darkreading
Cloud Break: IoT Devices Open to Silent Takeover Via Firewalls
22 hours 33 minutes ago
IoT devices can be compromised, thanks to gaps in cloud management interfaces for firewalls and routers, even if they're protected by security software or not online.
Nate Nelson, Contributing Writer
Can a Global, Decentralized System Save CVE Data?
23 hours 20 minutes ago
As vulnerabilities in the Common Vulnerabilities and Exposures ecosystem pile up, one Black Hat Europe presenter hopes for a global, distributed alternative.
Robert Lemos, Contributing Writer
Iran-Nexus Threat Actor UNC1549 Takes Aim at Aerospace
23 hours 38 minutes ago
Researchers say Israel remains a central focus, with UNC1549 targeting aerospace and defense entities in the US, the UAE, Qatar, Spain, and Saudi Arabia.
Alexander Culafi
Malicious Npm Packages Abuse Adspect Cloaking in Crypto Scam
1 day 3 hours ago
A malware campaign presents fake websites that can check if a visitor is a potential victim or a security researcher, and then proceed accordingly to defraud or evade.
Elizabeth Montalbano, Contributing Writer
Bug Bounty Programs Rise as Key Strategic Security Solutions
1 day 3 hours ago
Bug bounty programs create formal channels for organizations to leverage external security expertise, offering researchers legal protection and financial incentives for ethical vulnerability disclosure.
Elvia Finalle
New Startup Mate Launches With AI-Driven Security Operations Platform
1 day 20 hours ago
Security teams can combat alert fatigue, high rates of false positives, and reduce time spent on manual data collection with Mate's SOC platform, which utilizes AI agents to autonomously investigate and resolve alerts.
Dark Reading Staff
Critical Fortinet FortiWeb WAF Bug Exploited in the Wild
1 day 22 hours ago
The vulnerability could allow an unauthenticated attacker to remotely execute administrative commands.
Alexander Culafi
US Citizens Plead Guilty to Aiding North Korean IT Worker Campaigns
1 day 23 hours ago
Four individuals admitted to assisting foreign IT workers in gaining employment at US companies by providing false identities and remote access to employer-owned laptops.
Rob Wright
Cursor Issue Paves Way for Credential-Stealing Attacks
2 days 4 hours ago
Researchers discovered a security weakness in the AI-powered coding tool that allows malicious MCP server to hijack Cursor's internal browser.
Elizabeth Montalbano, Contributing Writer
Akira RaaS Targets Nutanix VMs, Threatens Critical Orgs
4 days 22 hours ago
The Akira ransomware group has been experimenting with new tools, bugs, and attack surfaces, with demonstrated success in significant sectors.
Nate Nelson, Contributing Writer
New Security Tools Target Growing macOS Threats
4 days 23 hours ago
A public dataset and platform-agnostic analysis tool aim to help organizations in the fight against Apple-targeted malware, which researchers say has lacked proper attention.
Elizabeth Montalbano, Contributing Writer
Hardened Containers Look to Eliminate Common Source of Vulnerabilities
4 days 23 hours ago
A kitchen-sink approach to building containers has loaded many with vulnerabilities. A handful of companies are trying to slim them down.
Robert Lemos, Contributing Writer
150,000 Packages Flood NPM Registry in Token Farming Campaign
4 days 23 hours ago
A self-replicating attack led to a tidal wave of malicious packages in the NPM registry, targeting tokens for the tea.xyz protocol.
Rob Wright
Learning Sales Skills Can Make Security Professionals More Effective
5 days 2 hours ago
Amazon Web Services VP Sara Duffer highlights the top lessons she brought back to her security role after taking part in Amazon's shadow program.
Arielle Waldman
Identity Governance and Administration, App Proliferation, and the App Integration Chasm
5 days 3 hours ago
Most enterprises use more than 1,000 apps, according to ESG research, yet about half are integrated with IGA. Industry innovations enable teams to expand app coverage and get more IGA value.
Todd Thiemann
How CISOs Can Best Work With CEOs and the Board: Lessons From the Field
5 days 20 hours ago
To build an effective relationship with the CEO and board, CISOs must translate technical risks into business terms and position cybersecurity as a strategic business enabler rather than just a business function.
George V. Hulme, Contributing Writer
Orgs Move to SSO, Passkeys to Solve Bad Password Habits
6 days 3 hours ago
In 2025, employees are still using weak passwords. Instead of forcing an impossible change, security leaders are working around the problem.
Nate Nelson, Contributing Writer
[Dark Reading Virtual Event] Know Your Enemy: How cybercriminals and nation-state hackers operate
6 days 4 hours ago
Coyote, Maverick Banking Trojans Run Rampant in Brazil
6 days 6 hours ago
South America's largest country is notorious for banking malware attacks; Maverick self-terminates if its targeted user is based outside Brazil.
Alexander Culafi
Checked
10 hours 2 minutes ago
Public RSS feed
darkreading feed