Up Ransomware Infecti...
Ransomware

An upgraded cybercrime tool is designed to make targeted ransomware attacks as easy and effective as possible, with features like EDR-spotting and DNS...

07/16/2025 Dark Reading
Oracle Fixes Critical Bug in Cloud Code Editor
Security News

The bug allowed an attacker an easy way to compromise full suite of developer tools in Oracle Cloud Infrastructure.

07/16/2025 Dark Reading
Women Who 'Hacked the Status Quo' Aim to Inspire Cybersecuri...
Security News

A group of female cybersecurity pioneers will share what they've learned about navigating a field dominated by men, in order to help other women empow...

07/16/2025 Dark Reading
Fully Patched SonicWall Gear Under Likely Zero-Day Attack
Ransomware

A threat actor with likely links to the Abyss ransomware group is leveraging an apparent zero-day vulnerability to deploy the "Overstep" bac...

07/16/2025 Dark Reading
Securing the Budget: Demonstrating Cybersecurity's Return
Data Breach

By tying security investments to measurable outcomes — like reduced breach likelihood and financial impact — CISOs can align internal stakeholders and...

07/16/2025 Dark Reading
Altered Telegram App Steals Chinese Users' Android Data
Security News

Using more than 600 domains, attackers entice Chinese-speaking victims to download a vulnerable Telegram app that is nearly undetectable on older vers...

07/16/2025 Dark Reading
Lessons Learned From McDonald's Big AI Flub
Data Breach

McDonald's hiring platform was using its original default credentials and inadvertently exposed information belonging to approximately 64 million job ...

07/15/2025 Dark Reading
AI Is Reshaping How Attorneys Practice Law
Security News

Experts recommend enhanced AI literacy, training around the ethics of using AI, and verification protocols to maintain credibility in an increasingly ...

07/15/2025 Dark Reading
AsyncRAT Spawns Concerning Labyrinth of Forks
Ransomware

Since surfacing on GitHub in 2019, AsyncRAT has become a poster child for how open source malware can democratize cybercrime, with a mazelike footprin...

07/15/2025 Dark Reading
Attackers Abuse AWS Cloud to Target Southeast Asian Governme...
Malware

The intelligence-gathering cyber campaign introduces the novel HazyBeacon backdoor and uses legitimate cloud communication channels for command-and-co...

07/15/2025 Dark Reading
How Criminal Networks Exploit Insider Vulnerabilities
Security News

Criminal networks are adapting quickly, and they're betting that companies won't keep pace. Let's prove them wrong.

07/15/2025 Dark Reading
MITRE Launches AADAPT Framework for Financial Systems
Security News

The new framework is modeled after and meant to complement the MITRE ATT&CK framework, and it is aimed at detecting and responding to cyberattacks...

07/15/2025 Dark Reading
Web-Inject Campaign Debuts Fresh Interlock RAT Variant
Ransomware

A cyber-threat campaign is using legitimate websites to inject victims with remote access Trojans belonging to the Interlock ransomware group, in orde...

07/14/2025 Dark Reading
Military Veterans May Be What Cybersecurity Is Looking For
Security News

As the field struggles with a shortage, programs that aim to provide veterans with the technical skills needed to succeed in cybersecurity may be the ...

07/14/2025 Dark Reading
Google Gemini AI Bug Allows Invisible, Malicious Prompts
Phishing

A prompt-injection vulnerability in the AI assistant allows attackers to create messages that appear to be legitimate Google Security alerts but inste...

07/14/2025 Dark Reading
The Dark Side of Global Power Shifts & Demographic Decli...
Security News

As global power realigns and economies falter, the rise in cybercrime is no longer hypothetical — it's inevitable.

07/14/2025 Dark Reading
Pay2Key Ransomware Gang Resurfaces With Incentives to Attack...
Ransomware

The ransomware-as-a-service (RaaS) operation, which has been tied to an Iranian advanced persistent threat (APT) group, recently boosted its affiliate...

07/11/2025 Dark Reading
350M Cars, 1B Devices Exposed to 1-Click Bluetooth RCE
Data Breach

Mercedes, Skoda, and Volkswagen vehicles, as well as untold industrial, medical, mobile, and consumer devices, may be vulnerable to an attack chain ca...

07/11/2025 Dark Reading
As Cyber-Insurance Premiums Drop, Coverage Is Key to Resilie...
Security News

Cyber-insurance premiums continue to decline from their explosive growth from 2020 to 2022, but coverage is more important than ever to manage risks, ...

07/11/2025 Dark Reading
Factoring Cybersecurity Into Finance's Digital Strategy
Security News

As financial institutions continue to embrace digital transformation, their success will depend on their ability to establish and maintain robust and ...

07/11/2025 Dark Reading
Customer, Employee Data Exposed in Nippon Steel Breach
Data Breach

Information from the company's NS Solutions subsidiary has yet to show up on any Dark Web sites, but it doesn't rule out the possibility that the data...

07/11/2025 Dark Reading
Digital Fingerprints Test Privacy Concerns in 2025
Security News

Digital fingerprinting technology creates detailed user profiles by combining device data with location and demographics, which increases the risks of...

07/10/2025 Dark Reading
eSIM Bug in Millions of Phones Enables Spying, Takeover
Security News

eSIMs around the world may be fundamentally vulnerable to physical and network attacks because of a 6-year-old Oracle vulnerability in technology that...

07/10/2025 Dark Reading
Ingram Micro Up and Running After Ransomware Attack
Ransomware

Customers were the first to notice the disruption on the distributor's website when they couldn't place orders online.

07/10/2025 Dark Reading
Agentic AI's Risky MCP Backbone Opens Brand-New Attack Vecto...
Security News

Critical security vulnerabilities affect different parts of the Model Context Protocol (MCP) ecosystem, which many organizations are rapidly adopting ...

07/10/2025 Dark Reading
4 Arrested in UK Over M&S, Co-op, Harrods Hacks
Security News

The UK's National Crime Agency arrested four people, who some experts believe are connected to the notorious cybercriminal collective known as Scatter...

07/10/2025 Dark Reading
SIM Swap Fraud Is Surging — and That's a Good Thing
Security News

Now it's time to build systems that attackers can't reroute with a phone call.

07/10/2025 Dark Reading
North American APT Uses Exchange Zero-Day to Attack China
Security News

Stories about Chinese APTs attacking the US and Canada are plentiful. In a turnabout, researchers found what they believe is a North American entity a...

07/10/2025 Dark Reading
An NVIDIA Container Bug & Chance to Harden Kubernetes
Security News

A container escape flaw involving the NVIDIA Container Toolkit could have enabled a threat actor to access AI datasets across tenants.

07/09/2025 Dark Reading
New AI Malware PoC Reliably Evades Microsoft Defender
Malware

Worried about hackers employing LLMs to write powerful malware? Using targeted reinforcement learning (RL) to train open source models in specific tas...

07/09/2025 Dark Reading
Victim: Using
Rubio Impersonator Signals Growing Security Threat From Deep...
Security News

An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the increased sophisticat...

07/09/2025 Dark Reading
Know Your Enemy: Understanding Dark Market Dynamics
Security News

To help counter crime, today's organizations require a cyber-defense strategy that incorporates the mindset of the cybercriminal.

07/09/2025 Dark Reading
SatanLock Next in Line for Ransomware Group Shutdowns
Ransomware

Though the victims list on its site has since been taken down, the group plans on leaking the rest of the files stolen from its victims.

07/09/2025 Dark Reading
South Korean Government Imposes Penalties on SK Telecom for ...
Data Breach

Following a breach at the country's top mobile provider that exposed 27 million records, the South Korean government imposed a small monetary penalty ...

07/09/2025 Dark Reading
Microsoft Patches 137 CVEs in July, but No Zero-Days
Security News

Some 17 of the bugs are at high risk for exploits, including multiple remote code execution bugs in Office and SharePoint.

07/08/2025 Dark Reading
Malicious Open Source Packages Spike 188% YoY
Malware

Data exfiltration was the most common malware in Sonatype report, with more than 4,400 packages designed to steal secrets, personally identifiable inf...

07/08/2025 Dark Reading
Suspected Hacker Linked to Silk Typhoon Arrested in Milan
Security News

The alleged Chinese state-sponsored hacker faces multiple charges, including wire fraud, aggravated identity theft, and unauthorized access to protect...

07/08/2025 Dark Reading
Hackers 'Shellter' Various Stealers in Red-Team Tool to Evad...
Malware

Researchers have uncovered multiple campaigns spreading Lumma, Arechclient2, and Rhadamanthys malware by leveraging key features of the AV/EDR evasion...

07/08/2025 Dark Reading
4 Critical Steps in Advance of 47-Day SSL/TLS Certificates
Security News

With certificate lifespans set to shrink by 2029, IT teams need to spend the next 100 days planning in order to avoid operational disruptions.

07/08/2025 Dark Reading
TAG-140 Targets Indian Government Via 'ClickFix-Style' Lure
Security News

The threat actors trick victims into opening a malicious script, leading to the execution of the BroaderAspect .NET loader.

07/08/2025 Dark Reading
Bert Blitzes Linux & Windows Systems
Ransomware

The new ransomware strain's aggressive multithreading and cross-platform capabilities make it a potent threat to enterprise environments.

07/07/2025 Dark Reading
DPRK macOS 'NimDoor' Malware Targets Web3, Crypto Platforms
Malware

Researchers observed North Korean threat actors targeting cryptocurrency and Web3 platforms on Telegram using malicious Zoom meeting requests.

07/07/2025 Dark Reading
Ransomware Attack Triggers Widespread Outage at Ingram Micro
Ransomware

The outage began shortly before the July 4 holiday weekend and caused disruptions for customer ordering and other services provided by the IT distribu...

07/07/2025 Dark Reading
'Hunters International' RaaS Group Closes Its Doors
Security News

The announcement comes just months after security researchers observed that the group was making the transition to rebrand to World Leaks, a data thef...

07/07/2025 Dark Reading
Chrome Store Features Extension Poisoned With Sophisticated ...
Malware

A color picker for Google's browser with more than 100,000 downloads hijacks sessions every time a user navigates to a new webpage and also redirects ...

07/07/2025 Dark Reading
New Cyber Blueprint Aims to Guide Organizations on AI Journe...
Security News

Deloitte's new blueprint looks to bridge the gap between the massive push for AI adoption and a lack of preparedness among leaders and employees.

07/03/2025 Dark Reading
Dark Web Vendors Shift to Third Parties, Supply Chains
Supply Chain

As attacks on software supply chains and third parties increase, more data on critical software and infrastructure services is being advertised and so...

07/03/2025 Dark Reading
Criminals Sending QR Codes in Phishing, Malware Campaigns
Malware

The Anti-Phishing Working Group observed how attackers are increasingly abusing QR codes to conduct phishing attacks or to trick users into downloadin...

07/03/2025 Dark Reading
IDE Extensions Pose Hidden Risks to Software Supply Chain
Supply Chain

Malicious extensions can be engineered to bypass verification checks for popular integrated development environments, according to research from OX Se...

07/03/2025 Dark Reading
Attackers Impersonate Top Brands in Callback Phishing
Phishing

Microsoft, PayPal, Docusign, and others are among the trusted brands threat actors use in socially engineered scams that try to get victims to call ad...

07/03/2025 Dark Reading
Qantas Airlines Breached, Impacting 6M Customers
Data Breach

Passengers' personal information was likely accessed via a third-party platform used at a call center, but didn't include passport or credit card info...

07/02/2025 Dark Reading
Initial Access Broker Self-Patches Zero Days as Turf Control
Security News

A likely China-nexus threat actor has been exploiting unpatched Ivanti vulnerabilities to gain initial access to victim networks and then patching the...

07/02/2025 Dark Reading
US Treasury Sanctions BPH Provider Aeza Group
Ransomware

In the past, the bulletproof group has been affiliated with many well-known ransomware and malware groups, such as BianLian and Lumma Stealer.

07/02/2025 Dark Reading
Russian APT 'Gamaredon' Hits Ukraine With Fierce Phishing
Phishing

A Russian APT known as "Gamaredon" is using spear-phishing attacks and network-drive weaponization to target government entities in Ukraine.

07/02/2025 Dark Reading
ClickFix Spin-Off Attack Bypasses Key Browser Safeguards
Malware

A new threat vector exploits how modern browsers save HTML files, bypassing Mark of the Web and giving attackers another social-engineering attack for...

07/02/2025 Dark Reading
1 Year Later: Lessons Learned From the CrowdStrike Outage
Security News

The ever-growing volume of vulnerabilities and threats requires organizations to remain resilient and anti-fragile — that is, to be able to proactivel...

07/02/2025 Dark Reading
FileFix Attack Chain Enables Malicious Script Execution
Security News

By using social engineering tactics, threat actors are able to manipulate their victims into saving and renaming files that will backfire against them...

07/02/2025 Dark Reading
Silver Fox Suspected in Taiwanese Campaign Using DeepSeek Lu...
Malware

The attack uses sideloading to deliver a variant of the popular Gh0stRAT malware and lures victims by posing — among other things — as a purported ins...

07/02/2025 Dark Reading
Like SEO, LLMs May Soon Fall Prey to Phishing Scams
Phishing

Just as attackers have used SEO techniques to poison search engine results, they could rinse and repeat with artificial intelligence and the responses...

07/01/2025 Dark Reading
LevelBlue Acquires Trustwave, Forms World's Largest Independ...
Security News

As the largest managed security services provider, the combined entity will offer cyber consulting, managed detection and response, and incident respo...

07/01/2025 Dark Reading
Scope, Scale of Spurious North Korean IT Workers Emerges
Security News

Microsoft warns thousands of North Korean workers have infiltrated tech, manufacturing, and transportation sectors to steal money and data.

07/01/2025 Dark Reading
Ransomware Reshaped How Cyber Insurers Perform Security Asse...
Ransomware

Cyber insurance companies were forced to adapt once ransomware skyrocketed and highlighted crucial security weaknesses among organizations in all sect...

07/01/2025 Dark Reading
We've All Been Wrong: Phishing Training Doesn't Work
Phishing

Teaching employees to detect malicious emails isn't really having an impact. What other options do organizations have?

07/01/2025 Dark Reading
DoJ Disrupts North Korean IT Worker Scheme Across Multiple U...
Security News

The US also conducted searches of 29 "laptop farms" across 16 states and seized 29 financial accounts used to launder funds.

07/01/2025 Dark Reading
Chrome Zero-Day, 'FoxyWallet' Firefox Attacks Threaten Brows...
Security News

Separate threats to popular browsers highlight the growing security risk for enterprises presented by the original gateway to the Web, which remains a...

07/01/2025 Dark Reading
How Businesses Can Align Cyber Defenses With Real Threats
Security News

Companies that understand the motivations of their attackers and position themselves ahead of the competition will be in the best place to protect the...

07/01/2025 Dark Reading
Hired Hacker Assists Drug Cartel in Finding, Killing FBI Sou...
Security News

According to a government report, El Chapo's Sinaloa drug cartel used a hacker to spy on people connected to the FBI's 2018 investigation against the ...

06/30/2025 Dark Reading
Chinese Company Hikvision Banned By Canadian Government
Security News

Though the company's video surveillance products will be prohibited for government use, individuals and private businesses can still buy the vendor's ...

06/30/2025 Dark Reading
Airoha Chip Vulns Put Sony, Bose Earbuds & Headphones at...
Security News

The vulnerabilities, which have yet to be published, could allow a threat actor to hijack not only Bluetooth earbuds and headphones but also the devic...

06/30/2025 Dark Reading
AI-Themed SEO Poisoning Attacks Spread Info, Crypto Stealers
Malware

Malicious websites designed to rank high in Google search results for ChatGPT and Luma AI deliver the Lumma and Vidar infostealers and other malware.

06/30/2025 Dark Reading
Why Cybersecurity Should Come Before AI in Schools
Security News

The sooner we integrate cybersecurity basics into school curriculum, the stronger and more resilient our children — and their futures — will be.

06/30/2025 Dark Reading
Top Apple, Google VPN Apps May Help China Spy on Users
Security News

Apple and Google espouse strong values about data privacy, but they allow programs from a Big Brother state to thrive on their app stores, researchers...

06/27/2025 Dark Reading
'CitrixBleed 2' Shows Signs of Active Exploitation
Security News

If exploited, the critical vulnerability allows attackers to maintain access for longer periods of time than the original CitrixBleed flaw, all while ...

06/27/2025 Dark Reading
Scattered Spider Taps CFO Credentials in 'Scorched Earth' At...
Security News

In a recent intrusion, the notorious cybercriminal collective accessed CyberArk vaults and obtained more 1,400 secrets, subverted Azure, VMware, and S...

06/27/2025 Dark Reading
Hackers Make Hay? Smart Tractors Vulnerable to Full Takeover
Security News

Hackers can spy on tens of thousands of connected tractors in the latest IoT threat, and brick them too, thanks to poor security in an aftermarket ste...

06/27/2025 Dark Reading
Vulnerability Debt: How Do You Put a Price on What to Fix?
Security News

Putting a vulnerability debt figure together involves work, but having vulnerability debt figures lets you measure real-world values against your over...

06/27/2025 Dark Reading
US Falling Behind China in Exploit Production
Security News

Cyber operations have become critical to national security, but the United States has fallen behind in one significant area — exploit production — whi...

06/27/2025 Dark Reading
'Cyber Fattah' Hacktivist Group Leaks Saudi Games Data
Security News

As tensions in the Middle East rise, hacktivist groups are coming out of the woodwork with their own agendas, leading to notable shifts in the hacktiv...

06/27/2025 Dark Reading
'IntelBroker' Suspect Arrested, Charged in High-Profile Brea...
Data Breach

A British national arrested earlier this year in France was charged by the US Department of Justice in connection with a string of major cyberattacks.

06/26/2025 Dark Reading
How Geopolitical Tensions Are Shaping Cyber Warfare
Security News

In today's cyber battlefield, resilience starts with readiness, and the cost of falling short increases by the day.

06/26/2025 Dark Reading
Charming Kitten APT Tries Spying on Israeli Cybersecurity Ex...
Phishing

Israel's cyber pros are having to put theory into practice, as a notorious nation-state APT sponsored by Iran targets them with spear-phishing attacks...

06/26/2025 Dark Reading
Cloud Repatriation Driven by AI, Cost, and Security
Security News

Organizations are moving away from the public cloud and embracing a more hybrid approach due to big changes over the past five years.

06/25/2025 Dark Reading
And Now Malware That Tells AI to Ignore It?
Malware

Though rudimentary and largely non-functional, the wryly named "Skynet" binary could be a harbinger of things to come on the malware front.

06/25/2025 Dark Reading
Taming Agentic AI Risks Requires Securing Non-Human Identiti...
Security News

As the definition of machine identities broadens, AI agents working on behalf of users and gaining access to various services blurs the lines of non-h...

06/25/2025 Dark Reading
Millions of Brother Printers Hit by Critical, Unpatchable Bu...
Security News

A slew of vulnerabilities, including a critical CVSS 9.8 that enables an attacker to generate the default admin password, affect hundreds of printer, ...

06/25/2025 Dark Reading
CISA Is Shrinking: What Does It Mean for Cyber?
Security News

Dark Reading Confidential Episode 7: Cyber experts Tom Parker and Jake Williams offer their views on the practical impact of cuts to the US Cybersecur...

06/25/2025 Dark Reading
Dire Wolf Ransomware Comes Out Snarling, Bites Technology, M...
Ransomware

The emerging group has already gotten its teeth into 16 victims since May with its double extortion tactics, claiming victims in 11 countries, includi...

06/25/2025 Dark Reading
Hundreds of MCP Servers Expose AI Models to Abuse, RCE
Security News

The servers that connect AI with real-world data are occasionally wide-open channels for cyberattacks.

06/25/2025 Dark Reading
Generative AI Exacerbates Software Supply Chain Risks
Supply Chain

Malicious actors are exploiting AI-fabricated software components — presenting a major challenge for securing software supply chains.

06/25/2025 Dark Reading
XOR Marks the Flaw in SAP GUI
Security News

The company has patched two vulnerabilities in its Graphical User Interface that would have allowed attackers to grab data from a user's input history...

06/25/2025 Dark Reading
Africa Sees Surge in Cybercrime as Law Enforcement Struggles
Ransomware

Cybercrime accounts for more than 30% of all reported crime in East Africa and West Africa, with online scams, ransomware, business email compromise, ...

06/25/2025 Dark Reading
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN Ap...
Malware

A threat actor hacked a version of SonicWall's NetExtender SSL VPN application in an effort to trick users into installing a Trojanized version of the...

06/24/2025 Dark Reading
China-Nexus 'LapDogs' Network Thrives on Backdoored SOHO Dev...
Malware

The campaign infected devices in the US and Southeast Asia to build an operational relay box (ORB) network for use as an extensive cyber-espionage inf...

06/24/2025 Dark Reading
Steel Giant Nucor Confirms Data Stolen in Cyberattack
Data Breach

America's largest steel producer initially disclosed the breach in May and took potentially affected systems offline to investigation the intrusion an...

06/24/2025 Dark Reading
How the US Military Is Redefining Zero Trust
Security News

Trust no longer comes from network boundaries alone but from continuously validating and protecting data and identities at every interaction.

06/24/2025 Dark Reading
Oh! Canada Added to List of Nations Targeted in Salt Typhoon...
Security News

The Canadian Center for Cybersecurity has confirmed that the Chinese state-sponsored cyber-threat actor targeted one of its telecommunications compani...

06/24/2025 Dark Reading
SparkKitty Swipes Pics From iOS, Android Devices
Malware

Like its predecessor, SparkCat, the new malware appears to be going after sensitive data — such as seed phrases for cryptocurrency wallets — in device...

06/23/2025 Dark Reading
'Echo Chamber' Attack Blows Past AI Guardrails
Security News

An AI security researcher has developed a proof of concept that uses subtle, seemingly benign prompts to get GPT and Gemini to generate inappropriate ...

06/23/2025 Dark Reading
IBM Pushes for More Collaboration Between Security, Governan...
Security News

IBM is integrating its governance and AI security tools to address the risks associated with the AI adoption boom.

06/23/2025 Dark Reading
Citrix Patches Critical Vulns in NetScaler ADC and Gateway
Security News

Citrix is recommending its customers upgrade their appliances to mitigate potential exploitation of the vulnerabilities.

06/23/2025 Dark Reading
DHS Warns of Rise in Cyberattacks in Light of US-Iran Confli...
Security News

After President's Trump decision to enter the US into the conflict in the Middle East, the Department of Homeland Security expects there to be an upti...

06/23/2025 Dark Reading
Attackers Use Docker APIs, Tor Anonymity in Stealthy Crypto ...
Security News

The attack is similar to previous campaigns by an actor called Commando Cat to use misconfigured APIs to compromise containers and deploy cryptocurren...

06/23/2025 Dark Reading
A CISO's AI Playbook
Security News

In a market where security budgets flatten while threats accelerate, improving analyst throughput is fiscal stewardship.

06/23/2025 Dark Reading
AWS Enhances Cloud Security With Better Visibility Features
Security News

At this week's re:Inforce 2025 conference, the cloud giant introduced new capabilities to several core security products to provide customers with bet...

06/21/2025 Dark Reading
Hackers Post Dozens of Malicious Copycat Repos to GitHub
Malware

As package registries find better ways to combat cyberattacks, threat actors are finding other methods for spreading their malware to developers.

06/20/2025 Dark Reading
Telecom Giant Viasat Is Latest Salt Typhoon Victim
Security News

The communications company shared the discoveries of its investigation with government partners, but there is little information they can publicly dis...

06/20/2025 Dark Reading
How Cyber Warfare Changes the Face of Geopolitical Conflict
Security News

As geopolitical tensions rise, the use of cyber operations and hacktivists continues to grow, with the current conflict between Israel and Iran showin...

06/20/2025 Dark Reading
How to Lock Down the No-Code Supply Chain Attack Surface
Supply Chain

Securing the no-code supply chain isn't just about mitigating risks — it's about enabling the business to innovate with confidence.

06/20/2025 Dark Reading
Security Evolution: From Pothole Repair to Road Building
Security News

Instead of constantly fixing security vulnerabilities, organizations should proactively build secure foundations that enable businesses to move faster...

06/19/2025 Dark Reading
Scammers Spread False Support Info Using Legitimate Websites
Phishing

In a new wrinkle on the tech support scam front, these search parameter injection attacks dupe victims into believing they are receiving technical hel...

06/19/2025 Dark Reading
Paragon Commercial Spyware Infects Prominent Journalists
Malware

An unnamed customer of Paragon's Graphite product used the commercial spyware to target at least two prominent European journalists in recent months.

06/19/2025 Dark Reading
Iran-Israel War Triggers a Maelstrom in Cyberspace
Security News

As Iran closes its cyberspace to the outside world, hacktivists are picking sides, while attacks against Israel surge and spread across the region.

06/19/2025 Dark Reading
OpenAI Awarded $200M Contract to Work With DoD
Security News

OpenAI intends to help streamline the Defense Department's administrative processes using artificial intelligence.

06/18/2025 Dark Reading
The Triple Threat of Burnout: Overworked, Unsatisfied, Trapp...
Security News

Many cybersecurity professionals still don't feel comfortable admitting when they need a break. Yet their pressures continue to expand and involve, of...

06/18/2025 Dark Reading
GodFather Banking Trojan Debuts Virtualization Tactic
Malware

The Android malware is targeting Turkish financial institutions, completely taking over legitimate banking and crypto apps by creating an isolated vir...

06/18/2025 Dark Reading
New Tool Traps Jitters to Detect Beacons
Security News

Concerned by rapidly evolving evasion tactics, the new Jitter-Trap tool from Varonis aims to help organizations detect beacons that help attackers est...

06/18/2025 Dark Reading
Next-Gen Developers Are a Cybersecurity Powder Keg
Security News

AI coding tools promise productivity but deliver security problems, too. As developers embrace "vibe coding," enterprises face mounting risk...

06/09/2025 Dark Reading
China-Backed Hackers Target SentinelOne in 'PurpleHaze' Atta...
Malware

Known threat groups APT15 and UNC5174 unleashed attacks against SentinelOne and more than 70 other high-value targets, as part of ongoing cyber-espion...

06/09/2025 Dark Reading
Cutting-Edge ClickFix Tactics Snowball, Pushing Phishing For...
Malware

Several widespread ClickFix campaigns are underway, bent on delivering malware to business targets, and they represent a new level of phishing sophist...

06/06/2025 Dark Reading
F5 Acquires Agentic AI Security Startup Fletch
Security News

Agentic AI technology will be integrated into the recently launched F5 Application Delivery and Security Platform.

06/06/2025 Dark Reading
BADBOX 2.0 Targets Home Networks in Botnet Campaign, FBI War...
Security News

Though the operation was partially disrupted earlier this year, the botnet remains active and continues to target connected Android devices.

06/06/2025 Dark Reading
Docuseries Explores Mental, Physical Hardships of CISOs
Security News

During "CISO: The Worst Job I Ever Wanted," several chief information security officers reveal how difficult it is to be in a role that, des...

06/06/2025 Dark Reading
Synthetic Data Is Here to Stay, but How Secure Is It?
Security News

Synthetic data offers organizations a way to develop AI while maintaining privacy compliance but requires careful management to prevent re-identificat...

06/06/2025 Dark Reading
MSFT-CrowdStrike 'Rosetta Stone' for Naming APTs: Meh?
Security News

Microsoft and CrowdStrike announced an effort to deconflict the overlapping names of threat groups and reduce confusion for companies, but we've been ...

06/06/2025 Dark Reading
Prep for Layoffs Before They Compromise Security
Security News

Mass layoffs create cybersecurity vulnerabilities through dormant accounts and disgruntled employees.

06/06/2025 Dark Reading
SecOps Teams Need to Tackle AI Hallucinations to Improve Acc...
Security News

The risks associated with AI embedded into threat detection and response tools can't be completely eradicated, but SecOps teams can take steps to at l...

06/05/2025 Dark Reading
Digital Forensics Firm Cellebrite to Acquire Corellium
Security News

Cellebrite, a controversial digital forensics firm, is set to acquire virtualization vendor Corellium in a $170 million deal.

06/05/2025 Dark Reading
'PathWiper' Attack Hits Critical Infrastructure In Ukraine
Malware

Cisco Talos researchers observed the new wiper malware in a destructive attack against an unnamed critical infrastructure organization.

06/05/2025 Dark Reading
Cisco Warns of Credential Vuln on AWS, Azure, Oracle Cloud
Security News

The vulnerability, with a 9.9 CVSS score on a 10-point scale, results in different Cisco ISE deployments all sharing the same credentials as long as t...

06/05/2025 Dark Reading
Backdoored Malware Reels in Newbie Cybercriminals
Malware

Sophos researchers found this operation has similarities or connections to many other campaigns targeting GitHub repositories dating back to August 20...

06/05/2025 Dark Reading
Questions Swirl Around ConnectWise Flaw Used in Attacks
Security News

ConnectWise issued a patch to stave off attacks on ScreenConnect customers, but the company's disclosures don't explain what the vulnerability is and ...

06/05/2025 Dark Reading
Finding Balance in US AI Regulation
Security News

The US can't afford to wait for political consensus to catch up to technological change.

06/05/2025 Dark Reading
Iranian APT 'BladedFeline' Hides in Network for 8 Years
Security News

ESET published research on the Iranian APT "BladedFeline," which researchers believe is a subgroup of the cyber-espionage entity APT34.

06/05/2025 Dark Reading
Cybersecurity Training in Africa Aims to Bolster Professiona...
Security News

The United Nations, Carnegie Mellon University, and private organizations are all aiming to train the next generation of cybersecurity experts, boost ...

06/05/2025 Dark Reading
35K Solar Devices Vulnerable to Potential Hijacking
Data Breach

A little more than three-quarters of these exposed devices are located in Europe, followed by Asia, with 17%.

06/04/2025 Dark Reading
Vishing Crew Targets Salesforce Data
Security News

A group that Google is tracking as UNC6040 has been tricking users at many organizations into installing a malicious version of a Salesforce app to ga...

06/04/2025 Dark Reading
How Neuroscience Can Help Us Battle 'Alert Fatigue'
Security News

By understanding the neurological realities of human attention, organizations can build more sustainable security operations that protect not only the...

06/04/2025 Dark Reading
Researchers Bypass Deepfake Detection With Replay Attacks
Security News

An international group of researchers found that simply rerecording deepfake audio with natural acoustics in the background allows it to bypass detect...

06/04/2025 Dark Reading
Attackers Impersonate Ruby Packages to Steal Sensitive Teleg...
Supply Chain

Malicious RubyGems pose as a legitimate plug-in for the popular Fastlane rapid development platform in a geopolitically motivated attack with global s...

06/04/2025 Dark Reading
Beware of Device Code Phishing
Phishing

Hackers are exploiting trusted authentication flows — like Microsoft Teams and IoT logins — to trick users into handing over access tokens, bypassing ...

06/04/2025 Dark Reading
LayerX Launches ExtensionPedia
Security News

06/03/2025 Dark Reading
'Crocodilus' Sharpens Its Teeth on Android Users
Malware

The data-stealing malware initially targeted users in Turkey but has since evolved into a global threat.

06/03/2025 Dark Reading
Victoria's Secret Delays Earnings Call Due to Cyber Incident
Security News

But that didn't stop the clothing retailer from issuing preliminary results for the first quarter of 2025.

06/03/2025 Dark Reading
Chrome Drops Trust for Chunghwa, Netlock Certificates
Security News

Digital certificates authorized by the authorities will no longer have trust by default in the browser starting in August, over what Google said is a ...

06/03/2025 Dark Reading
LummaC2 Fractures as Acreed Malware Becomes Top Dog
Malware

LummaC2 formerly accounted for almost 92% of Russian Market's credential theft log alerts. Now, the Acreed infostealer has replaced its market share.

06/03/2025 Dark Reading
Is Your CISO Navigating Your Flight Path?
Data Breach

If your CISO isn't wielding influence with the CEO and helping top leaders clearly see the flight path ahead, your company is dangerously exposed.

06/03/2025 Dark Reading
Open-Weight Chinese AI Models Drive Privacy Innovation in LL...
Security News

Edge computing and stricter regulations could usher in a new era of AI privacy.

06/02/2025 Dark Reading
EMR-ISAC Shuts Down: What Happens Now?
Security News

This information-sharing hub provided essential information to the emergency services sector on physical and cyber threats. Some say the timing is con...

06/02/2025 Dark Reading
Exploitation Risk Grows for Critical Cisco Bug
Security News

New details on the Cisco IOS XE vulnerability could help attackers develop a working exploit soon, researchers say.

06/02/2025 Dark Reading
Trickbot, Conti Ransomware Operator Unmasked Amid Huge Ops L...
Ransomware

An anonymous whistleblower has leaked large amounts of data tied to the alleged operator behind Trickbot and Conti ransomware.

06/02/2025 Dark Reading
Australia Begins New Ransomware Payment Disclosure Rules
Ransomware

The country will require certain organizations to report ransomware payments and communications within 72 hours after they're made or face potential c...

06/02/2025 Dark Reading
Critical Bugs Could Spark Takeover of Widely Used Fire Safet...
Security News

The unpatched security vulnerabilities in Consilium Safety's CS5000 Fire Panel could create "serious safety issues" in environments where fi...

06/02/2025 Dark Reading
Beyond the Broken Wall: Why the Security Perimeter Is Not En...
Security News

Organizations need to abandon perimeter-based security for data-centric protection strategies in today's distributed IT environments.

06/02/2025 Dark Reading
In the AI Race With China, Don't Forget About Security
Security News

The US needs to establish a clear framework to provide reasonable guardrails to protect its interests — the quicker, the better.

06/02/2025 Dark Reading
'Earth Lamia' Exploits Known SQL, RCE Bugs Across Asia
Data Breach

A "highly active" Chinese threat group is taking proverbial candy from babies, exploiting known bugs in exposed servers to steal data from o...

05/30/2025 Dark Reading
FBI Warns of Filipino Tech Company Running Sprawling Crypto ...
Phishing

The US Treasury said cryptocurrency investment schemes like the ones facilitated by Funnull Technology Inc. have cost Americans billions of dollars an...

05/30/2025 Dark Reading
Vibe Coding Changed the Development Process
Security News

AI tools shook up development. Now, product security must change too.

05/30/2025 Dark Reading
Tenable to Acquire AI Security Startup Apex
Security News

Apex will enhance Tenable's AI Aware tool by mitigating the threats of AI applications and tools not governed by organizations, while enforcing existi...

05/30/2025 Dark Reading
CISO Stature Rises, but Security Budgets Remain Tight
Security News

The rate of compensation gains has slowed from the COVID years, and budgets remain largely static due to economic fears, but CISOs are increasingly ga...

05/30/2025 Dark Reading
ConnectWise Breached, ScreenConnect Customers Targeted
Data Breach

The software company, which specializes in remote IT management, said a "sophisticated nation state actor" was behind the attack but provide...

05/30/2025 Dark Reading
'Everest Group' Extorts Global Orgs via SAP's HR Tool
Security News

In addition to Coca-Cola, entities in Abu Dhabi, Jordan, Namibia, South Africa, and Switzerland are experiencing extortion attacks, all involving stol...

05/30/2025 Dark Reading
From Code Red to Rust: Microsoft's Security Journey
Security News

At this year's Build developer conference, Microsoft reflected on what the company learned about securing features and writing secure code in the earl...

05/29/2025 Dark Reading
NSA, CISA Urge Organizations to Secure Data Used in AI Model...
Supply Chain

New guidance includes a list of 10 best practices to protect sensitive data throughout the AI life cycle, as well as tips to address supply chain and ...

05/29/2025 Dark Reading
Victoria's Secret Goes Offline After 'Incident' Claims
Security News

The lingerie retailer isn't revealing much about the security incident it's dealing with but has brought in third-party experts to address the issue.

05/29/2025 Dark Reading
New Botnet Plants Persistent Backdoors in ASUS Routers
Malware

Thousands of ASUS routers have been infected and are believed to be part of a wide-ranging ORB network affecting devices from Linksys, D-Link, QNAP, a...

05/29/2025 Dark Reading
SentinelOne Reports Services Are Back Online After Global Ou...
Security News

The outage reportedly hit 10 commercial customer consoles for SentinelOne's Singularity platform, including Singularity Endpoint, XDR, Cloud Security,...

05/29/2025 Dark Reading
Zscaler's Buyout of Red Canary Shows Telemetry's Value
Security News

Red Canary's MDR portfolio complements Zscaler's purchase last year of Israeli startup Avalor, which automates collection, curation, and enrichment of...

05/29/2025 Dark Reading
APT41 Uses Google Calendar Events for C2
Security News

APT41, a Chinese state-sponsored threat actor also known as "Double Dragon," used Google Calendar as command-and-control infrastructure duri...

05/29/2025 Dark Reading
PumaBot Targets Linux Devices in Latest Botnet Campaign
Security News

While the botnet may not be completely automated, it uses certain tactics when targeting devices that indicate that it may, at the very least, be semi...

05/29/2025 Dark Reading
LexisNexis Informs 360K+ Customers of Third-Party Data Leak
Security News

While the leak affected customer data, LexisNexis said in a notification letter that its products and systems were not compromised.

05/29/2025 Dark Reading
A Defense-in-Depth Approach for the Modern Era
Security News

By integrating intelligent network policies, zero-trust principles, and AI-driven insights, enterprises can create a robust defense against the next g...

05/29/2025 Dark Reading
'Haozi' Gang Sells Turnkey Phishing Tools to Amateurs
Phishing

The phishing operation is using Telegram groups to sell a phishing-as-a-service kit with customer service, a mascot, and infrastructure that requires ...

05/29/2025 Dark Reading
Certified Randomness Uses Quantum Cryptography to Make Stron...
Security News

Researchers are using quantum computers to generate keys that are truly random to strengthen data encryption.

05/28/2025 Dark Reading
Hundreds of Web Apps Have Full Access to Microsoft OneDrive ...
Security News

Researchers at Oasis Security say the problem has to do with OneDrive File Picker having overly broad permissions.

05/28/2025 Dark Reading
CISA Issues SOAR, SIEM Implementation Guidance
Security News

Among the recommendations, organizations should conduct thorough testing and manage costs, which can be hefty, before implementing the platforms.

05/28/2025 Dark Reading
Implementing Secure by Design Principles for AI
Security News

Harnessing AI's full transformative potential safely and securely requires more than an incremental enhancement of existing cybersecurity practices. A...

05/28/2025 Dark Reading
Cellcom Restores Regional Mobile Services After Cyberattack
Security News

Customers in parts of Wisconsin and Michigan could not make calls or send text messages for nearly a week after an incident on May 14, and service is ...

05/28/2025 Dark Reading
Why Take9 Won't Improve Cybersecurity
Security News

The latest cybersecurity awareness campaign asks users to pause for nine seconds before clicking — but this approach misplaces responsibility and igno...

05/28/2025 Dark Reading
Have Your Say: Dark Reading Seeks Your Input
Security News

Dark Reading is offering its readers the opportunity to tell us how we're doing via a new survey.

05/28/2025 Dark Reading
Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising Ap...
Security News

Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five years, including more than $2 billion in 2024 ...

05/28/2025 The Hacker News
Indian Police Arrest Cybercrime Gang Copycats of Myanmar Biz...
Security News

The region offers attractive conditions: a large pool of tech workers, economic disparity, and weak enforcement of cybercrime laws — all of which attr...

05/28/2025 Dark Reading
DragonForce ransomware abuses SimpleHelp in MSP supply chain...
Ransomware

The DragonForce ransomware operation successfully breached a managed service provider and used its SimpleHelp remote monitoring and management (RMM) p...

05/27/2025 BleepingComputer
Adidas Falls Victim to Third-Party Data Breach
Data Breach

Though Adidas said that no payment or financial information was affected in the breach, individuals who contacted the compamy's customer service help ...

05/27/2025 Dark Reading
CISA Warns of Attacks Targeting Commvault SaaS Environment
Security News

A threat actor has gained access to Microsoft 365 environments of a small number of customers of Commvault's Metallic service.

05/27/2025 Dark Reading
DragonForce Ransomware Strikes MSP in Supply Chain Attack
Ransomware

DragonForce, a ransomware "cartel" that has gained significant popularity since its debut in 2023, attacked an MSP as part of a recent suppl...

05/27/2025 Dark Reading
Iranian pleads guilty to RobbinHood ransomware attacks, face...
Ransomware

An Iranian national has pleaded guilty to participating in the Robbinhood ransomware operation, which was used to breach the networks, steal data, and...

05/27/2025 BleepingComputer
MathWorks, Creator of MATLAB, Confirms Ransomware Attack
Ransomware

The attack dirsupted MathWorks' systems and online applications, but it remains unclear which ransomware group targeted the software company and wheth...

05/27/2025 Dark Reading
FBI: Silent Ransom Group Adopts Vishing Campaign Against Law...
Ransomware

The non-ransomware extortion group has switched up tactics and victimology in a deliberate and focused campaign similar to those of other attackers fo...

05/27/2025 Dark Reading
New Self-Spreading Malware Infects Docker Containers to Mine...
Data Breach

Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a cryptocurrency mining botnet. The atta...

05/27/2025 The Hacker News
How the New Hacker Millionaire Class Was Built
Security News

Once dismissed as Internet miscreants in hoodies, ethical hackers have hit the big time, earning millions from blue-chip firms. And they say it's thei...

05/27/2025 Dark Reading
Danabot Takedown Deals Blow to Russian Cybercrime
Security News

A multiyear investigation by a public-private partnership has resulted in the seizure of the botnet's US-based infrastructure and indictments for its ...

05/27/2025 Dark Reading
Not Every CVE Deserves a Fire Drill: Focus on What’s Exploit...
Security News

Not every "critical" vulnerability is a critical risk. Picus Exposure Validation cuts through the noise by testing what's actually exploitable in your...

05/27/2025 BleepingComputer
Cybercriminals Clone Antivirus Site to Spread Venom RAT and ...
Malware

Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising antivirus software from Bitdefender to dupe vic...

05/27/2025 The Hacker News
CVE Uncertainty Underlines Importance of Cyber Resilience
Security News

Organizations need to broaden their strategy to manage vulnerabilities more effectively and strengthen network cyber resilience.

05/27/2025 Dark Reading
MATLAB dev confirms ransomware attack behind service outage
Ransomware

MathWorks, a leading developer of mathematical computing and simulation software, has revealed that a recent ransomware attack is behind an ongoing se...

05/27/2025 BleepingComputer
Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via ...
Data Breach

Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russia-affiliated threat actor dubbed Void Bliz...

05/27/2025 The Hacker News
Russian Laundry Bear cyberspies linked to Dutch Police hack
Data Breach

A previously unknown Russian-backed cyberespionage group now tracked as Laundry Bear has been linked to a September 2024 Dutch police security breach....

05/27/2025 BleepingComputer
AI Agents and the Non‑Human Identity Crisis: How to Deploy A...
Security News

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot’s code completions to chatbots that mine internal k...

05/27/2025 The Hacker News
Employees Searching Payroll Portals on Google Tricked Into S...
Data Breach

Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices...

05/27/2025 The Hacker News
Windows Server emergency update fixes Hyper-V VM freezes, re...
Security News

Microsoft has released an emergency update to address a known issue causing some Hyper-V virtual machines with Windows Server 2022 to freeze or restar...

05/27/2025 BleepingComputer
Adidas warns of data breach after customer service provider ...
Data Breach

German sportswear giant Adidas disclosed a data breach after attackers hacked a customer service provider and stole some customers' data. [...]

05/27/2025 BleepingComputer
Hackers Are Calling Your Office: FBI Alerts Law Firms to Lun...
Phishing

The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal extortion actor known as Luna Moth targe...

05/27/2025 The Hacker News
Russia-Linked Hackers Target Tajikistan Government with Weap...
Phishing

The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using macro-enabled Word ...

05/27/2025 The Hacker News
Over 70 Malicious npm and VS Code Packages Found Stealing Da...
Security News

As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS...

05/26/2025 The Hacker News
Google claims users find ads in AI search 'helpful'
Security News

Google AI mode and AI Overviews now have ads, which, according to the search engine giant, are "helpful." [...]

05/26/2025 BleepingComputer
OpenAI plans to ship an interesting ChatGPT product by 2026
Security News

OpenAI is planning to ship a new ChatGPT-powered product by 2026, but we aren't looking at yet another model. [...]

05/26/2025 BleepingComputer
CISO's Guide To Web Privacy Validation And Why It's Importan...
Security News

Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO’s guide provides a practical roadmap for continuous web...

05/26/2025 The Hacker News
⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, ...
Data Breach

Cyber threats don't show up one at a time anymore. They’re layered, planned, and often stay hidden until it’s too late. For cybersecurity teams, the k...

05/26/2025 The Hacker News
Vibe coding company says Claude 4 reduced syntax errors by 2...
Security News

Lovable, which is a Vibe coding company, announced that Claude 4 has reduced its errors by 25% and made it faster by 40%. [...]

05/25/2025 BleepingComputer
Leak suggests xAI is getting ready to ship Grok 3.5
Security News

xAI, founded by Elon Musk, is preparing to launch Grok 3.5, the company's next state-of-the-art AI model. [...]

05/25/2025 BleepingComputer
ChatGPT Deep Research can now pull data from Dropbox and Box
Security News

You can now connect your Box and Dropbox accounts to Deep Research on ChatGPT and pull data, which will be used by the AI to conduct research. [...]

05/25/2025 BleepingComputer
Hackers Use Fake VPN and Browser NSIS Installers to Deliver ...
Malware

Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Brows...

05/25/2025 The Hacker News
Hackers Use TikTok Videos to Distribute Vidar and StealC Mal...
Malware

The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vecto...

05/23/2025 The Hacker News
3 Critical Pillars of Cyber-Resilience
Ransomware

Encryption, collaboration, and AI can help organizations build up essential protection against ransomware.

05/23/2025 Dark Reading
How AI Is Transforming SASE, Zero Trust for Modern Enterpris...
Security News

By automating security policies and threat detection while coaching users on data protection, companies will be better able to take control of and pro...

05/23/2025 Dark Reading
Rethinking Data Privacy in the Age of Generative AI
Security News

The key to navigating this new GenAI landscape is a balanced approach — one that fosters transparency, strengthens regulatory frameworks, and embraces...

05/23/2025 Dark Reading
3 Severe Bugs Patched in Versa's Concerto Orchestrator
Security News

Three zero-days could have allowed an attacker to completely compromise the Concerto application and the host system running it.

05/23/2025 Dark Reading
Companies Look to AI to Tame the Chaos of Event Security, Op...
Security News

As the summer event season kicks off, venue managers and security firms aim to make AI part of the solution for keeping control of crowds and protecti...

05/23/2025 Dark Reading
ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,...
Security News

Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge devices across 84 ...

05/23/2025 The Hacker News
300 Servers and €3.5M Seized as Europol Strikes Ransomware N...
Ransomware

As part of the latest "season" of Operation Endgame, a coalition of law enforcement agencies have taken down about 300 servers worldwide, neutralized ...

05/23/2025 The Hacker News
SafeLine WAF: Open Source Web Application Firewall with Zero...
Security News

From zero-day exploits to large-scale bot attacks — the demand for a powerful, self-hosted, and user-friendly web application security solution has ne...

05/23/2025 The Hacker News
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M ...
Malware

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with DanaBot (aka DanaTools) and uns...

05/23/2025 The Hacker News
CISA Warns of Suspected Broader SaaS Attacks Exploiting App ...
Security News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday revealed that Commvault is monitoring cyber threat activity targeting app...

05/23/2025 The Hacker News
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Resp...
Security News

Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab's artificial intelligence (AI) assistant Duo that could have all...

05/23/2025 The Hacker News
Oops: DanaBot Malware Devs Infected Their Own PCs
Data Breach

The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot, a prolific strain of information-...

05/22/2025 Krebs on Security
Following Data Breach, Multiple Stalkerware Apps Go Offline
Data Breach

The same easily exploitable vulnerability was found in three of the apps that led to the compromise of victims' data.

05/22/2025 Dark Reading
Russian Threat Actor TAG-110 Goes Phishing in Tajikistan
Phishing

While Ukraine remains Russia's major target for cyberattacks, TAG-110 is part of a strategy to preserve "a post-Soviet sphere of influence" ...

05/22/2025 Dark Reading
3AM Ransomware Adopts Email Bombing, Vishing Combo Attack
Ransomware

The emerging threat group is the latest to adopt the combo attack tactic, which Black Basta and other groups already are using to gain initial access ...

05/22/2025 Dark Reading
UK Retail Cyberattacks May Drive Up US Insurance Premiums
Security News

Insurance experts weigh in on how the recent barrage of attacks against UK retailers could affect premium rates and policy requirements, as well as ho...

05/22/2025 Dark Reading
CISA: Russia's Fancy Bear Targeting Logistics, IT Firms
Security News

The mission is to gather information that could help Russia in its war against Ukraine.

05/22/2025 Dark Reading
Blurring Lines Between Scattered Spider & Russian Cyberc...
Ransomware

The loosely affiliated hacking group has shifted closer to ransomware gangs, raising questions about Scattered Spider's ties to the Russian cybercrime...

05/22/2025 Dark Reading
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate...
Malware

A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation of a now-patched remote-code-execution vulnerability in Trimbl...

05/22/2025 The Hacker News
Security Threats of Open Source AI Exposed by DeepSeek
Data Breach

DeepSeek's risks must be carefully considered, and ultimately mitigated, in order to enjoy the many benefits of generative AI in a manner that is safe...

05/22/2025 Dark Reading
Keeping LLMs on the Rails Poses Design, Engineering Challeng...
Security News

Despite adding alignment training, guardrails, and filters, large language models continue to give up secrets, make unfiltered statements, and provide...

05/22/2025 Dark Reading
Critical Windows Server 2025 dMSA Vulnerability Enables Acti...
Security News

A privilege escalation flaw has been demonstrated in Windows Server 2025 that makes it possible for attackers to compromise any user in Active Directo...

05/22/2025 The Hacker News
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterpris...
Security News

A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software has been exploited by a China-nexus threat actor to...

05/22/2025 The Hacker News
Webinar: Learn How to Build a Reasonable and Legally Defensi...
Security News

It’s not enough to be secure. In today’s legal climate, you need to prove it. Whether you’re protecting a small company or managing compliance across ...

05/22/2025 The Hacker News
Identity Security Has an Automation Problem—And It's Bigger ...
Security News

For many organizations, identity security appears to be under control. On paper, everything checks out. But new research from Cerby, based on insights...

05/22/2025 The Hacker News
Critical Versa Concerto Flaws Let Attackers Escape Docker an...
Security News

Cybersecurity researchers have uncovered multiple critical security vulnerabilities impacting the Versa Concerto network security and SD-WAN orchestra...

05/22/2025 The Hacker News
GitLab's AI Assistant Opened Devs to Code Theft
Malware

Prompt injection risks in GitLab's AI assistant could have allowed attackers to steal source code, or indirectly deliver developers malware, dirty lin...

05/22/2025 Dark Reading
FBI and Europol Disrupt Lumma Stealer Malware Network Linked...
Malware

A sprawling operation undertaken by global law enforcement agencies and a consortium of private sector firms has disrupted the online infrastructure a...

05/22/2025 The Hacker News
SideWinder APT Caught Spying on India's Neighbor Gov'ts
Phishing

A recent spear-phishing campaign against countries in South Asia aligns with broader political tensions in the region.

05/22/2025 Dark Reading
Experts Chart Path to Creating Safer Online Spaces for Women
Security News

Gaps in laws, technology, and corporate accountability continue to put women's safety and privacy online at risk.

05/21/2025 Dark Reading
Lumma Stealer Takedown Reveals Sprawling Operation
Malware

The FBI and partners have disrupted "the world's most popular malware," a sleek enterprise with thousands of moving parts, responsible for m...

05/21/2025 Dark Reading
Ivanti EPMM Exploitation Tied to Previous Zero-Day Attacks
Security News

Wiz researchers found an opportunistic threat actor has been targeting vulnerable edge devices, including Ivanti VPNs and Palo Alto firewalls.

05/21/2025 Dark Reading
Marks & Spencer Projects Cyberattack Cost of $400M
Security News

The company expects it will continue to struggle with online disruptions until at least July, due to the attack.

05/21/2025 Dark Reading
Pandas Galore: Chinese Hackers Boost Attacks in Latin Americ...
Security News

Vixen Panda, Aquatic Panda — both Beijing-sponsored APTs and financially motivated criminal groups continued to pose the biggest threat to organizatio...

05/21/2025 Dark Reading
Unimicron, Presto Attacks Mark Industrial Ransomware Surge
Ransomware

A number of major industrial organizations suffered ransomware attacks last quarter, such as PCB manufacturer Unimicron, appliance maker Presto, and m...

05/21/2025 Dark Reading
Russian Hackers Exploit Email and VPN Vulnerabilities to Spy...
Security News

Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 202...

05/21/2025 The Hacker News
Coinbase Breach Compromises Nearly 70K Customers' Informatio...
Data Breach

Coinbase asserts that this number is only a small fraction of the number of its verified users, though it's still offering a $20 million reward to cat...

05/21/2025 Dark Reading
Unpatched Windows Server Flaw Threatens Active Directory Use...
Security News

Attackers can exploit a vulnerability present in the delegated Managed Service Account (dMSA) feature that fumbles permission handling and is present ...

05/21/2025 Dark Reading
NIST's 'LEV' Equation to Determine Likelihood a Bug Was Expl...
Security News

The new 'Likely Exploited Vulnerabilities' metric could be a game-changer for SecOps teams and vulnerability patch prioritization.

05/21/2025 Dark Reading
The Hidden Cybersecurity Risks of M&A
Security News

Merger and acquisition due diligence typically focuses on financials, legal risks, and operational efficiencies. Cybersecurity is often an afterthough...

05/21/2025 Dark Reading
Dark Reading Confidential: The Day I Found an APT Group in t...
Security News

Dark Reading Confidential Episode 6: Threat hunters Ismael Valenzuela and Vitor Ventura share stories about the tricks they used to track down advance...

05/21/2025 Dark Reading
PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Tar...
Malware

Russian organizations have become the target of a phishing campaign that distributes malware called PureRAT, according to new findings from Kaspersky....

05/21/2025 The Hacker News
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Mi...
Malware

Counterfeit Facebook pages and sponsored ads on the social media platform are being employed to direct users to fake websites masquerading as Kling AI...

05/21/2025 The Hacker News
Securing CI/CD workflows with Wazuh
Security News

Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different en...

05/21/2025 The Hacker News
How to Detect Phishing Attacks Faster: Tycoon2FA Example
Data Breach

It takes just one email to compromise an entire system. A single well-crafted message can bypass filters, trick employees, and give attackers the acce...

05/21/2025 The Hacker News
Researchers Expose PWA JavaScript Attack That Redirects User...
Phishing

Cybersecurity researchers have discovered a new campaign that employs malicious JavaScript injections to redirect site visitors on mobile devices to a...

05/21/2025 The Hacker News
Google Chrome's Built-in Manager Lets Users Update Breached ...
Data Breach

Google has announced a new feature in its Chrome browser that lets its built-in Password Manager automatically change a user's password when it detect...

05/21/2025 The Hacker News
Asia Produces More APT Actors, as Focus Expands Globally
Security News

China- and North Korea-aligned groups account for more than half of global attacks, and an increasing number of countries look to cyber to balance pow...

05/21/2025 Dark Reading
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
Ddos

KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per s...

05/20/2025 Krebs on Security
Fake Kling AI Malvertisements Lure Victims With False Promis...
Security News

Researchers noted that they found several similar websites, two of which are still operating and require the same kind of behavior on behalf of the vi...

05/20/2025 Dark Reading
Virgin Media 02 Vuln Exposes Call Recipient Location
Security News

A hacker exploiting the security flaw in the mobile provider's network could have potentially located a call recipient with accuracy of up to 100 squa...

05/20/2025 Dark Reading
Tenable Adds Third-Party Connectors to Exposure Management P...
Security News

Tenable One now pulls in data from AWS, Microsoft, and competitors to provide a holistic security view of an organization's attack surface.

05/20/2025 Dark Reading
Regeneron Pledges Privacy Protection in $256M Bid for 23andM...
Security News

Regeneron's planned acquisition of 23andMe raises significant privacy concerns as experts warn about the lack of comprehensive federal regulations gov...

05/20/2025 Dark Reading
Bumblebee Malware Takes Flight via Trojanized VMware Utility
Malware

An employee inadvertently downloaded a malicious version of the legitimate RVTools utility, which launched an investigation into an attempted supply c...

05/20/2025 Dark Reading
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Doma...
Malware

A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including Amazon S3 buckets and...

05/20/2025 The Hacker News
Large Retailers Land in Scattered Spider's Ransomware Web
Ransomware

The threat group games IT help desks to gain entry into retailer networks, and signs show it has shifted its attention from the UK to US targets.

05/20/2025 Dark Reading
100+ Fake Chrome Extensions Found Hijacking Sessions, Steali...
Security News

An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly b...

05/20/2025 The Hacker News
'Hazy Hawk' Cybercrime Gang Swoops In for Cloud Resources
Security News

Since December 2023, the threat group has preyed on domains belonging to the US Centers for Disease Control and Prevention (CDC) and numerous other re...

05/20/2025 Dark Reading
Why Rigid Security Programs Keep Failing
Security News

Organizations that stay ahead of attacks won't be the most compliant ones — they'll be the ones most honest about what actually works.

05/20/2025 Dark Reading
Novel Phishing Attack Combines AES With Poisoned npm Package...
Phishing

Researchers discovered a phishing attack in the wild that takes multiple well-tread technologies like open source packages and AES encryption and comb...

05/20/2025 Dark Reading
AWS Default IAM Roles Found to Enable Lateral Movement and C...
Security News

Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the d...

05/20/2025 The Hacker News
The Crowded Battle: Key Insights from the 2025 State of Pent...
Data Breach

In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISOs from global enterprises (200 from within the USA) to understand the ...

05/20/2025 The Hacker News
South Asian Ministries Hit by SideWinder APT Using Old Offic...
Malware

High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the target of a new campaign orchestrated by a threat actor ...

05/20/2025 The Hacker News
Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Atta...
Data Breach

Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed international organization i...

05/20/2025 The Hacker News
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redi...
Malware

Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that's targeting publicly accessible Redis servers. The maliciou...

05/20/2025 The Hacker News
Malicious PyPI Packages Exploit Instagram and TikTok APIs to...
Security News

Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as checker tools to valida...

05/20/2025 The Hacker News
'Operation RoundPress' Targets Ukraine in XSS Webmail Attack...
Phishing

A cyber-espionage campaign is targeting Ukrainian government entities with a series of sophisticated spear-phishing attacks that exploit XSS vulnerabi...

05/19/2025 Dark Reading
S. Dakota CIO Gottumukkala Signs on as CISA Deputy Director
Security News

The addition is an important hire for the No. 2 position at the cyber agency. The main director role remains unfilled post-Easterly, with Bridget Bean...

05/19/2025 Dark Reading
Legal Aid Agency Warns Lawyers, Defendants on Data Breach
Data Breach

The online service has since been shut down as the agency grapples with the cyberattack, though it assures the public that those most in need of legal...

05/19/2025 Dark Reading
RVTools Official Site Hacked to Deliver Bumblebee Malware vi...
Malware

The official site for RVTools has been hacked to serve a compromised installer for the popular VMware environment reporting utility. "Robware.net and ...

05/19/2025 The Hacker News
Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft...
Ransomware

Several ransomware actors are using a malware called Skitnet as part of their post-exploitation efforts to steal sensitive data and establish remote c...

05/19/2025 The Hacker News
CVE Disruption Threatens Foundations of Defensive Security
Security News

If the Common Vulnerabilities and Exposures system continues to face uncertainty, the repercussions will build slowly, and eventually the cracks will ...

05/19/2025 Dark Reading
Why CTEM is the Winning Bet for CISOs in 2025
Security News

Continuous Threat Exposure Management (CTEM) has moved from concept to cornerstone, solidifying its role as a strategic enabler for CISOs. No longer a...

05/19/2025 The Hacker News
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with...
Security News

Mozilla has released security updates to address two critical security flaws in its Firefox browser that could be potentially exploited to access sens...

05/19/2025 The Hacker News
⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targ...
Security News

Cybersecurity leaders aren’t just dealing with attacks—they’re also protecting trust, keeping systems running, and maintaining their organization’s re...

05/19/2025 The Hacker News
[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to ...
Security News

Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan co...

05/17/2025 The Hacker News
Coinbase Extorted, Offers $20M for Info on Its Hackers
Security News

Coinbase is going Liam Neeson on its attackers, potentially setting a new precedent for incident response in the wake of crypto- and blockchain-target...

05/16/2025 Dark Reading
New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on G...
Malware

Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry,...

05/16/2025 The Hacker News
Top 10 Best Practices for Effective Data Protection
Security News

Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy ...

05/16/2025 The Hacker News
Researchers Expose New Intel CPU Flaws Enabling Memory Leaks...
Security News

Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data...

05/16/2025 The Hacker News
Fileless Remcos RAT Delivered via LNK Files and MSHTA in Pow...
Malware

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access tr...

05/16/2025 The Hacker News
Breachforums Boss to Pay $700k in Healthcare Breach
Data Breach

In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $...

05/15/2025 Krebs on Security
Patch Tuesday, May 2025 Edition
Security News

Microsoft on Tuesday released software updates to fix at least 70 vulnerabilities in Windows and related products, including five zero-day flaws that ...

05/14/2025 Krebs on Security
Pakistani Firm Shipped Fentanyl Analogs, Scams to US
Phishing

A Texas firm recently charged with conspiring to distribute synthetic opioids in the United States is at the center of a vast network of companies in ...

05/07/2025 Krebs on Security
xAI Dev Leaks API Key for Private SpaceX, Tesla LLMs
Data Breach

A employee at Elon Musk's artificial intelligence company xAI leaked a private key on GitHub that for the past two months could have allowed anyone to...

05/02/2025 Krebs on Security
Alleged ‘Scattered Spider’ Member Extradited to U.S.
Security News

A 23-year-old Scottish man thought to be a member of the prolific Scattered Spider cybercrime group was extradited last week from Spain to the United ...

04/30/2025 Krebs on Security
DOGE Worker’s Code Supports NLRB Whistleblower
Security News

A whistleblower at the National Labor Relations Board (NLRB) alleged last week that denizens of Elon Musk's Department of Government Efficiency (DOGE)...

04/23/2025 Krebs on Security
Whistleblower: DOGE Siphoned NLRB Case Data
Security News

A security architect with the National Labor Relations Board (NLRB) alleges that employees from Elon Musk's Department of Government Efficiency (DOGE)...

04/22/2025 Krebs on Security
Funding Expires for Key Cyber Vulnerability Database
Security News

A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware...

04/16/2025 Krebs on Security