darkreading
Noodlophile Stealer Hides Behind Bogus Copyright Complaints
11 hours 11 minutes ago
Noodlophile is targeting enterprises in spear-phishing attacks using copyright claims as phishing lures.
Alexander Culafi
Workday Breach Likely Linked to ShinyHunters Salesforce Attacks
14 hours 40 minutes ago
The HR giant said hackers mounted a socially engineered cyberattack on its third-party CRM system but did not gain access to customer information; only "commonly available" business contact info was exposed.
Elizabeth Montalbano, Contributing Writer
How Evolving RATs Are Redefining Enterprise Security Threats
17 hours 40 minutes ago
A more unified and behavior-aware approach to detection can significantly improve security outcomes.
Aditya K. Sood
Internet-wide Vulnerability Enables Giant DDoS Attacks
17 hours 50 minutes ago
A good chunk of all websites today have been affected by the biggest DDoS risk on the Web since 2023.
Nate Nelson, Contributing Writer
Defending Against Cloud Threats Across Multicloud Environments
19 hours 18 minutes ago
The vast majority of companies are using more than one cloud platform, yet struggle to establish and monitor security across different environments giving attackers an opening.
Robert Lemos, Contributing Writer
New Quantum-Safe Alliance Aims to Accelerate PQC Implementation
3 days 9 hours ago
The new Quantum-Safe 360 Alliance will provide road maps, technology, and services to help organizations navigate the post-quantum cryptography transition before the 2030 deadline.
Jeffrey Schwartz
RealDefense Opens $10M Fund to Help OEMs Monetize Installs With SmartScan Cybersecurity SDK
3 days 12 hours ago
New Crypto24 Ransomware Attacks Bypass EDR
3 days 12 hours ago
While several cybercrime groups have embraced "EDR killers," researchers say the deep knowledge and technical skills demonstrated by Crypto24 signify a dangerous escalation.
Rob Wright
Colt Telecommunications Struggles in Wake of Cyber Incident
3 days 13 hours ago
The UK telco said it temporarily took some systems offline as a "protective" measure in its investigation.
Kristina Beek
Using Security Expertise to Bridge the Communication Gap
3 days 18 hours ago
Cybersecurity-focused leadership delivers better products and business outcomes.
Mike Riemer
Water Systems Under Attack: Norway, Poland Blame Russia Actors
3 days 18 hours ago
Water and wastewater systems have become a favored target of nation-state actors, drawing increasing scrutiny following attacks on systems in multiple countries.
Robert Lemos, Contributing Writer
Downgrade Attack Allows Phishing Kits to Bypass FIDO
4 days 9 hours ago
You probably can't break FIDO authentication. Still, researchers have shown that there are ways to get around it.
Nate Nelson, Contributing Writer
State and Local Leaders Lobby Congress for Cybersecurity Resources
4 days 10 hours ago
Federal funding cuts to the Multi-State Information Sharing and Analysis Center (MS-ISAC) are about to leave more than 18,000 state and local organizations without access to basic cybersecurity resources they need to protect US national security, a letter sent to Congressional appropriators warns.
Becky Bracken
Agentic AI Use Cases for Security Soar, but Risks Demand Close Attention
4 days 10 hours ago
Organizations increasingly use agents to automate mundane tasks and address an overwhelming amount of sensitive data. However, adoption requires strict security strategies that keep humans in the loop for now.
Arielle Waldman
Google Chrome Enterprise: Advanced Browser Security for the Modern Workforce
4 days 11 hours ago
In this Dark Reading News Desk interview, Google's Mark Berschadski highlights the critical role browsers play in today's work environment and how Chrome Enterprise is evolving to meet modern security challenges while enabling productivity.
Terry Sweeney
Police & Government Email Access for Sale on Dark Web
4 days 11 hours ago
Cybercriminals are auctioning off live email credentials, giving other criminals access to sensitive systems, confidential intelligence, and, potentially, a higher success rate than ever.
Kristina Beek
NIST Digital Identity Guidelines Evolve With Threat Landscape
4 days 11 hours ago
The US National Institute of Standards and Technology updated its Digital Identity Guidelines to match current threats. The document detailed technical recommendations as well as suggestions for organizations.
Arielle Waldman
CISA Warns N-able Bugs Under Attack, Patch Now
4 days 12 hours ago
Two critical N-able vulnerabilities enable local code execution and command injection; they require authentication to exploit, suggesting they wouldn't be seen at the beginning of an exploit chain.
Alexander Culafi
Cybersecurity Spending Slows & Security Teams Shrink
4 days 13 hours ago
Security budgets are lowest in healthcare, professional and business services, retail, and hospitality, but budget growth remained above 5% in financial services, insurance, and tech.
Kristina Beek
Checked
9 hours 40 minutes ago
Public RSS feed
darkreading feed