darkreading
GITEX GLOBAL 2025
5 days 1 hour hence
Cyberattack Leads to Beer Shortage as Asahi Recovers
8 hours 20 minutes ago
A ransomware last week left the Asahi brewery in Japan struggling to take orders and deliver its products domestically, as manufacturers become a favored target.
Robert Lemos, Contributing Writer
Attackers Season Spam With a Touch of 'Salt'
12 hours 1 minute ago
Researchers report an increase in the use of hidden content in spam and malicious email to confuse filters and other security mechanisms.
Jai Vijayan, Contributing Writer
Security Concerns Shadow Vibe Coding Adoption
14 hours 12 minutes ago
In a recent poll, readers shared how they're using vibe coding in AppDev (if they are at all). While some found success, others found the risks too great.
Alexander Culafi
Medusa Ransomware Actors Exploit Critical Fortra GoAnywhere Flaw
16 hours 20 minutes ago
Researchers say exploitation of CVE-2025-10035 requires a private key, and it's unclear how Storm-1175 threat actors pulled this off.
Rob Wright
Patch Now: 'RediShell' Threatens Cloud Via Redis RCE
22 hours 44 minutes ago
A 13-year-old flaw with a CVSS score of 10 in the popular data storage service allows for full host takeover, and more than 300k instances are currently exposed.
Elizabeth Montalbano, Contributing Writer
Cyberattackers Exploit Zimbra Zero-Day Via ICS
1 day 13 hours ago
A threat actor purporting to be from the Libyan Navy's Office of Protocol targeted Brazil's military earlier this year using the rare tactic.
Jai Vijayan, Contributing Writer
Clop Ransomware Hits Oracle Customers Via Zero-Day Flaw
1 day 14 hours ago
The infamous Clop gang has targeted a wide range of Oracle E-Business Suite customers using a newly disclosed zero-day vulnerability.
Alexander Culafi
Chinese Gov't Fronts Trick the West to Obtain Cyber Tech
1 day 19 hours ago
Outwardly neutral Chinese institutions have been collaborating with Western orgs and researchers for the benefit of PRC state intelligence.
Nate Nelson, Contributing Writer
Self-Propagating Malware Hits WhatsApp Users in Brazil
1 day 23 hours ago
The enterprise-focused Water Saci campaign spreads Sorvepotel, which can steal credentials and monitor browser activity to defraud financial institutions in the region.
Elizabeth Montalbano, Contributing Writer
Scattered Lapsus$ Hunters Returns With Salesforce Leak Site
4 days 13 hours ago
After claiming it would shut down, the cybercriminal collective reemerged and threatened to publish the stolen data of Salesforce customers by Oct. 10 if its demands are not met.
Rob Wright
Dutch Authorities Arrest Two Teens for Alleged Pro-Russian Espionage
4 days 14 hours ago
Dutch Prime Minister Dick Schoof described the incident as part of a broader pattern of Russian hybrid attacks against Europe.
Kristina Beek
Jaguar Land Rover Shows Cyberattacks Mean (Bad) Business
4 days 17 hours ago
The company likely failed to completely clean out attackers from a previous breach and now is a case study for the high cost of ransomware.
Robert Lemos, Contributing Writer
BCI: The Stuff of Nightmares or Dreams?
4 days 19 hours ago
Brain computer interface (BCI) technology looks to provide users with hands-free device control, but could security ever keep up with the risks?
Arielle Waldman
Microsoft's Voice Clone Becomes Scary & Unsalvageable
4 days 20 hours ago
An attacker's dream: Windows Speak for Me could integrate into apps, creating perfect voice replicas for Teams calls and AI agent interactions across multiple SaaS platforms.
Tara Seals
UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft
4 days 20 hours ago
A Chinese-language threat actor uses every part of the kill: infecting Web servers with malware, poisoning sites with SEO spam, and stealing organizational data for follow-on attacks.
Nate Nelson, Contributing Writer
Despite More CVEs, Cyber Insurers Aren't Altering Policies
5 days 16 hours ago
With nearly 47,000 CVEs expected by the end of the year, organizations must balance comprehensive vulnerability management with strategic cyber insurance policy selection to effectively navigate this rapidly evolving threat landscape.
Stephen Lawton
For One NFL Team, Tackling Cyber Threats Is Basic Defense
5 days 16 hours ago
The NFL's cyberattack surface is expanding at an unprecedented rate. To find out more, we spoke with a cyber-defense coordinator from the Cleveland Browns.
Nate Nelson, Contributing Writer
Red Hat Investigates Widespread Breach of Private GitLab Repositories
5 days 17 hours ago
A threat actor claimed 28,000 private repositories had been compromised, and the Linux software maker said it had "initiated necessary remediation steps."
Rob Wright
Checked
7 hours 19 minutes ago
Public RSS feed
darkreading feed