darkreading
Secure Your Spot at RSAC 2026 Conference
6 days 17 hours hence
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
2 days 21 hours hence
Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos
2 days 22 hours ago
The excitement around Cisco's latest SD-WAN bugs has inspired some light fraud, misunderstandings, and overlooked risks.
Nate Nelson
The Data Gap: Why Nonprofit Cyber Incidents Go Underreported
2 days 23 hours ago
Threat actors target nonprofits due to security gaps and highly coveted information, but a lack of sufficient data makes it difficult to grasp the entire picture.
Arielle Waldman
Cyberattackers Don't Care About Good Causes
3 days ago
Sightline Security's founder and advisory board discuss how cybersecurity poses significant problems for nonprofits and suggest ways the industry can help.
Arielle Waldman
Will AI Save Consumers From Smartphone-Based Phishing Attacks?
3 days 1 hour ago
Sophisticated phishing attacks are bypassing on-device protections with troubling frequency, making it more critical than ever for users to protect themselves from potential threats, new research from Omdia shows.
Hollie Hennessy, Aaron West
Most Google Cloud Attacks Start With Bug Exploitation
3 days 4 hours ago
Forget stolen credentials and misconfigurations; AI means vulnerability exploits that beat patching cycles are the top cause of compromises in the cloud.
Robert Lemos
Real-Time Banking Trojan Strikes Brazil's Pix Users
3 days 4 hours ago
The latest banking Trojan campaign to hit Brazil combines classic malware with a real-time human operator, waiting for the perfect moment to strike.
Alexander Culafi
Why Post-Quantum Cryptography Can't Wait
3 days 19 hours ago
Organizations have to prepare to ensure they have cryptography in place in the post-quantum world.
Manju Naglapur
Iran MOIS Colludes With Criminals to Boost Cyberattacks
3 days 20 hours ago
Iranian APTs have long pretended to be cybercriminal groups. Now they're working with actual cybercriminal groups.
Nate Nelson
Commercial Spyware Opponents Fear US Policy Shifting
3 days 21 hours ago
Rescinded sanctions and reactivated contracts have created confusion about the Trump administration's spyware policy and where it draws the line.
Rob Wright
Delinea's StrongDM Acquisition Highlights the Changing Role of PAM
4 days ago
StrongDM, which injects ephemeral, real-time credentials into developer workflows, will enable Delinea to offer privilege access management across cloud, SaaS, Kubernetes, and database environments.
Jeffrey Schwartz
Why Stryker's Outage Is a Disaster Recovery Wake-Up Call
4 days 1 hour ago
The Iranian cyberattack on Stryker is the kind of stress test that business continuity and disaster recovery programs often do not plan for.
Jai Vijayan
What Orgs Can Learn From Olympics, World Cup IR Plans
4 days 3 hours ago
In this edition of "Reporters' Notebook," we discuss cyberattackers targeting the Milan-Cortina Winter Games, adding them to a long list of global sporting events in the crosshairs. Though the attack surface is grander, there are key incident-response takeaways for regular enterprises, too.
Tara Seals
A Guy Who Wrote the Code Died in 2005. I Still Have to Secure It
4 days 19 hours ago
The real frontline of American cybersecurity is a bidding war on eBay for 30-year-old industrial controllers.
Chuck Everette
INC Ransomware Group Holds Healthcare Hostage in Oceania
4 days 19 hours ago
Government agencies, emergency clinics, and others in Australia, New Zealand, and Tonga have had serious run-ins with the prolific ransomware outfit.
Nate Nelson
Xygeni GitHub Action Compromised Via Tag Poison
4 days 21 hours ago
Attackers operated an active C2 implant for up to a week and compromised AppSec vendor Xygeni's xygeni/xygeni-action in that time.
Alexander Culafi
Chinese Nexus Actors Shift Focus to Qatar Amid Iranian Conflict
5 days 2 hours ago
Two attacks on Qatari entities signal a shift in focus for China-backed actors and demonstrate how quickly they can pivot in response to geopolitical events.
Elizabeth Montalbano
Middle East Conflict Highlights Cloud Resilience Gaps
5 days 12 hours ago
Data centers — used by both governments and militaries for operations — are now fair game, not just for cyberattacks, but for kinetic attacks as well.
Robert Lemos
Checked
13 hours 36 minutes ago
Public RSS feed
darkreading feed