darkreading
[Virtual Event] Anatomy of a Data Breach: What to Do if it Happens to You
3 weeks 4 days hence
Infosecurity Europe
1 week 2 days hence
Akamai Joins Growing Chorus of Vendors Betting Big on Secure Enterprise Browsers
1 day 17 hours ago
When Akamai announced its LayerX acquisition, the company joined a growing list of vendors adding secure enterprise browsers to their product portfolios.
Jeffrey Schwartz
Verizon DBIR: Healthcare Fends Off Increased Social Engineering Attacks
1 day 19 hours ago
Ransomware and vendor breaches persist. The "2026 Data Breach Investigations Report" (DBIR) highlights how evolving social engineering tactics make the sector more vulnerable.
Arielle Waldman
China's Webworm Uses Discord, Microsoft Graphs to Hack EU Governments
2 days 2 hours ago
The advanced persistent threat group also relied on SOCKS proxies like SoftEther VPN, tunneling tools that act as a middleman between victim and attacker.
Alexander Culafi
Google API Keys Remain Active After Deletion
2 days 13 hours ago
A security researcher discovered the API keys can still be used for up to 23 minutes after deletion, even though the cloud provider claims deletion is immediate.
Rob Wright
AI Agents Are Shifting Identity Security Budget Dynamics
2 days 17 hours ago
AI agent projects are proliferating throughout the enterprise, and those AI agent identities require management, security, and governance. New Omdia research shows the AI agent identity budget dynamics are very different than traditional IAM projects.
Todd Thiemann
Chinese APTs Share Linux Backdoor in Central Asia Telco Attacks
2 days 19 hours ago
"Showboat" doesn't show off, but clearly it doesn't need to, as it's long helped China spy on small market communications providers.
Nate Nelson
Content Delivery Exploit Opens Websites to Brand Hijacking
2 days 20 hours ago
The Underminr domain-fronting attack allows threat actors to modify Web requests and leverage trusted websites to cloak malicious activity.
Nate Nelson
Cyber Pros Can't Decide If AI Is a Good or a Bad Thing
3 days 12 hours ago
There is nothing cybersecurity professionals are more excited about, and nothing they fear more, than AI.
Nate Nelson
GitHub Confirms Breach, 4K Internal Repos Stolen
3 days 12 hours ago
GitHub confirmed a data breach this week involving the theft of thousands of developer code repositories. One threat actor — TeamPCP — took credit.
Alexander Culafi
Fake Android Apps Commit Carrier Billing Fraud for Premium Services
3 days 12 hours ago
The disguised apps use WebView automation, JavaScript injection, and OTP interception to avoid detection and complete fraudulent subscriptions.
Jai Vijayan
Processes & Culture Top Reasons Behind Data Breaches
3 days 15 hours ago
In spite of state laws meant to improve cyber hygiene, an analysis of incidents shows issues persist and visibility falls short.
Arielle Waldman
Patch Now: Critical Flaw in OT Robot OS Gives Attackers Control
3 days 17 hours ago
An unauthenticated attacker can exploit the command injection vulnerability to gain remote access to robotic systems, causing significant disruption to the environment.
Elizabeth Montalbano
How CISOs Should Prep for Agentic-Ready AI BOMs
3 days 19 hours ago
Finding ways to document both component and execution attributes for AI bills of materials (AI BOMs).
Ericka Chickowski, Contributing Writer
Interpol's 'Operation Ramz' Pioneers Cross-Region Collabs in Middle East
4 days 2 hours ago
While the numbers are modest, the crackdown on cybercrime involved 13 countries in the MENA region, the largest law enforcement collaboration to date.
Robert Lemos
What It'll Take to Make AI BOMs Usable in a Modern Security Program
4 days 5 hours ago
Five ways CISOs can prepare for consuming AI bills of materials and influence the direction of how they're generated.
Ericka Chickowski, Contributing Writer
What Will Make AI BOMs Real?
4 days 10 hours ago
A brief overview of the forces at play that will get more organizations on board with creating and consuming AI bill of materials (BOM).
Ericka Chickowski, Contributing Writer
Verizon DBIR: Enterprises Face a Dangerous Vulnerability Glut
4 days 11 hours ago
Verizon's 2026 Data Breach Investigations Report (DBIR) finds that exploits are now involved in 31% of initial access for breaches, while patching lags too far behind the bad guys.
Alexander Culafi
Checked
2 hours 14 minutes ago
Public RSS feed
darkreading feed