darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
4 days hence
TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack
13 hours 31 minutes ago
Several npm packages for SAP's cloud application development ecosystem have been compromised as TeamPCP's supply chain attacks broaden.
Rob Wright
Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug
13 hours 51 minutes ago
The proof-of-concept exploit code runs only 10 lines long, but luckily, a patch is already available.
Nate Nelson
Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber
15 hours 23 minutes ago
In this latest installment of the Reporters' Notebook video series, we discuss how the new AI model threatens to completely upend cybersecurity, and what industry leaders are telling the press.
Becky Bracken, Kristina Beek
Oracle Red Bull Racing Team Revs Up Automation to Boost Security
20 hours 46 minutes ago
While drivers race to shave off seconds on the track, the team's IT and engineering staff are speeding up how they deliver security.
Arielle Waldman
Claude Mythos Fears Startle Japan's Financial Services Sector
1 day 10 hours ago
Global financial institutions are panicked over Anthropic's new superhacker AI model. Cyber experts aren't quite as worried.
Nate Nelson
Reverse Engineering With AI Unearths High-Severity GitHub Bug
1 day 14 hours ago
Wiz used an AI reverse-engineering tool to pinpoint a vulnerability that previously would have been too costly and time-consuming to undertake.
Alexander Culafi
AI Finds 38 Security Flaws in Electronic Health Record Platform
1 day 15 hours ago
Flaws in OpenEMR's platform — used by more than 100,000 healthcare providers — enabled database compromise, remote code execution, and data theft.
Jai Vijayan
Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
1 day 19 hours ago
The emerging ransomware has been deployed against victims of the TeamPCP supply chain attacks, but organizations should think twice before paying for a decryptor.
Elizabeth Montalbano
Lotus Wiper Attack Targets Venezuelan Energy Firms, Utilities
1 day 21 hours ago
An analysis of the destructive malware reveals sophisticated living-off-the-land (LotL) techniques and detailed strategies for the widespread deletion of data.
Robert Lemos
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
2 days 12 hours ago
The North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives.
Jai Vijayan
NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later
2 days 13 hours ago
Chris Inglis was the head civilian in charge at the NSA when the Snowden leaks exploded. He gets candid about mistakes the organization made, and what CISOs need to know about spotting potential threats, media disclosures, and "enculturation."
Dark Reading Staff
Feuding Ransomware Groups Leak Each Other's Data
2 days 14 hours ago
When 0APT and KryBit attacked each other, they exposed infrastructure and operational data, giving defenders rare insight into ransomware operations.
Alexander Culafi
Vidar Rises to Top of Chaotic Infostealer Market
2 days 15 hours ago
The malware has filled the gap created by last year's law enforcement takedowns of Lumma and Rhadamanthys.
Jai Vijayan
Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain
2 days 19 hours ago
Attackers continue to scale a campaign to seed Open VSX with seemingly benign VS Code extensions that spread self-propagating malware.
Elizabeth Montalbano
UNC6692 Combines Social Engineering, Malware, Cloud Abuse
3 days 14 hours ago
A newly discovered threat actor is using Microsoft Teams, AWS S3 buckets, and custom "Snow" malware in a multipronged campaign.
Alexander Culafi
Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation
3 days 19 hours ago
A researcher discovered five different exploit paths that stem from an architectural weakness in how Windows' Remote Procedure Call (RPC) mechanism handles connections to unavailable services.
Elizabeth Montalbano
20-Year-Old Malware Rewrites History of Cyber Sabotage
3 days 21 hours ago
Researchers have uncovered a malware framework dubbed "fast16" that predates Stuxnet by five years.
Jai Vijayan
Parsing Agentic Offensive Security's Existential Threat
3 days 21 hours ago
Some fear frontier LLMs like Claude Mythos and OpenAI's GPT-5.5 will lead to cybersecurity annihilation. Ari Herbert-Voss notes this could be an opportunity.
Tara Seals
Checked
1 hour 32 minutes ago
Public RSS feed
darkreading feed