darkreading
Asia Produces More APT Actors, As Focus Expands Globally
3 hours 44 minutes ago
China and North Korea-aligned groups account for more than half of global attacks, and an increasing number of countries look to cyber to balance power in the region.
Robert Lemos, Contributing Writer
Fake Kling AI Malvertisements Lure Victims With False Promises
7 hours 15 minutes ago
Researchers noted that they found several similar websites, two of which are still operating and require the same kind of behavior on behalf of the victim.
Kristina Beek, Associate Editor, Dark Reading
Virgin Media 02 Vuln Exposes Call Recipient Location
10 hours 2 minutes ago
A hacker exploiting the security flaw in the mobile provider's network could have potentially located a call recipient with accuracy of up to 100 square meters.
Kristina Beek, Associate Editor, Dark Reading
Tenable Adds Third-Party Connectors to Exposure Management Platform
10 hours 40 minutes ago
Tenable One now pulls in data from AWS, Microsoft, and competitors to provide a holistic security view of an organization's attack surface.
Jeffrey Schwartz
Regeneron Pledges Privacy Protection in $256M Bid for 23andMe
11 hours 40 minutes ago
Regeneron's planned acquisition of 23andMe raises significant privacy concerns as experts warn about the lack of comprehensive federal regulations governing the transfer of genetic information.
Arielle Waldman
Bumblebee Malware Takes Flight via Trojanized VMware Utility
12 hours 23 minutes ago
An employee inadvertently downloaded a malicious version of the legitimate RVTools utility, which launched an investigation into an attempted supply chain attack aimed at delivering the recently revived initial-access loader.
Elizabeth Montalbano, Contributing Writer
Large Retailers Land in Scattered Spider's Ransomware Web
13 hours 16 minutes ago
The threat group games IT help desks to gain entry into retailer networks, and signs show it has shifted its attention from the UK to US targets.
Becky Bracken
'Hazy Hawk' Cybercrime Gang Swoops In for Cloud Resources
13 hours 44 minutes ago
Since December 2023, the threat group has preyed on domains belonging to the US Centers for Disease Control and Prevention (CDC) and numerous other reputable organizations worldwide to redirect users to malicious sites.
Jai Vijayan, Contributing Writer
Novel Phishing Attack Combines AES With Poisoned npm Packages
14 hours 44 minutes ago
Researchers discovered a phishing attack in the wild that takes multiple well-tread technologies like open source packages and AES encryption and combines them.
Alexander Culafi, Senior News Writer, Dark Reading
Why Rigid Security Programs Keep Failing
14 hours 44 minutes ago
Organizations that stay ahead of attacks won't be the most compliant ones — they'll be the ones most honest about what actually works.
Aditya Gupta
'Operation RoundPress' Targets Ukraine in XSS Webmail Attacks
1 day 7 hours ago
A cyber-espionage campaign is targeting Ukrainian government entities with a series of sophisticated spear-phishing attacks that exploit XSS vulnerabilities.
Alexander Culafi, Senior News Writer, Dark Reading
S. Dakota CIO Gottumukkala Signs on as CISA Deputy Director
1 day 9 hours ago
The addition is an important hire for the No. 2 position at the cyber agency. The main director role remains unfilled post-Easterly, with Bridget Bean taking over acting duties for now.
Tara Seals
Legal Aid Agency Warns Lawyers, Defendants on Data Breach
1 day 10 hours ago
The online service has since been shut down as the agency grapples with the cyberattack, though it assures the public that those most in need of legal assistance will still be able to access help.
Kristina Beek, Associate Editor, Dark Reading
CVE Disruption Threatens Foundations of Defensive Security
1 day 14 hours ago
If the Common Vulnerabilities and Exposures system continues to face uncertainty, the repercussions will build slowly, and eventually the cracks will become harder to contain.
Haris Pylarinos
Coinbase Extorted, Offers $20M for Info on Its Hackers
4 days 8 hours ago
Coinbase is going Liam Neeson on its attackers, potentially setting a new precedent for incident response in the wake of crypto- and blockchain-targeting cyberattacks.
Nate Nelson, Contributing Writer
Australian Human Rights Commission Leaks Docs in Data Breach
4 days 8 hours ago
An internal error led to public disclosure of reams of sensitive data that could be co-opted for follow-on cyberattacks.
Kristina Beek, Associate Editor, Dark Reading
Dynamic DNS Emerges as Go-to Cyberattack Facilitator
4 days 9 hours ago
Scattered Spider and other phishers and hacking groups are using rentable subdomains from dynamic DNS providers to obfuscate their activity and impersonate well-known brands.
Rob Wright
Attacker Specialization Puts Threat Modeling on Defensive
4 days 9 hours ago
Specialization among threat groups poses challenges for defenders, who now must distinguish between different actors responsible for different facets of an attack.
Robert Lemos, Contributing Writer
How to Develop and Communicate Metrics for CSIRPs
4 days 14 hours ago
A well-documented cybersecurity incident response program (CSIRP) provides the transparency needed for informed decision-making, protecting the organization in a constantly changing threat environment.
Craig Porter
Checked
2 hours 44 minutes ago
Public RSS feed
darkreading feed